首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Cross-sector competition in the information and communications technology sectors (ICT sectors) constitutes a key strategic challenge for telecommunications companies. Due to increasing convergence, value creation is resulting in a greater degree of interaction. The diversification potential of telecommunications businesses is therefore changing with respect to associated ICT sectors, such as hardware, software and media. The article analyses cross-sector competition in the telecommunications industry on the basis of the diversification activities of ICT companies. A concentration of competitive interdependence in the ICT sectors is demonstrated using a cluster analysis of 34,142 companies. The cross-sector activities of telecommunications companies are investigated using contingency and dependency analyses, and the diversification-related competition in the telecommunications sector is also analyzed. With regard to the telecommunications sector, particularly high level cross-sector competition with the media industry is identified, as well as strong diversification activities in the software sector. The results are used to derive the potentials and risks that have a significant bearing on the structure of the cross-sector competitive environment of telecommunications companies.  相似文献   

2.
随着信息技术的发展,"大数据"在技术领域掀起了一股热潮,在各个领域发挥着巨大的作用力。"大数据"规模日益增长,其所面临的一边是机遇,一边是挑战。目前,国家与各企业以及个人隐私的保护出现的严重安全问题令人堪忧。文章针对我国当前信息安全面临的问题、如何更好地通过信息技术国产化与解决信息安全问题提出思考,并究其问题探讨我国信息安全与技术应用的策略。  相似文献   

3.
This article investigates the influence of information and communication technology (ICT) on business transformation. First, the general, ICT-driven development lines of globalization and service-orientation are described. Then, an analysis of the IBM Corporation’s transformation over the past 50 years into a globally integrated, service-oriented company illustrates that ICT innovations must be dealt with by simultaneous adaptation of business model, organization and corporate culture. For many companies the ability to manage this change becomes increasingly critical.  相似文献   

4.
In the current information society, the need for securing human resources acquired with ICT competency is becoming a very important issue. In USA, England, Japan, India and Israel improving students’ ICT competency has become a pedagogical issue. Accordingly, education on ICT competency is changing in many countries emphasizing the basis of computer science. The Korean government revised the ICT curriculum of 2001 focused on the basic concepts and principles of computer science as educational policy in 2005. However, it is still difficult to determine a student’s ICT competency level and the outcome of ICT curriculum based on changed direction. Thereupon, this study has developed test tool for measuring the level of Korean elementary school students’ ICT competency based on computer science. In this study, ‘Content’ and ‘Information processing’ are established as the two axes of the test frame standard through literature research, consideration and discussion. The validity and reliability of questions are verified though the preliminary test and the main test tool has completed through question revisions considering the distribution of answers. About 40,000 students, roughly 1% of the total elementary school students, are selected for the main test. There were several findings made in this study. Korea’s elementary school students have a weakness in ‘algorithm and modeling’. Information processing stage has been found to vary by grade. A modified ‘Angoff method’ is used to confirm the spread of the ICT competency levels of the target students. From the results, the cutoff score employed to divide the subjects into three levels, excellent, average and below average, the ratio of excellent levels decreases and the ratio of below average increases in higher grades. To solve these problems, we need to emphasize algorithmic thinking oriented more principal of computer science in ICT curriculum. For more effective ICT elementary education, teaching and learning strategies appropriate for young children to teach computer science should be introduced.  相似文献   

5.
The Fourth Industrial Revolution has become a global buzz word since the World Economic Forum (WEF) adopted it as an annual issue in 2016. It is represented by hyper automation and hyper connectivity based on artificial intelligence (AI), big data, robotics, and Internet of things (IoT). AI, big data, and robotics can contribute to developing hyper automation that can increase productivity and intensify industrial production. Particularly, robots using AI can make decision by themselves as human being on complicated processes. Along with the hyper automation, the hyper connectivity increases not only at national, but also global level by using information and communication technologies (ICT). IoT is the core technology to create the hyper connectivity in Cyber Physical System (CPS) that connects technology, nature, and human being. Accordingly, a perfect convergence between ICT and manufacturing can be completed in the Fourth Industrial Revolution era and an extremely efficient flexible production system by spreading IoT in CPS will be established. Under such a condition, innovative clusters must play their traditional roles in cradles of technology innovation and commercialization. It must be difficult challenges for innovative clusters to meet their targets and to be adjusted by the changing new environment at the same time. This paper argues how the Fourth Industrial Revolution can change the global production chain and how core technologies function in industries. Furthermore, it focuses on how innovative clusters have to evolve to respond the Fourth Industrial Revolution. Last, but not least it also analyzes whether or not innovative clusters can play their roles as technology innovation hubs in the real world and CPS in the Fourth Industrial Revolution era.  相似文献   

6.
赖建华  张可同  陈雨婕 《软件》2020,(3):114-117
网络安全等级保护标准是顺应信息化发展而发布,更是符合新时期下的网络安全的需求。信息化发展导致医院等医疗机构系统边界越来越广,行业面临的病毒、木马及数据泄露严重安全威胁并没得到有效控制,各医院的安全建设必将会按照网络安全等级保护的要求来严格推进。网络安全等级保护2.0大时代下,医疗机构可以"安全可控、安全可管、持续防护"为安全总体架构建设思想,抵御不断增加的网络攻击行为。  相似文献   

7.
In this paper, we present a research framework with data envelopment analysis (DEA) approach to evaluate a nation’s technology efficiency and effectiveness in ASEAN countries. The study proposes two outputs, patents and licenses (PL) and technology exports (TE) along with three inputs, information and communication technology (ICT), R&D (RD), and governance capability (GC) in the model. Building on evidence from our research, we found that country has better outcome in PL can be derived from better application in ICT which in terms of TE to RD and GC as well. Additional findings also revealed the variable of ICT is mainly advantageous to technology efficiency in ASEAN countries. Further, from the viewpoint of country, our results indicate both Singapore and the Philippines are the most efficient countries among the variables in technology efficiency, scale efficiency, and window analysis as well. Moreover, our findings suggested some other countries may explore the suitable strategy to enhance their technology efficiency with benchmarking countries.  相似文献   

8.
信息技术的不断发展,越来越多的企业开始用信息系统武装自己,以信息系统为工具,IT技术应用为手段,提升企业的竞争力已经成为大多企业的共识。为促进信息系统在企业中的成功实施及有效应用,不可避免的要对信息系统进行二次开发。信息系统的二次开发应慎重推行,需要企业领导、软件提供商、企业内部人员给予足够重视;所有的二次开发必须有严格的审核流程与详细的文档记录。只有这样,才能确保二次开发成为挖掘信息系统潜力的手段,促使企业得到更多的实惠。  相似文献   

9.
The areas of physical security and information technology (IT) are often if not usually worlds apart. The same is true for physical security and IT security; in most organizations separate functions for physical security and IT security exist. Because these functions are in place and because they at least in part achieve their goals, management tends to perceive that major risks they try to mitigate are being addressed. Convergent security risks in physical security systems and information technology (IT) are, however, almost without exception overlooked. Physical security systems and devices, process control systems, and IT infrastructures are being integrated without sufficient consideration of the security risks that the increasing intermingling of these systems and infrastructures introduces. Serious security-related incidents due to unmitigated physical convergence risks are starting to occur. Adequately dealing with the convergence problem requires organizations to implement multiple solutions.  相似文献   

10.
Organizations that are capable of pursuing exploration and exploitative innovation strategies simultaneously have demonstrated superior performance. For information and communication technology (ICT) firms, it is especially critical to achieve such organizational ambidexterity in order to both allocate limited resources and pursue different innovation strategies appropriately. As the ICT industry in China faces higher environmental uncertainty, a less developed institutional framework, and increased power of market competition, we explore the antecedents of ambidexterity conjointly, considering the effects of institutions and organizational capabilities. Building on ambidexterity literature, we develop a capability-building framework to explore firms’ strategic choice-making between exploratory innovation strategy versus exploitation innovation strategy, and their orientation to pursuit one, or both. With survey data from China’s ICT industry, we find that ties with government promote an ambidextrous focus on both types of innovation strategies. In addition, we find that strategic capability partially mediates the main effects of ties with government on both exploratory and exploitative innovation strategies. Implications for organizational ambidexterity in China’s ICT industry are discussed.  相似文献   

11.
As the phenomenon of convergence in the field of information and communication technology (ICT) and services is accelerated with the development of science and technology, the ecosystem of the ICT industry is gradually evolving into an open ecosystem. This study analyzes the strategic alliance mechanism in the ICT industry, taking the view that active strategic alliances should be pursued for co-evolution between the companies in an open ecosystem. Based on previous studies and expert opinions, the objectives of a strategic alliance are classified into main evaluation categories such as strategy-oriented, cost-oriented, resource-oriented and learning-oriented, and the detailed subcategories are presented. Through an analysis of the ecosystem of the ICT industry, multimedia contents (production, distribution), platform (cloud computing, mobile cloud computing), network (wired network, wireless network), device (home electronics, mobile) are identified as the agents to be analyzed. By applying the analytic network process (ANP) based on the above, the priority of the objectives of strategic alliances in the ICT industry is determined by the agent. This study is expected to promote the development of a business model and co-opetition between the companies to create sustainable competitive advantages in the future open ecosystem, and to contribute to the creation of corporate and national profits.  相似文献   

12.
Abstract. Companies are leveraging existing resources and the internet to come up with new or modified business models to respond to the demands of e‐business. Companies in the food processing industry are also waking to the reality that e‐business technology can make a big difference to the bottom line. This paper presents the result of an action research project which applied a new approach labelled as the Delta Model developed by Hax and Wilde (2001) of Sloan School of Management to strategy development for brick‐n‐mortar companies launching e‐business initiatives. The case company is called Whetstone Food Ingredients (WFI), located in UK. The company is firmly embedded in the agri‐product industry and operates in the ‘egg by‐product’ subsector. This paper is based upon action research supplemented by a programme of in‐depth interviews with managers at WFI for various aspects of their supply chain and e‐business initiatives. On the basis of these interviews and the companies also made a range of documents available throughout. These included internal memos, strategy plans, operational control documents and minutes of meetings. The Delta Model and Davenport's methodology of business process reengineering were adopted to structure this analysis. Used in conjunction, they helped to develop a vision, analyse the business processes, identify critical business processes, benchmark the critical processes, and then develop the information technology infrastructure. The infrastructure thus supported the critical business processes and leveraged the e‐business supply chain to enable the company to gain competitive edge.  相似文献   

13.
In this paper, we present the notion of discovery paths stemming from our study of the M&A between Grupo Santander (GS) and Abbey (2004–2009), in which the resulting synergies after the merger were 35% better than expected. In fact, GS achieved a unique level of efficiency in 2012 in the banking industry, which we consider a sign of radical novelty. During the M&A, the GS management decided to apply its customer-centric model through the transfer of the information and communication technology (ICT) platform Partenón. This unusual decision led to the endogenisation of critical ICT functions to scale up this model to Abbey. In the paper, we argue that while some steps that lead to synergies can be planned in advance, other essential variations are only learned and discovered during the M&A process itself, thus leading to emergent synergies. In the model presented, a discovery path explains the firm’s evolution by sets of variations in the strategic interaction between the organisation and technology. These variations led to new design principles resulting from problem solving and modularity, which in turn led to (1) economies of scale and scope, (2) hybrid structures combining ICT and organisational knowledge domains that generate efficiency through fast integrations, and (3) organisational morphogenesis – that is, the creation of new organs such as ICT factories – which generates efficiency by avoiding diseconomies of scale by encapsulating the inherent complexity of technology and provides increasing returns.  相似文献   

14.
Both global and local: ICTs and joint ventures in China   总被引:1,自引:1,他引:0  
Abstract. The expansion of global firms, supported by extensive information and communication technology (ICT) systems, is frequently seen as leading to the spread of best practices to different regions of the world. Some argue that these practices are bound up with the national origins of these firms, while others propose that local circumstances in specific economies are of prime importance. According to the first perspective, global firms will use ICTs in China that reflect their national origins, but the second approach emphasizes the importance of the Chinese local context in how and what ICTs are used. Based on evidence from two case studies of global UK multinationals with Chinese joint ventures, this paper argues that the ICTs used by these companies do relate to their national roots and that China is seen by them as a very unusual setting that is treated as a special case. For example, one company was prepared to roll out a global enterprise planning system elsewhere but refused to implement it in China, while the second company cordoned off their ICT systems in China from their other, more global systems. Cultural frames of reference are advanced as an important explanation of differences in the usage of ICTs in China. Building on these ideas, this paper argues that how difference is recognized, accommodated and (re)affirmed is significant for the performance of formal business processes. Formal and ICT‐enabled systems ‘work’ by being embedded in changing Chinese cultural practices such as guanxi, though this is frequently not recognized by Western managers. While the global nature of global firms may be overplayed, the local arrangements of joint ventures are very important in how ICT systems are implemented in which the embedding and disembedding require an understanding of sited cultural practices that underpin the performance of formal systems. What is at stake is how global firms and their ICT systems are able to adapt to Chinese circumstances, and, in the longer term, how Chinese joint venture partners, often previously state‐owned enterprises, adapt to different forms of control mediated by ICTs.  相似文献   

15.
身份认证技术是能够对信息收发方进行真实身份鉴别的技术,是识别,验证网络信息系统中用户身份的合法性和真实性,按授权访问系统资源,并将非法访问者拒之门外。本文论述了信息安全领域中身份认证技术的现状及发展趋势,对于进一步做好该工作具有一定的理论指导意义。  相似文献   

16.
Nowadays information and communication security has recently emerged as one of the most important tasks in the field of network management, operations and maintenance. The information security issue is of particular importance to the Taiwan Academic Network, a network which connects the networks of educational and research institutions in Taiwan. ICT environment in educational systems involves vast connected units and is featuring complexity, diversity and openness. In this paper, we investigate current situation of Taiwan Ministry of Education ICT security development and provide a case study. We also discussed challenges and solutions for improving ICT security environment in educational system.  相似文献   

17.
近年来,电脑网络技术发展迅猛。对于有多个办公地点、营业场所的公司来说。对办公、营业网络可靠性的要求越来越高。随着公司规模的扩展,公司网络会急速膨胀.末端也会进一步细化。由于末端数量越来越多,而末端实际操作人员,往往不具备简单电脑及网络的常识.因此末端的维护压力会越来越大,如果每个故障都现场处理.无论时于人力、物力都会造成极大的需求,时于公司的成本控制不利。出于此目的。根据实际工作中的故障事例,试提出一些远程查找故障、解决故障的方法。  相似文献   

18.
随着信息技术的不断发展,各大公司都通过完善的会议室管理系统来削减人力和物力的消耗,增添会议室的 服务项目,提升会议室的服务层次,缩小管理上的纰漏。本设计基于J2EE平台提供的JSP、Servlet 等技术,使用MySQL数据库 来实现会议室管理系统。系统简单,操作容易,界面简洁,功能完备,对企业的信息化管理起到一定促进的作用。  相似文献   

19.
Emerging technologies are playing an important role in establishing competitive advantage for technology based companies. Selecting an efficient and important emerging technology to invest in is significant to the companies also. In this study, we propose a method for selecting optimal emerging technology which is efficient, important and the most suitable to a company’s actual levels of input resource among various emerging technology alternatives. In order to select optimal emerging technology, the proposed method uses two-level-SOM to cluster the emerging technology alternatives based on alternatives’ required levels of input resource. For selecting efficient and important promising emerging technology, the proposed method calculates emerging technology alternatives’ efficiency score by using AHP/DEA-AR and their importance score by using AHP rating method in each technology cluster generated by two-level-SOM. Finally, the proposed method selects optimal promising emerging technology according to a company’s actual levels of input resource and each emerging technology alternative’s combined scores which is calculated by adding its efficiency score and importance score. A Korean company’s case of selecting optimal promising nanotechnology is employed to illustrate the proposed method. The result shows that the proposed method can provide an effective and reasonable selection of optimal promising emerging technology.  相似文献   

20.
When two competitive companies merge into one bigger company, reusing existing technical resources in each company to form a common technology becomes a priority integration task. One of the specific problems occurring during integration is the resulting integrated scopes' requirements specifications become faulty while integrating two sets of software systems from two participating companies. The integrated scopes refer to the domains of information software systems, business policies, business processes, business rules, interface functions, and data that are being integrated in each participating company.Using a Transition-Directed Graph (TDG) representation, specified requirements involved in the integration will be represented in a form of TDG to be analyzed for faults. Five efficient algorithms are developed to identify faults in the resulting TDG formatted requirement specifications. Four correction algorithms are also developed to correct detected faults found in the TDG formatted requirements specifications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号