首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
RobinQiu  徐琪 《计算机科学》2004,31(11):126-129
介绍了在计算机网络系统中(如Internet、intranet)物品识别技术的一个全新的、集成的方法和技术。应用该技术,任何一个物体郝可以用全球识别码(GIC)来实现智能标签。这种带有GIC智能标签的物体在全球范围内不仅可以被唯一地识别,而且相关的物体信息在任何地方、任何时间都可以被直接访问和获取,满足了用户在即将到来的e-世界中对物体识别信息的需求。  相似文献   

2.
现代多媒体信息技术的出现,给教育活动带来了革命性影响。对教育工作者而言,需要全面充分认识和理解现代化多媒体信息技术对教育领域造成的具体影响,进而顺应时代发展,推动教育活动进一步发展。基于此,针对现代化信息技术对教育活动造成的具体影响,探讨了教师应在教育活动中做出的改变,分析了如何应用信息技术,以期为教育工作者提供新的思路。  相似文献   

3.
当前,信息技术渗透到人类社会生活的各个环节,这其中,云计算发展可谓异军突起,它将智能网络、虚拟技术、资源调度、无线网络和3G等前沿技术相融合,展现出良好的应用前景和巨大的潜力。云计算是一种基于Internet的、新兴的计算机应用技术。其远景是以互联网为基础,为广大互联网用户提供安全可靠、方便快捷的互联网服务和强大的计算能力。在云计算环境下,信息安全问题不但是云计算面临的首要问题,而且将成为决定云计算发展的规模和前景的决定性问题。通过从云计算的概念、特征和及目前已存在的问题出发,浅析云计算环境下的信息安全问题。  相似文献   

4.
随着新一代信息技术的迅速发展,软件已广泛应用在很多领域,软件质量会直接影响信息技术的效能发挥,因此备受关注。软件测试作为保障软件质量的重要手段,一直是软件工程技术的研究重点之一。基于此,笔者首先分析了软件测试对信息技术发展的重要影响,进而从重视程度、各环节要求、测试理论和方法、测试技术、规范化管理5个方面提出提高整个软件测试信息技术的途径,旨在为信息技术发展提供借鉴。  相似文献   

5.
信息技术的飞速发展,促进了教育的变化,同时也加快了信息技术与课程的整合,对高校教师的教育技术素质要求也越来越高。时广大教师实施有效的教育技术培训是当前课程整合首要问题。本文结合当前的信息时代对教师的要求,分析如何对教师进行信息技术培训。  相似文献   

6.
Tamai  Tetsuo 《Computer》2009,42(6):58-65
The social impact of information systems becomes visible when serious system failures occur. A case of mistyping in entering a stock order by Mizuho Securities and the following lawsuit between Mizuho and the Tokyo Stock Exchange sheds light on the critical role of software in society.  相似文献   

7.
ABSTRACT

There is a rise in the interest among researchers to understand how addiction to social networking sites (SNSs) influences the use of SNS for information sharing. Much less attention has been placed on the interactive effect of multiple addictions (i.e., cross-addiction) on information sharing behaviors on SNSs. In this study, we examine the interaction effect of SNS addiction and alcohol use on two characteristic sharing behaviors on SNSs, self-promotion, and peer promotion of alcohol use. This study contributes to theory and practice as it builds a model that integrates social cognitive theory and normative social influence to explain mechanisms through which cross-addiction shapes information sharing behaviors on SNSs. The proposed model is estimated using data from a sample of college students in a North American university. The results support the theorized relationships between cross-addiction and SNS use to promote addiction-related activities. Implications of the findings for theory and practice are discussed.  相似文献   

8.
The purpose of this article is to identify information systems security risks in local governments resulting from the cooperation with IT vendors. We focus on government-to-government projects where the confidentiality, integrity, and availability of information is a key concern. In our risk identification process, we take a systems thinking approach, taking into account actual and perceived risks. We identified 13 causes of risk in three risk areas and analyzed them using outsourcing literature.  相似文献   

9.
Abstract

Today's security engineer cannot do his job in the same fashion he did ten or twenty years ago. He has to rely not only on his computer skills to make sure his systems are properly secured, but he also has to know what regulations will impact him in his line of business and how to respond to them. He needs to know how to apply his technology effectively while achieving the best use of money and time.  相似文献   

10.
随着TD-LTE技术的不断发展,它的传输速率将是目前的传输技术无法比拟的,它将改变人们对互联网的认识,使人们的生活与互联网紧密地连接在一起.而新技术的到来必然带来新的挑战.文章通过对TD-LTE的技术特点、未来应用方面的阐述.提出了它将带来的窃密事件,网络犯罪的增加以及空中截获等一系列信息安全问题.  相似文献   

11.
Investment in information technology is steadily increasing, but many organizations find it difficult to formally assess the value of IT investments because the latter are often incorporated into broad management initiatives. the authors believe that the results of the research study reported on here can help firms to develop a better understanding of the dynamic relationship between IT investment and performance at both the firm and industry levels of analysis. This study clearly demonstrates the importance of adopting an organizational change perspective when assessing the impact of IT investment on firm performance.  相似文献   

12.
文章通过对TD-LTE这一网络新技术的技术特点和未来应用的阐述,分析了它将带来的窃密事件和网络犯罪的增加,以及空中截获等一系列信息安全问题,并针对这些信息安全问题,提出了加密和监控等解决对策。  相似文献   

13.
当今世界已处于信息化时代,越来越多的企业为提高其工作效率,将信息技术用到企业经济活动中。虽然在信息化背景下,企业因用信息技术使内部控制得到改善,但基于信息技术的会计系统也产生新的风险,而这些风险通常在传统的手动系统中不存在。审计人员须具备新观念、新意识,并掌握一定的信息技术技能才能降低这些风险。本文将重点介绍信息技术系统的特有风险,并确定可实施哪些控制措施来应对这些风险,以及阐述信息技术相关控制措施如何影响审计。  相似文献   

14.
中文分词对中文信息检索系统性能的影响   总被引:7,自引:0,他引:7  
中文分词作为中文信息处理最重要的预处理手段被广泛应用,该文从两个方面(检索精度和召回率)深入研究了中文分词精度和分词算法对中文信息检索性能的影响。此外,提出了两个假设,并在此基础上给出了一种提高中文信息检索系统性能的方法。实验表明,新方法能够取得很好的结果,证实了这两个假设。  相似文献   

15.
Measuring Information Technology's Indirect Impact on Firm Performance   总被引:2,自引:0,他引:2  
It has been recognized that the link between information technology (IT) investment and firm performance is indirect due to the effect of mediating and moderating variables. For example, in the banking industry, the IT-value added activity helps to effectively generate funds from the customer in the forms of deposits. Profits then are generated by using deposits as a source of investment funds. Traditional efficiency models, such as data envelopment analysis (DEA), can only measure the efficiency of one specific stage when a two-stage production process is present. We develop an efficiency model that identifies the efficient frontier of a two-stage production process linked by intermediate measures. A set of firms in the banking industry is used to illustrate how the new model can be utilized to (i) characterize the indirect impact of IT on firm performance, (ii) identify the efficient frontier of two principal value-added stages related to IT investment and profit generation, and (iii) highlight those firms that can be further analyzed for best practice benchmarking.  相似文献   

16.
邓林  余刘琅  韩江洪 《计算机工程》2007,33(17):190-192
网络通信内容中的干扰性或垃圾信息对网络通信有着不可忽视的负面影响,而内容过滤是工作在网络应用层的一种对网络流量中各种协议进行重组和规则匹配的安全技术,可广泛应用于对网络通信中的垃圾信息和干扰性信息的阻断或限制。以内容过滤为基本手段,通过对网络的随机性访问内容的大数据量抽样和过滤结果的定量统计,得出了内容过滤系统对网络通信效率的正面影响程度,并分别从网络通信的速度、流量等方面记述了内容过滤系统在网络通信中的作用。  相似文献   

17.
本文针对现代信息时代具有视觉冲击力的平面广告设计研究,分析了具有视觉冲击力的平面广告的信息传达特点,目的在于对现代的平面广告设计师有一定的启示作用。  相似文献   

18.
基于GIS的环境影响评价信息系统的开发   总被引:7,自引:0,他引:7  
论述了环境影响评价信息系统的组成结构,依据GIS技术的发展趋势,确立了信息系统的组件式GIS的开发方式。论述了数据库与信息系统的接口方式,对图形化显示数据库中的数据进行了全面的研究,经过实例研究,证明将数据库中数据调入信息系统及对其进行图形显示是可行的。  相似文献   

19.
The choice of a particular technology to implement a firm's business strategy may impact the firm's market performance. This study assesses the impact of being an Internet-dependent firm on a firm's stock valuation. The empirical results indicate that in a booming economy, Internet-dependent firms have lower excess returns than non-Internet firms. These high returns can be explained by the fact that in such an economy, Internet stocks trade at relatively higher prices than non-Internet stocks. Therefore, choosing a particular technology to implement business strategy may have a significant impact a firm's stock performance.  相似文献   

20.
随着信息化测绘时代的快速发展,在工程测量时使用的方法也越来越多,有卫星定位测量、地理信息系统(GIS)、摄影测量、大型工程精密工程测量、变形监测和轨道交通精密施工测量,这些测量方法的运用使信息测绘得到了进一步的发展,发挥出了它们的无限潜力。从建立现代化工程测量体系的实际情况出发,工程测量的发展不论是在技术上还是安全质量上都必须遵循有关规范的规定,这样才可以在未来的发展中走得更远、更好。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号