Adoption of VoIP Applications in Public and Private Organizations

Author(s):  
Nicoletta Corrocher ◽  
Roberto Fontana ◽  
Claudia Parlanti

We provide evidence on the determinants of diffusion of Voice over IP (VoIP) applications in a sample of public and private organizations in Italy. We first review the recent developments in the technology in order to identify the current trends and the costs and benefits of VoIP adoption. Second, we discuss the recent policy efforts at the European level toward the implementation of the technology. Third, we present an empirical investigation. Our results suggest that organizations become more likely to adopt as time goes by, and that the decision to adopt is mostly affected by size and availability of financial resources. Organizations can benefit from IP communications systems, because they offer cost savings and enhanced applications facilitating network management and on-line transactions. However, technical shortcomings, established habits and practices, and legacy network investments can inhibit adoption. This explains why firms are more likely to adopt as time passes and why small organizations are more inclined to adopt than larger ones.

1997 ◽  
Vol 2 (2) ◽  
pp. 159-170 ◽  
Author(s):  
Troy D. Abel ◽  
J. Thomas Hennessey

Since 1970, much of state and local activity in environmental protection involved implementing or enforcing national mandates. Recent developments in the United States suggest that some subnational jurisdictions have taken and are taking significant steps to address local environmental problems within, and beyond, national mandates. This suggests that there may be opportunities for state and local governments to address emerging local environmental policy issues. With any opportunity to address emerging local environmental policy issues is the question, Can state and local governments effectively implement new strategies to address emerging environmental issues? This article examines two cases where state and local governments have taken and are taking a prominent role in addressing water quality problems. The cases, although different in time and focus, argue that state and local governments can, and have, provided leadership on such issues. Much of the early effort to push for national environmental mandates was based on the assumption that state and local governments were incapable of addressing the environmental challenges facing them. The two cases presented in this article suggest that more than national mandates are required to overcome local limits. Among the required components for successful state and local government efforts suggested by these cases are experimentation, innovative combinations of public and private organizations at the local and state levels, and flexible federal support for local action.


2000 ◽  
Vol 23 (1) ◽  
pp. 77 ◽  
Author(s):  
Ann Ritchie ◽  
Beth Sowter

This article reports on the results of an exploratory survey of the availability andaccessibility of evidence-based information resources provided by medical libraries inAustralia. Although barriers impede access to evidence-based information for hospitalclinicians, the survey revealed that Medline and Cinahl are available in over 90% offacilities. In most cases they are widely accessible via internal networks and the Internet.The Cochrane Library is available in 69% of cases. The Internet is widely accessible andmost libraries provide access to some full-text, electronic journals. Strategies for overcomingrestrictions and integrating information resources with clinical workflow are being pursued.State, regional and national public and private consortia are developing agreementsutilising on-line technology. These could produce cost savings and more equitable accessto a greater range of evidence-based resources.


2021 ◽  
Vol 67 (4) ◽  
pp. 240-247
Author(s):  
Lenka Navrátilová ◽  
Jozef Výbošťok ◽  
Jaroslav Šálka

Abstract Within the concept of bioeconomy at Slovak level, forestry is often seen as a key sector. For that reason, the concept of forest-based bioeconomy gained a specific importance. To this concept is on the European level already paid increasing attention not only in research, but also in politics. Whether or not the forest-based bioeconomy will have a success in Slovakia is greatly dependent on stakeholders´ perception and attitude towards the concept. Therefore, the objective of this paper is to identify stakeholders´ perception of forest-based bioeconomy. To achieve this, we identified 13 stakeholders from various, bioeconomy-related, sectors that were suitable for qualitative interviewing. The respondents are representants of public and private organizations and are active in relevant areas. The study was conducted using structured interview consisting of 12 questions. Respondents in general tend to lean towards forest-based bioeconomy, as they feel that it brings more opportunities (for the forest and wood-processing sector, economy, industry, nature protection) than risks. However, a threat has presented itself during the study, being the fact that forest stakeholders do not feel to be sufficiently involved in bioeconomy discussion. For the bioeconomy to fulfil its role as an all-purpose weapon, there is an urgent need for more precise policy guidance and for involving of all relevant stakeholders into discussion.


Author(s):  
G.Y. Fan ◽  
J.M. Cowley

In recent developments, the ASU HB5 has been modified so that the timing, positioning, and scanning of the finely focused electron probe can be entirely controlled by a host computer. This made the asynchronized handshake possible between the HB5 STEM and the image processing system which consists of host computer (PDP 11/34), DeAnza image processor (IP 5000) which is interfaced with a low-light level TV camera, array processor (AP 400) and various peripheral devices. This greatly facilitates the pattern recognition technique initiated by Monosmith and Cowley. Software called NANHB5 is under development which, instead of employing a set of photo-diodes to detect strong spots on a TV screen, uses various software techniques including on-line fast Fourier transform (FFT) to recognize patterns of greater complexity, taking advantage of the sophistication of our image processing system and the flexibility of computer software.


Author(s):  
W.J. de Ruijter ◽  
P. Rez ◽  
David J. Smith

There is growing interest in the on-line use of computers in high-resolution electron n which should reduce the demands on highly skilled operators and thereby extend the r of the technique. An on-line computer could obviously perform routine procedures hand, or else facilitate automation of various restoration, reconstruction and enhan These techniques are slow and cumbersome at present because of the need for cai micrographs and off-line processing. In low resolution microscopy (most biologic; primary incentive for automation and computer image analysis is to create a instrument, with standard programmed procedures. In HREM (materials researc computer image analysis should lead to better utilization of the microscope. Instru (improved lens design and higher accelerating voltages) have improved the interpretab the level of atomic dimensions (approximately 1.6 Å) and instrumental resolutior should become feasible in the near future.


Public Voices ◽  
2017 ◽  
Vol 9 (2) ◽  
pp. 46
Author(s):  
Nolan J. Argyle ◽  
Gerald A. Merwin

Privatization, contracting out, and a host of other current trends blur the line between public and private—they create what at best is a fuzzy line. This study examines yet one additional area where the lines between public and private have gotten even fuzzier—the best selling novel. It uses the writings of Tom Clancy and Clive Cussler,two authors whose names on a novel guarantee best-seller status. It will do so in the context of what a civic community and civil society are, and how they relate to the public-private question, a question that has renewed life in public administration.


2020 ◽  
Vol 56 (3-4) ◽  
pp. 179-199
Author(s):  
Ekaterina Entina ◽  
Alexander Pivovarenko

The article reflects on the issue of the foreign policy strategy of modern Russia in the Balkans region. One of the most significant aspects of this problem is the difference in views between Russia and the West. Authors show how different interpretations of the events in former Yugoslavia in the 1990s and the beginning of the 2000s predetermined the sense of mutual suspicion and mistrust which spread to other regions such as the post-Soviet space. Exploring differences between the Russian and the Western (Euro-Atlantic) views on the current matters, authors draw attention to fundamental differences in terminology: while the Western narrative promotes more narrow geographical and political definitions (such as the Western Balkan Six), traditional Russian experts are more inclined to wider or integral definitions such as “the Balkans” and “Central and Southeast Europe”. Meanwhile none of these terms are applicable for analysis of the current trends such as the growing transit role of the Balkans region and its embedding in the European regional security architecture. Therefore, a new definition is needed to overcome the differences in vision and better understand significant recent developments in the region. Conceptualizing major foreign policy events in Central and Southeast Europe during the last three decades (the 1990s, 2000s and 2010s), authors demonstrate the significance of differences in tools and methods between the Soviet Union and the modern Russia. Permanent need for adaptation to changing political and security context led to inconsistence in Russian Balkan policy in the 1990s. Nevertheless, Russia was able to preserve an integral vision of the region and even to elaborate new transregional constructive projects, which in right political circumstances may promote stability and become beneficial for both Russia and the Euro-Atlantic community.


2021 ◽  
Vol 19 (3) ◽  
pp. 235-285
Author(s):  
Mason D. Lancaster

This article provides an overview of metaphor theories and research on their own terms, as well as their use in Hebrew Bible (HB) studies. Though metaphor studies in the HB have become increasingly popular, they often draw upon a limited or dated subset of metaphor scholarship. The first half of this article surveys a wide variety of metaphor scholarship from the humanities (philosophical, poetic, rhetorical) and the sciences (e.g., conceptual metaphor theory), beginning with Aristotle but focusing on more recent developments. The second half overviews studies of metaphor in the HB since 1980, surveying works focused on theory and method; works focused on specific biblical books or metaphor domains; and finally noting current trends and suggesting areas for future research.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1005
Author(s):  
Rakan A. Alsowail ◽  
Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.


2015 ◽  
Vol 25 (61) ◽  
pp. 191-199 ◽  
Author(s):  
Cristiane Pimentel Nalin ◽  
Lucia Helena de Freitas Pinho França

The increase in the elderly population has prompted research on retirement. This study investigated the importance of resilience, economic satisfaction, the length of retirement, and planning to well-being during retirement of 270 participants. The majority of this sample were men (64%), and the mean age was 65 years (SD = 5.7). The participants were retired members of 10 public and private organizations in Rio de Janeiro. Factor analysis and hierarchical regression were performed. The results showed that determined resilience (mastery, adaptability, confidence and perseverance) and socioeconomic satisfaction were the main predictors of well-being in retirement and explained 28% of this model. The findings suggest that well-being in retirement is closely related to socioeconomic satisfaction and determined resilience. Additional research should address the importance of resilience for the well-being of retirees who are or not members of retirement associations. Resilience attitudes should be promoted in Retirement Education Programs.


Sign in / Sign up

Export Citation Format

Share Document