首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 734 毫秒
1.
Understanding information sharing is an important challenge to modern organizations, and is likely to be increasingly considered when IT investment decisions are made world-wide. Our research study investigated the influence of cultural factors on information sharing in China. It was postulated that social network structures such as guanxi, Confucian dynamism, and collectivism could explain the degree to which information sharing took place between people in China. It was found that guanxi, Confucian dynamism, and collectivism all had a significant influence on information sharing.  相似文献   

2.
The paper aims to investigate the effects of information technology (IT) alignment and information sharing on operational performance in the context of supply chain. Based on the resource-based view, this study identifies IT alignment and information sharing as specific resources/capabilities for supply chain partnership. Data from 141 Chinese manufacturers are collected to test the relationships among IT alignment, information sharing, and operational performance. The results show that (1) both IT alignment and information sharing have direct and positive effects on operational performance, (2) IT alignment has an indirect effect on operational performance through information sharing, and (3) IT alignment and information sharing have different emphases in operational performance improvement. The resource-capability-performance paradigm is extended to supply chain context in the emerging economy. Chinese managers may have different emphases on IT resource/information sharing capability deployment for operational efficiency and effectiveness.  相似文献   

3.
为了给公众和企业提供更好的服务,给政府决策者提供更准确及时的支持,政府部门间G2G信息共享势在必行。然而,由于政府业务繁多且程序复杂,许多政府部门对政府信息分布及共享需求并不清晰,给电子政务流程设计造成了一定的难度。为此,试图从跨组织信息资源管理的角度出发,首先对G2B传统业务流程中业务依托信息和产生信息进行分析,以确定各职能部门的信息需求状况;其次,通过分析不同部门间的业务信息关系,分别建立依托信息与依托信息、依托信息与产生信息以及产生信息与产生信息三种信息交集关系,从而识别部门间信息共享需求并分析可能  相似文献   

4.
We are living in an era of social media such as online communities and social networking sites. Exposing or sharing personal information with these communities has risks as well as benefits and there is always a trade off between the risks versus the benefits of using these technologies. Life-logs are pervasive tools or systems which sense and capture contextual information from the user's environment in a continuous manner. A life-log produces a dataset, which consists of continuous streams of sensor data. Sharing this information has a wide range of advantages for both user and society. On the other hand, in terms of individual privacy, life-log information is very sensitive. Although social media enable users to share their information, due to life-log data structure, current sharing models are not capable of handling life-log information while maintaining user privacy. Our approach here is to describe the sharing of life-log information with society based on the identification of associated risks and benefits. Subsequently, based on the identified risks, we propose a data model for sharing life-log information. This data model has been designed to reduce the potential risks of life-logs. Furthermore, ethics for providing and using life-logs will be discussed. These ethics focus on reducing risks as much as possible while sharing life-log information.  相似文献   

5.
With major developments in information and communication technologies, real-time information sharing becomes a significant challenge and has a considerable impact on the overall performance of supply chains. Here, we study the influence of information sharing for a monoproduct serial supply chain consisting of a supplier, warehouse, retailer and customers in the context of a decentralized decision. The objectives of this study are twofold: (1) to estimate the gains from sharing different types of information on each elementary cost and for each partner of the supply chain in detail and (2) to determine the cumulative impact of simultaneously sharing different types of information.A mathematical model is developed to assess the value of information sharing in terms of logistic costs and for different combinations related to the sharing or non-sharing of three types of upstream and downstream information: the customer demand and the supplier-warehouse and warehouse-retailer lead times. A perturbation is also injected to consider the intended or unintended distortion in the communicated information.Our study clearly showed that the gains are not cumulative when we simultaneously share different types of information. The results also highlighted the necessity to establish incentive cooperation mechanisms between the different links in the supply chain in many scenarios where the gains are not balanced. A distortion in the communicated information can also have a significant effect on the gains from sharing.  相似文献   

6.
Tacit knowledge sharing influences the performance of IT R&D teams. However, information regarding the mechanism of tacit knowledge sharing is limited. Accordingly, we develop a nonlinear dynamic model to explore the influence of structural changes on tacit knowledge sharing behavior in an IT R&D team, particularly in response to gradual changes in payoff structures. The following results were observed:(1) Certain situations and a traditional correlation analysis confirmed that the current contradictions in the influence of reward systems on knowledge sharing behavior are unified. (2) Under special conditions, the influences of several critical factors (e.g., reciprocity, penalty of social reputation, and supervising mechanism) lose efficacy. As an alternative, managers can only enhance the reward system or reduce sharing cost. The effectiveness of knowledge sharing substantially improves only once it reaches certain critical thresholds. (3) During a catastrophe, a team’s behavior may become immune to the deterioration of payoff structures. However, sudden jumps (i.e., from sharing to hiding knowledge) may occur when another threshold is reached. In summary, once team members experience a sudden jump, retrieving the previous cooperative status becomes difficult.  相似文献   

7.
网络攻击的手段层出不穷,如中间人攻击,重放攻击, DoS攻击等,以此获取不当利益.密钥协商协议的设立是为合法用户提供正确认证入口,并拒绝攻击者的非法接入和攻击.密钥协商协议是保护移动通信提高服务质量的第一道安全防线, 5G网络密钥协商协议在实际环境中仍然存在安全隐患,其协议本身的安全特性能否满足要求仍未可知,本文提出使用基于概率模型检测的方法,通过对5G网络密钥协商协议的各协议方实体进行建模,建立离散时间马尔科夫链模型,在建模过程中考虑外界的攻击影响,引入攻击率来描述外界的影响程度,通过攻击率对5G网络密钥协商协议的研究进行定量分析,使用概率计算树逻辑对待验属性规约进行编码描述,利用概率模型检测工具PRISM进行实验.实验结果表明:在引入攻击率的5G网络密钥协商协议模型中, 5G网络密钥协商协议各协议方实体所受攻击的影响对该协议的时延性,有效性,保密性等属性规约的性能有不同程度的影响,因此,研究外界网络攻击对协议的安全性能的影响,对加强协议安全性能及其改进具有一定借鉴意义,并对5G网络密钥协商协议的安全特性的提升和保护用户的经济与信息安全具有很大的意义.  相似文献   

8.
Addressing the complexity of the growing number of regulatory imperatives from global institutional environments has prompted firms in the IT sector to leverage the enabling effects of IT-based systems to help manage environmental compliance and related organisational risks. Thus, a new breed of IS—Green IS—emerged in recent years. This paper presents an integrative theoretical model that: (1) employs institutional theory to help explain how a range of exogenous regulative, normative and cultural-cognitive factors from the institutional environment and the organisational field influence IT manufacturers’ decisions on the design and manufacture of environmentally sustainable products; and (2) uses organisational theory to describe the strategic endogenous arrangements that organisations institute using Green IS in order to support sense-making, decision making and knowledge creation around environmental sustainability. The paper employs the findings of a case study of Compliance and Risks’ Ltd. Compliance-to-Product (C2P) application and its implementation in two US-based Fortune 500 IT manufacturers to help validate and refine the a priori theoretical model. The paper therefore makes a significant contribution to theory building on the phenomenon of Green IS, through its articulation of empirically-based theoretical propositions which employ conceptual mechanisms to explain how Green IS can support organisational sense-making, decision making and knowledge sharing and creation around the design and manufacture of Green IT.  相似文献   

9.
In the knowledge‐based economy, organizational success is dependent on how effectively organizational employees share information. Many studies have investigated how different types of communication activities and communications media influence knowledge sharing. We contribute to this literature by examining increasingly prevalent yet understudied IT‐mediated social interactions and their effects on knowledge sharing among employees in comparison to face‐to‐face social connections. By integrating the literature on knowledge sharing, social networks, and information systems, we theorize the ability of IT‐mediated social interaction to (1) afford interactions between individuals with heterogeneous backgrounds and (2) facilitate frequent IT‐mediated social interactions that are high in competence‐based trust—both supporting effective sharing of knowledge. Through a social network analysis of the employees in a high‐tech organization, this study finds that IT‐mediated frequent social interactions are the most effective in promoting knowledge sharing.  相似文献   

10.
ICT applications that include functionality for knowledge sharing are routinely used by IT service providers even though their implementation is known to be problematic and the reasons for such problems not well understood. To shed light on the issue, we collected data at two organisations where managers had provided IT service support workers with IT service management (ITSM) tools incorporating functionality for knowledge sharing. Using critical discourse analysis and rhetorical analysis techniques, we contrasted primary data representative of IT service support practice with other primary and publicly available secondary data reflecting the prevailing discourse of IT service managers. Through this analysis, we identify an apparent dissonance between ITSM managerial and worker discourses that reflect opposing epistemologies. Managers are optimistic about the benefits of ICT‐based knowledge sharing, whereas the practice of workers is revealed to privilege self‐reliance and interpersonal knowledge sharing. By taking a dual, management–worker, perspective, we provide fresh insight into why ICT‐based knowledge sharing is problematic. As a theoretical contribution, we propose that dysfunctional intra‐organisational conflict can arise where incompatible management and worker practices become institutionalised through the simultaneous diffusion of conflicting discourses.  相似文献   

11.
Rooted in the profit-seeking motives of social exchange theory, this study aims to investigate the factors that facilitate leverages of firm’s business systems and their sharing of information with group members, as well as the impacts of business systems leveraging (BSL) on information sharing and supply chain performance. Simultaneously, the moderating effects of uncertainty and the degree of process innovation on the relationship between BSL and supply chain performance are also estimated. The analytical results indicated that proactive technological orientation, information technology (IT) connectivity, supply chain member pressure, and member relationship quality encourage firms to combine their business systems with those of other business partners. Interestingly, in a situation where there is high demand and an uncertain supply, the impact of BSL on supply chain performance is low, while the moderating effect of process innovation on the relationship between BSL and supply chain performance is significant. Finally, it is suggested that firms implementing BSL work to upgrade their technology maintain tight relationships with supply chain partners and create innovation in all aspects of their business processes in order to survive in the highly competitive IT environment.  相似文献   

12.
系统分析和总结了数字地球、空间信息服务模式、G/S模式的特点,设计了空间信息服务模式的理论模型,定义了G/S模式下面向服务的软件架构,设计了HGML文档共享子系统,并对G/S模式下面向服务的系统应用前景进行了展望。  相似文献   

13.
作为未来对于物体的识别技术,射频识别在人们生活中占有越来越重要的地位.这项技术将不断深入社会生活,在人们周围无处不在.由于这项技术的广泛应用,它的安全性以及涉及到个人生活的隐私问题不得不引起各界的关注.最初考虑到读卡器和标签之间通讯的可视性以及因特网络潜在的诸多攻击,研究者主要针对读卡器和后端数据库的通讯安全问题,做出了很多的工作.随着UHF标签的推行,读卡器和射频标签通讯范围增大,它们之间的通讯不再安全.本文针对读卡器和标签之间通讯中可能受到的攻击进行分析,建立了一个保证它们通讯安全的模型,依据该模型对EPC Class1 Gen2(EPC C1G2)协议进行分析,指出了协议可能受到的攻击,并提出了具有身份验证功能的协议修改方案.  相似文献   

14.
海量的物联网数据拥有巨大价值,而现有基于云的数据共享机制,面临单点故障、内部泄露等问题,无法确保用户数据的安全共享。为实现高效可信的数据共享,利用区块链技术,提出了基于区块链的5G物联网数据共享方案。该方案首先设计了数据共享框架和数据共享流程;然后基于闪电网络方案,提出了面向物联网数据共享的链下交易机制。实验分析表明,基于区块链的5G物联网数据共享方案具有较强的抗攻击能力;基于闪电网络的交易机制,能够大幅提高交易吞吐量、降低交易时延。  相似文献   

15.
The purpose of this research is to explain the information-sharing process and investigate the intrinsic and extrinsic motivations that may induce information sharing on Facebook. Using the theory of planned behaviour, this research distinguishes between information-sharing intention and information-sharing behaviour. Based on self-determination theory, this research selects the extrinsic and intrinsic motivations that influence intention. Based on a survey of 233 South Korean Facebook users in their 20s and 30s, this research applies a structural equation modelling approach to develop the research model. All the intrinsic motivations are found to have a significant positive influence on information sharing about products and services. However, among the extrinsic motivations, only expected reciprocal relationship is found to have a significant positive influence on information-sharing intention. This research approaches Facebook empirically from a marketing perspective and suggests a strategic direction for marketers and Facebook managers.  相似文献   

16.
An increasing number of enterprise applications are intensive in their consumption of IT but are infrequently used. Consequently, either organizations host an oversized IT infrastructure or they are incapable of realizing the benefits of new applications. A solution to the challenge is provided by the large‐scale computing infrastructures of clouds and grids, which allow resources to be shared. A major challenge is the development of mechanisms that allow efficient sharing of IT resources. Market mechanisms are promising, but there is a lack of research in scalable market mechanisms. We extend the multi‐attribute combinatorial exchange mechanism with greedy heuristics to address the scalability challenge. The evaluation shows a trade‐off between efficiency and scalability. There is no statistical evidence for an influence on the incentive properties of the market mechanism. This is an encouraging result as theory predicts heuristics to ruin the mechanism's incentive properties. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

17.
A supply chain consists of disparate but inter-dependent members who are dependent on each other to manage various resources (such as inventory, money and information). The conflicting objectives and lack of coordination between these members may often cause uncertainties in supply and demand. Coordination may help in managing inter-dependencies and reducing uncertainties. Typically, a mechanism is required to streamline the whole supply chain and motivate all the members to be a part of the entire supply chain for sharing risks and rewards through supply chain contracts.The objective of this paper is to explore the applicability and benefits of the contracts. A two-phase framework is proposed consisting of a decision support tool and a graph-theoretic model for evaluation of coordination in a two-level supply chain. In Phase I, an analytical model is proposed based on the classical newsboy problem. Various contract mechanisms have been explored through a decision support tool based on the simulation. The effectiveness of these contracts is evaluated through a graph-theoretic model in Phase II. It is expected that by designing the contracts as per the requirements of the supply chain members as well as the whole supply chain, supply chain performance may be improved.  相似文献   

18.
Actual realisation of business-to-business electronic commerce (B2B e-commerce) benefits from IT investments has been a critical issue for large organisations. However, relatively little research has been undertaken to determine the drivers for realising B2B e-commerce benefits within these organisations. A survey research was conducted to examine the relationships between B2B e-commerce benefits, IT investment evaluation methodologies (IEM), IT benefit realisation processes (BRP), B2B e-commerce adoption readiness, and IT maturity in large Australian organisations. An IT investment management model was developed to test these relationships. The results had empirically validated the model and indicate that a higher level of BRP adoption and increased level of B2B e-commerce adoption readiness had a significant direct relationship with B2B e-commerce benefits. In addition, the level of B2B e-commerce adoption readiness, and the level of IEM and BRP adoption were significantly influenced by the level of IT maturity. However, the use of IEM alone had only an indirect positive influence on B2B e-commerce benefits through the higher level of BRP adoption and increased level of B2B e-commerce adoption readiness.  相似文献   

19.
《Information & Management》2005,42(7):947-964
The evaluation of information technology (IT) is fraught with misconception and there is a lack of understanding of appropriate IT evaluation methods and techniques. The benefits, costs and risks of IT need to be identified, managed, and controlled if businesses are to derive value from their investments. This paper presents findings from an exploratory study that used a questionnaire survey to determine the benefits, costs and risks of IT investments from 130 small-to-medium-sized enterprises (SMEs) in Australia. The analysis revealed that organizations from different industry sectors significantly differ in the amount they invest in IT but that firm size (in terms of turnover and number of employees) does not influence IT investment levels. Second, strategic benefits vary across different industry sectors. Third, the way employees adapt to change as a result of IT implementation depends on the size of the organization. Based upon the findings, a series of benchmark metrics for benefits, costs, and risks of IT are presented. It is posited that these can serve as a reference point for initiating a quality evaluation cycle in which benchmarking forms an integral component of the strategic process.  相似文献   

20.
设备到设备(D2D)数据共享已经成为一种很有前途的卸载蜂窝网络流量的解决方案,但数据共享伙伴的隐私脆弱性和服务不稳定性影响着共享服务的质量。针对这个问题,提出一种基于隐私度和稳定度的D2D数据共享伙伴选择机制(PSUS)。首先对提供者的隐私信息进行抽象和概括,根据提供者的隐私偏好和历史共享记录构建隐私度量的方法,得出提供者在不同共享服务中的隐私度;然后基于隐私度来设计数据共享过程,提供者在隐私偏好约束下缓存数据并在隐私度低的时候参与共享服务以满足提供者的隐私要求;最后在已满足隐私要求的提供者的基础上,设计一种多指标评价法来评估提供者的服务稳定性以选择稳定的共享伙伴。通过性能分析,证明所提机制的可行性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号