首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A presentation of planned certification organization in France is made. This organization takes into account the European frame as well as tendencies in other countries of the world. Differentiation is made between certification and validation and different schemes give the mechanisms of processes.  相似文献   

2.
Software certification can well be a problem when the products to be certified are:
1. i) implemented differently by different manufacturers;
2. ii) only functionally equivalent for a subset of their outputs;
3. iii) validated by a single, public institution.

The paper presents a case of this type and describes the efforts made by the working group responsible for performing the validation task.  相似文献   


3.
Although similar to firms in other industries that strive to increase their operational efficiency by implementing IT/IS, hospitals face difficulties in obtaining the corresponding benefits of investing in IT/IS. This study investigates the relations among IT/IS performance, IT maturity, IT/IS assessment, IT/IS resource allocation, and user satisfaction in hospitals. IT/IS performance in hospitals is evaluated using a designed questionnaire, along with a case study undertaken to discuss IT/IS assessment and the effect of IT/IS on hospital procedures. The analysis results indicate that hospitals have a higher IT maturity, stronger intention to implement IT/IS assessment, and better IT/IS resource allocation capabilities than firms in other industries. Moreover, both IT/IS assessment and user satisfaction affect IT/IS performance in hospitals.  相似文献   

4.
IT/Business Alignment IT/Business Alignment has become a key issue for many companies. Therefore a lot of companies, institutions and universities have published documents about this topic. This paper is intended to give an overview of these resources found in the Internet.
  相似文献   

5.
CSCW标准框架的分析   总被引:2,自引:2,他引:0  
该文讨论了描述CSCW中标准的框架。这个框架是基于协同工作的用户/开发者观点的,并且按GSCW系统的一般方面构成。它包括了合法的和事实上的标准,以及参考信息。希望文章对CSCW的开发者有所启发,并对标准的分析有所帮助。  相似文献   

6.
J. G. P. Barnes 《Software》1980,10(9):707-719
This paper describes the problems encountered during the standardization of RTL/2. It is presented as an object lesson to illustrate the care needed when first defining a programming language to ensure that the loopholes are few. As well as describing the minor alterations made to the definition of RTL/2, this paper serves as a historical record of some of the other possible changes which were considered and rejected.  相似文献   

7.
This article describes a framework of IT user culture that has implications for organizational IT strategy. The research was conducted in multiple settings with a grounded theory approach. The resulting framework is anchored to nine archetypal IT user profiles and encompasses their inter-group dynamics. By adopting a cultural perspective on IT usage, the framework can inform IT adoption and usage strategy with possible cultural antecedents and determinants of usage constructs common in IS research. The proposed framework suggests how management can influence the migration of IT user culture (culture creep). This framework can also enrich other acceptance models in order to more fully consider the human factor during IT implementation and adoption. The results underscore the importance of culture-customizing organizational IT socialization, training and evolution programs.  相似文献   

8.
We drew on institutional and learning theories to develop a research model assessing how organizations influence standards deployment and integration by creating institutional pressures and learning opportunities. We also examined how standards deployment and integration differentially influenced operational and strategic benefits. Survey data was collected from organizations in China who have implemented RosettaNet. Overall, the study extended research on standards adoption by examining how the learning perspective complemented institutional pressures, generating an integrated view of how pressures and learning from other organizations influence standards deployment and integration as important dimensions of standards use, as well as the benefits arising from their use.  相似文献   

9.
一种基于主色外观图的彩色图像分割算法   总被引:1,自引:0,他引:1  
在对三维传统的颜色直方图(CCH)作出了一系列改进的基础上,提出了一种基于主色外观图(DCG)的新的彩色图像分割方法.首先根据改进后的颜色直方图确立彩色图像的近似主色成分,然后再利用CIE-1976色差公式分别计算出其每个像素与主色之间的距离,并据此建立相应图像的颜色距离直方图(CDH),它精确地反映了图像像素与参考色之间的色彩相似度.为了证实CDH在彩色图像分割中的效用性,又通过进一步地扩展得到了CDH集,或可称为主色外观图.实验结果表明,就精确性、鲁棒性和计算的复杂度而言,基于DCG的分割方法能够得到比传统阈值法和聚类法更好的分割效果.  相似文献   

10.
PKI/CA技术作为信息安全建设的基石,在电子政务安全体系建设中起着关键性的作用。通过分析认证体系的构成、发展现状和存在的问题,结合我国电子政务发展特色和趋势,提出了建设高效、安全的电子政务认证体系的建议,为我国电子政务安全建设提供了积极的参考作用。  相似文献   

11.
论述了基于Intranet/Internet信息系统的基本体系结构、Web开发技术、数据库访问技术和信息系统的网络安全,结合实例介绍了系统开发过程中的关键技术问题及其处理方法。  相似文献   

12.
美国速记员资格认证分为各个地方州认证和联邦政府认证,要求严格,规定详细,突出了速记工作的重要性和速记员职责的特别性。美国速记的历史源远流长,对中国的影响也很深远。了解和学习美国的速记工作有助于中国速记的发展,更好为现代化建设服务。  相似文献   

13.
基于PKI的CA平台研究与设计   总被引:2,自引:0,他引:2  
公钥认证体系已经逐渐成为网络安全系统的主流。长课题设计了一个基于PKI的校园网络安全系统平台,系统所使用的证书格式符合ITU-T的X.509标准,CA证书的请求和发布使用PKCS标准。  相似文献   

14.
Information technology (IT) platform migration incurs a great deal of risk because of the massive rewriting of legacy systems and a wide range of new technology adoptions. Therefore IT platform decisions need to be made in a mindful manner because of the high degree of investment risk. However, more aggressive migrations, compared to the global trend, to an open system have been observed in Korean organizations. This phenomenon defies the common understanding of IT investment risk and encourages the investigation of the elusive characteristics underlying IT investment decisions. The effect of IT decision-makers’ perceptions and risk propensity on their IT platform migration decisions is examined in the context of risky decisions. In addition to risk perception, decision-makers’ risk propensity also has a significant effect on IT investment decisions. By observing the monarchical IT governance and IT-biased careers of decision-makers, some implications of large-scale IT investment decisions are derived.  相似文献   

15.
The value of information technology (IT) to modern organizations is almost undeniable. However, the determination of that value has been elusive in research and practice. We used a process-oriented research model developed using two streams of IT research to examine the value of IT in business organizations. One stream is characterized by examining how IT and non-IT variables affect other so-called IT success variables. The second stream is commonly referred to as IT business value, defined as the contribution of IT to firm performance. The resulting research model is referred to in our paper as the IT business success model. Data was collected from 225 top IS executives in fairly large organizations to empirically examine several hypotheses derived from theory concerning the causal nature of the IT business success model. A set of measures for the IT business success model was developed through an intense investigation of the IT literature. The measures were tested for validity and reliability using confirmatory factor analysis. The hypotheses that resulted from past research and conceptually illustrated in the research model were assessed using structural equation analysis. The implications of these findings and the limitations of the study are discussed in an effort to contribute to building a process-oriented theory base for IT business success at the organizational level of analysis.  相似文献   

16.
人事档案信息管理系统的设计与实现   总被引:1,自引:1,他引:0  
介绍了系统的开发工具及运行环境,阐述了系统的分析及设计过程,详细介绍了系统的开发实现过程,并对系统主要功能模块的实现过程做了论述,同时对于系统开发过程中所涉及的关键技术也进行了分析与研究。  相似文献   

17.
The purpose of this study is to identify the IT governance mechanisms that are used at different levels of IT dependence (defensive or offensive IT modes) and to compare the degree of their use between these IT modes. The results of a survey suggest that the degree of use of IT governance mechanisms varies by IT mode, and it is greater when a firm is in offensive versus defensive IT mode.  相似文献   

18.
Abstract

The purpose of this paper is to present a hierarchy of progressive IT maturity using Maslow's Hierarchy of Needs as a metaphor for articulating the increasing value that can be derived by the application of Information Technology within competitive organizations. The authors refer to this maturity model as the IT Value Hierarchy. Each level of the IT Value Hierarchy is described using examples and comparisons to Maslow's Hierarchy. The model can be used by IT executives as a framework for better explaining and discussing the value of increasingly sophisticated Information Technology use within the enterprise.  相似文献   

19.
The purpose of this paper is to present a hierarchy of progressive IT maturity using Maslow's Hierarchy of Needs as a metaphor for articulating the increasing value that can be derived by the application of Information Technology within competitive organizations. The authors refer to this maturity model as the IT Value Hierarchy. Each level of the IT Value Hierarchy is described using examples and comparisons to Maslow's Hierarchy. The model can be used by IT executives as a framework for better explaining and discussing the value of increasingly sophisticated Information Technology use within the enterprise.  相似文献   

20.
安全性是移动自组网络的基本需求,该文深入分析了移动自组网络基于门限机制的证书服务技术,提出了基于零知识证明的部分证书鉴别算法,有效地提高了证书服务的可用性。基于Windows平台的模拟试验验证了部分证书鉴别算法的作用。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号