首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
The tremendous growth in technology is also causing global warming due to harmful greenhouse gas emissions. The Information and Communication Technology (ICT) sector is one of the fastest growing, having the greatest impact on almost every other technology. Energy efficiency and reduction in global warming is now a desire and realization by all key players associated with this technology. Not only there is scope for energy efficiency in ICTs itself but it can also help other sectors in becoming smart i.e., energy efficient. Smart buildings, smart motors, smart logistics and smart grids are being realized with the incorporation of information and communication technologies. The ICT industry is equally aware of the potential benefits of renewable energy sources (RES) in making the future systems greener and sustainable. This is quite evident from the research that is going on towards sustainable ICT solutions, as reviewed in this paper. Not only renewable energy is applicable to large scale applications like telecom base stations (BS), it is also applicable to small and medium scale systems and devices like computer peripherals and electric vehicles. In order to explore the evident potential of RES, all aspects of renewable energy are being addressed by the researchers. These aspects can broadly be categorized as generation, distribution, management and most significantly application of renewable energy. This paper takes a broader look at both aspects in which ICTs are making our world eco-sustainable i.e., making other technologies smarter and incorporating renewable energy sources wherever possible.  相似文献   

2.
This study aims at exploring how information and communications technology (ICT) is accessed and used by women and men in Rwanda. Specifically, we analyze the factors that contribute to the gender digital divide in Rwanda. In addition, we assess the importance of equal access to ICTs between genders. Rwanda is a particulary interesting case study, since previous studies on gender differences in the usage and accessibility of ICTs have focused on Western countries, while Africa, and Rwanda in particular, have been less covered. The qualitative method of in-depth interviews was used to collect the data. Interviews were analyzed using a thematic analysis technique. The findings of this study reveal that a gender digital divide still exists in Rwanda, even though the government puts forth much effort to eradicate this phenomenon. Reasons for barriers for women’s access to ICTs were found in social, economic and cultural factors, such as feelings of lack of self-worth, self-confidence, and proper educations; heavy domestic responsibilities; and computer anxiety. The findings also indicated that equal access to ICTs would be a shortcut to economic growth in Rwanda. This study concludes that Rwandan women need to be better educated in the use of computer technologies. Certain gender-sensitive strategies that guide the use of ICTs in this way also need to be established.  相似文献   

3.
The smart grid is an electronically controlled electrical grid that connects power generation, transmission, distribution, and consumers using information communication technologies. One of the key characteristics of the smart grid is its support for bi-directional information flow between the consumer of electricity and the utility provider. This two-way interaction allows electricity to be generated in real-time based on consumers’ demands and power requests. As a result, consumer privacy becomes an important concern when collecting energy usage data with the deployment and adoption of smart grid technologies. To protect such sensitive information it is imperative that privacy protection mechanisms be used to protect the privacy of smart grid users. We present an analysis of recently proposed smart grid privacy solutions and identify their strengths and weaknesses in terms of their implementation complexity, efficiency, robustness, and simplicity.  相似文献   

4.
With the rapid development of information and communication technologies (ICTs), the conventional electrical grid is evolving towards an intelligent smart grid. Due to the complexity, how to protect the security of smart grid environments still remains a practical challenge. Currently, collaborative intrusion detection systems (CIDSs) are one important solution to help identify various security threats, through allowing various IDS nodes to exchange data and information. However, with the increasing adoption of ICT in smart grid, cloud computing is often deployed in order to reduce the storage burden locally. However, due to the distance between grid and cloud, it is critical for smart grid to ensure the timely response to any accidents. In this work, we review existing collaborative detection mechanisms and introduce a fog-based CIDS framework to enhance the detection efficiency. The results show that our approach can improved the detection efficiency by around 21% to 45% based on the concrete attacking scenarios.  相似文献   

5.
针对多个智能电表实时采集数据聚合上传过程中所存在的用户隐私泄露和计算效率不高的问题,提出了一个基于同态加密的智能电表数据聚合方案。该聚合方案使得多个智能电表数据能够聚合传输至电力系统,而电力系统却无法得到单个智能电表的用电数据。仿真结果表明,该方案在智能电表侧和聚合器侧均可有效降低计算成本和通信成本。  相似文献   

6.
To effectively utilize artificial intelligence (AI)-based technologies such as ChatGPT and realize their novel ethical issues, individuals must have a variety of knowledge and skills about AI. Such knowledge and skills have led to the emergence of AI literacy. Despite the importance of AI literacy in everyday life, little is known about its determinants. To better understand the determinants of AI literacy, we attempted to build a research model relying on previous research and different theoretical frameworks. The model incorporated digital divide, cognitive absorption, and computational thinking. As a major finding from the current study, computational thinking was found to be a significant determinant of AI literacy, which facilitate using, recognizing, and evaluating AI-based technologies. Moreover, we found out that individuals with physical access to information and communication technologies (ICTs) are more expected to use and recognize AI. Also, motivation and skills in using ICTs enable individuals to better evaluate the outcomes of AI-based technologies. The findings also showed that convenient access to ICTs contributes to a deep involvement with AI-based technologies in the use. Further, individuals with higher motivation and skills to use AI technologies are likely to have a pleasant experience after using these technologies.  相似文献   

7.
在商业化应用中,用户在信息共享中不能制定细粒度的访问控制,并且可能造成隐私泄露。为了解决此问题,提出了将KACA和CP-ABE算法相结合的方法来构造信息共享的隐私保护方案,实现以用户为中心的避免敏感信息泄露及可控的信息共享方案,并对方案进行了验证分析,证明了方案的可行性。  相似文献   

8.
With fast advancements of communication, systems and information technologies, a smart grid (SG) could bring much convenience to users because it could provide a reliable and efficient energy service. The data aggregation (DA) scheme for the SG plays an important role in evaluating information about current energy usage. To achieve the goal of preserving users’ privacy, many DA schemes for the SG have been proposed in last decade. However, how to withstand attacks of internal adversaries is not considered in those schemes. To enhance preservation of privacy, Fan et al. proposed a DA scheme for the SG against internal adversaries. In Fan et al.’s DA scheme, blinding factors are used in evaluating information about current energy usage and the aggregator cannot get the consumption information of any individual user. Fan et al. demonstrated that their scheme was secure against various attacks. However, we find that their scheme suffers from the key leakage problem, i.e., the adversary could extract the user’s private key through the public information. To overcome such serious weakness, this paper proposes an efficient and privacy-preserving DA scheme for the SG against internal attacks. Analysis shows that the proposed DA scheme not only overcome the key leakage problem in Fan et al.’s DA scheme, but also has better performance.  相似文献   

9.
This study explores the relationship between the use of information and communication technologies (ICTs) and assessments of workers' knowledge and abilities in 2 knowledge‐intensive organizations. Drawing on expectation states theory, the article argues that a worker's communication through mundane, widely diffused ICTs may lead to status assessments from colleagues that are different than when he or she communicates through novel ICTs. Data from interviews and observations at both organizations revealed that mundane ICT use influenced assessments about the general level of proficiency of workers, and use of novel ICTs influenced assessments about a specialist type of proficiency. Additionally, workers expressing communicative cues indicative of higher statuses played larger roles in organizational tasks than workers who were viewed as lower‐status.  相似文献   

10.
Based on the revised reduction models of the 14 low carbon ICT solutions from Chongqing Mobile of the China Mobile Group, the CO2e emission reduction brought about by low carbon ICTs of the wireless telecom sector of Chongqing Mobile, the entire China Mobile Group and the whole China in 2009 is calculated. And then the CO2e emission reduction potentials in 2010, 2020 and 2030 are calculated in four main important fields of China, i.e., intelligent transportation, dematerialization, smart work and smart appliances. The ICTs in the telecom sector are mostly dedicated to these fields. It provides a valuable insight into future reduction targets that should be set up for China.  相似文献   

11.
吴宁博  彭长根  牟其林 《电子学报》2019,47(11):2337-2343
针对差分隐私非交互式多属性关联的合成数据集发布问题,基于信息熵、汉明失真提出了发布数据集隐私度、数据效用、隐私泄露风险的量化方法.首先,利用互信息量分析属性相关度,并以关联依赖图模型表达属性关联.其次,基于图中关键隐私泄露路径构建马尔可夫隐私泄露链,并结合信息熵提出一种关联属性隐私度量模型及方法,可以有效的度量由关联属性引起的隐私泄露量.最后,通过具体实例验证了模型与方法的有效性,并对比分析了该方法的优势.  相似文献   

12.
The digital divide has numerous aspects and is as dynamic as the technology industry is able to develop and disseminate new ICTs and services, thus increasing or creating new gaps among the more advanced societies and those still hampered by social and economic problems. In developing countries the diffusion of new technologies is often hindered by factors such as insufficient income, deficient infrastructure, cultural barriers and lack of information. Brazil is no exception to that rule, and all information and communication technologies (ICT) diffusion surveys undertaken to date confirm the trend that digital exclusion is following the dreadful pattern of social exclusion. The income disparities in Brazil are very severe and, also due to the country’s huge territory and complex geographical and cultural formations, a technological innovation is seldom capable of reaching the population as a whole and benefiting the entire society. One outstanding exception is the terrestrial (free-to-air) TV, which, after about 50 years since its introduction, has reached an adoption rate of more than 90%, and now covers the whole country, with enormous sociocultural consequences. In view of this, and with the objective of addressing the problem of digital exclusion, the Brazilian Government has devised the deployment of digital terrestrial television—DTT—as a singular opportunity to reduce the digital divide and to promote the access of the population to interactive and citizenship services through an already familiar interface, thus avoiding or reducing cultural constraints and illiteracy barriers usually posed by other ICTs. This study undertakes a comprehensive discussion of that policy and its effects, and provides some data to support the strategy: the results of two interrelated studies; one that maps TV users’ characteristics and expectations regarding digital TV, and another that models the social network effects on the diffusion of DTT into Brazilian society and the users’ behavior when facing the new media, namely, an agent-based modeling and simulation—ABMS. The model uses the mapping information as input to test some hypothetical scenarios in the diffusion process, so as to identify factors that affect the overall diffusion process. All these studies are in the scope of a broader and deeper methodology for ex ante analysis.  相似文献   

13.
Parking 2.0     
《Spectrum, IEEE》2006,43(12):20-20
A host of new smart parking technologies are helping municipalities meet their twin aims of collecting revenue for city services and preventing a small number of cars from monopolizing a limited number of parking slots. These advances are also benefiting motorists by making the tasks of finding a space and paying to park less of a hassle. Some examples include the solar-powered smart meters which allow drivers to pay for parking with coins, credit or debit cards, or smart cards preloaded with money, and the use of wireless communications to let drivers pay for parking in advance, reserve a space, or add additional time from wherever they are. Other innovations allow drivers to use their personal computers or cellphones to select and reserve parking slots well in advance  相似文献   

14.
The positive and negative environmental impacts of information and communication technologies (ICTs) are widely debated. In theory, ICT is among the sources contributing to the increasing levels of CO2 emissions in terms of production of ICT machinery and devices, energy consumption, and recycling of electronic waste. However, ICT is also expected to reduce CO2 emissions on a global scale by developing smarter cities, transportation systems, electrical grids, industrial processes, and energy saving gains. These two effects work in opposite direction, creating an inverted-U relationship between ICT and CO2 emissions. The aim of this study is to investigate this non-linear relationship between ICT and CO2 emissions on a global scale. Given that global warming is a global issue, it is necessary to look at this relationship in countries at all levels of development. To this end, we use a panel data set consisting of 142 economies, split into 116 developing and 26 developed countries, over the period 1995–2010. The results of our empirical study confirm that the relationship between ICT and CO2 emissions is an inverted U-shaped relationship. Moreover, while for the sample of developing countries, the ICT turning point is well above the mean value, the opposite is true for the sample of developed countries. This implies that many developed countries have already attained the level of ICT development, at which CO2 emissions decreases as the level of ICT development improves further.  相似文献   

15.
China is the primary market for the mobile phone (with almost 700 million of these devices) and one of the world’s leading countries in ICT production. Inside Mainland China, the capital Beijing and the other coastal industrialized towns have been the first to adopt and appropriate the mobile phone. Until now a certain amount of qualitative research has been devoted to the study of ICTs in China. However, quantitative studies are scarce. Here we present the results of a research based on empirical data specifically focused on mobile communication and carried out in Beijing. A structured questionnaire was personally administered to 487 respondents. This study investigates mobile phone use, its implementation in public spaces, attitudes towards its increasing complexity, opinions on its advantages and disadvantages, and its status in comparison to other technologies of information, communication and mass media in the capital of Mainland China. One main result of this study is that a very positive image of the mobile phone among our respondents was accompanied by only two disadvantages: its being a threat to privacy and its presenting the logistical problem that there is no obvious means to carry it. This latter concern should send a strong message to the fashion industry: the diffusion of the mobile phone has worsened the problem of how to wear these “little essential objects”, which up to now still continues to be unresolved.  相似文献   

16.
Information and communication technologies (ICTs) are having a profound effect in society and organizations. However, the literature on ICT adoption—from selection to implementation—has not been well integrated into leadership theory. This is particularly true in terms of adoption. Leaders must adopt ICTs not only for their own competence—an antecedent condition for what is considered e-leadership, but choose, recommend, and support implementation of ICTs for their organizations/units to use. Leaders are also expected to become effective in dealing and navigating the challenges of leading within the digital space. At this moment, there are two pertinent literatures: the technology adoption literature and the enterprise resource planning literature—which can be considered an important special case of leadership change management literature—and which could provide the theoretical basis for developing a unified theoretical perspective on e-leadership. This article provides a framework and propositions to connect these literatures by focusing on the effects of individual leader characteristics on the ICT adoption process from both a personal and enterprise-wide perspective. Study limitations and future research opportunities are outlined.  相似文献   

17.
当前,移动智能终端产业迅猛发展,但也带来恶意代码泛滥、用户隐私窃取、不良内容传播等安全威胁。文章在对移动智能终端的安全威胁及其技术根源深入分析的基础上,对安全技术水平进行研究,并提出系统完整的移动智能终端安全应对策略。  相似文献   

18.
This paper presents the results of the first empirical investigation of the effect of information and communication technologies (ICT) investment on business performance in Greece. It investigates the effect of both ‘hard’ ICT investment (in ICT hardware, software and networks) and ‘soft’ ICT investment (in ICT human resources, skills and organization) on firm output. It is based on data from big Greek industrial firms, which have been collected via a questionnaire-based survey conducted in cooperation with the Federation of Greek Industries (FGI). Using these data, econometric models of output have been constructed based on the microeconomic production theory. Our analysis shows that the Cobb–Douglas production function can adequately describe the output, as compared to the more general transcendental production function. Using this type of production function it has been found that hard ICT investment in Greece makes a positive and statistically significant contribution to firm output; however its output elasticity is lower than the one of the non-computer capital and much lower than the one of the labour. Also, from the dimensions-measures of the soft ICT investment we examined, it has been found that the existence of a separate ICT department has a positive and statistically significant effect on firm output, which is of considerable magnitude of about two thirds of the effect of the hard ICT investment. The possibility of an effect of firm size on the structural stability of the econometric models we employed was also investigated; it was found that for firms with total sales above about €20 million the structure of the models is reasonably stable, and therefore the conclusions drawn from them are valid, at least for the range of firm sizes that our data cover.  相似文献   

19.
In today’s Internet reliant services, the issue of users’ information privacy awareness is being raised. Despite the fact that in many cases internet users claim to be cognizant of privacy issues, they tend to jeopardize their privacy and take no actions to protection it. This paper reports a systematic literature review of existing studies related to Internet users’ information privacy awareness, towards enhancing respective initiatives and defining the attributes that a user should have so as to be privacy aware. We created a five-concept classification framework for the research topics that the academic community raises as important to be further investigated and the main challenges inhibiting information privacy awareness, and we classified all the selected papers according to this framework. Based on the analysis of the literature, we identify five main attributes that constitute a “Profile for the Information Privacy Aware User”, stemming from the classification framework, and further, we suggest the way this profile can be beneficial for internet users, Internet providers and designers of privacy awareness enhancing technologies. Additionally, we highlight research gaps and we provide useful insights for future research, such as the need for a concrete definition (theme 1), the need for the proposal of privacy preventive technologies (theme 3 and 4) and the need for investigation of information privacy awareness in multiple contexts (theme 5).  相似文献   

20.
It is estimated that ICTs contribute around 2 percent of global greenhouse gas emissions. These percentages are likely to grow as ICTs become more widely available. At the same time, ICTs can be a major linchpin in efforts to combat climate change and serve as a potent cross-cutting tool to limit and ultimately reduce GHG emissions across economic and social sectors. This article looks at the potential role ICTs play at different stages, from contributing to global warming to monitoring it, to developing long-term solutions to mitigate its effects, both directly in the ICT sector and in other sectors such as energy, transport, buildings, and finally to helping adapt to its effects. The article addresses the efforts made by the ITU and its membership to develop new climate-friendly technologies.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号