• Title/Summary/Keyword: Critical Information Infrastructure

Search Result 225, Processing Time 0.033 seconds

The Aggregate Production Efficiency of IT Investment: a Non-Linear Approach

  • Repkine, Alexandre
    • Proceedings of the Technology Innovation Conference
    • /
    • 2002.02a
    • /
    • pp.59-89
    • /
    • 2002
  • The rapid diffusion of information and telecommunication (IT) technologies during the recent decennia produced fundamental changes in the economic activity at a global level, resulting in what became coined as the "new economy". However, empirical evidence on the contribution of IT equipment to growth and productivity is at best mixed, with the more or less consistent results on the positive link between the two relating to the United States in the 1990-s. Although the empirical literature on the link between IT investment and economic performance employs a wide variety of methodologies, the overwhelming majority of the studies appears to be employing the assumption of linearity of the IT-performance relationship and predominantly explores the direct nature thereof. In this study we relax both these assumptions and find that the indirect, or aggregate productive efficiency, effects of IT investment are as important as are the direct ones The estimated non-linear nature of the indirect relationship between IT investment intensity and productive efficiency accommodates the concepts of critical mass and complementary (infrastructure) capital offered in the literature. Our key finding is that the world economy′s average level of IT investment intensity remained below the estimated critical mass. Since in this study we developed a methodology that allows one to explicitly measure the critical mass of IT investment intensity, its individual estimation at a country or industrialsector level may help evaluate the extent to which IT investment activity has to be encouraged or discouraged.

  • PDF

International Construction Joint Ventures with Developing Countries: Singapore's Case for Risk Assessment and Allocation

  • Hwang, Bon-Gang;Zhao, Xianbo;Chin, Eileen Wei Yan
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.435-439
    • /
    • 2015
  • It is important for Singaporean companies to manage the multifaceted risks when forming international construction joint ventures (ICJVs) with developing countries. The objectives of this study are to assess the risks associated with Singaporean ICJVs with developing countries, and investigate the risk allocation preferences in these ICJVs. To fulfill these objectives, a literature review was carried out and a questionnaire survey was performed with 38 professionals. The survey results reported "political instability" as the most critical risk, and market level risks were less critical than country and project level risks. Additionally, the results showed agreement on the risk ranking between building and infrastructure ICJVs, despite significant differences in the criticalities of five risks. Furthermore, five risks were preferably allocated to host and foreign partners, respectively, while 13 risks could be shared among partners. As few studies have explored the risk allocation preferences in ICJVs, this study expands the literature. Also, the identification of the risks allows other companies to customize their own lists of critical risks, while the preferred risk allocation provides valuable information for companies from various countries that intend to form ICJVs with developing countries. Thus, this study contributes to the global body of knowledge relating to ICJVs.

  • PDF

The Research on Coherence of Legal System for Systematic Development of Spatial Information (공간정보의 체계적 발전을 위한 법제도적 정합성에 관한 연구)

  • Kim, Hyun-Hee;Lim, Hyung-Taek
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.1
    • /
    • pp.1-15
    • /
    • 2015
  • Korea's Spatial Information Policy has been institutionalized based by "National Spatial Data Infrastructure Act", "Act on Land Survey, Waterway Survey and Cadastral Records", "Spatial Data Industry Promotion Act". In year 2015, These acts were modified with new names and contents. It is critical that the definition of spatial information ought to be generalized. In addition, it is of paramount importance to review factors those contribute to the systematic development on coherent relation between Spatial Information Act and other acts. Examples of improvement area may include: Categorization of Spatial Information Concept, Systematization of Spatial Data Related Legislation, and Enhancement of Organization Specializing in Spatial Information. Furthermore, Legislation & Policy case of Germany, France and the United States were used as a basis for improvement.

Towards Open Interfaces of Smart IoT Cloud Services

  • Kim, Kyoung-Sook;Ogawa, Hirotaka
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.235-238
    • /
    • 2016
  • With the vision of Internet of Things (IoT), physical world itself is becoming a connected information system on the Internet and cyber world is computing as a physical act to sense and respond to real-world events collaboratively. The systems that tightly interlink the cyber and physical worlds are often referred to as Smart Systems or Cyber-Physical Systems. Smart IoT Clouds aim to provide a cyber-physical infrastructure for utility (pay-as-you-go) computing to easily and rapidly build, modify and provision auto-scale smart systems that continuously monitor and collect data about real-world events and automatically control their environment. Developing specifications for service interoperability is critical to enable to achieve this vision. In this paper, we bring an issue to extend Open Cloud Computing Interface for uniform, interoperable interfaces for Smart IoT Cloud Services to access services and build a smart system through orchestrating the cloud services.

  • PDF

Development of BIM-based bridge maintenance system for cable-stayed bridges

  • Shim, Chang-su;Kang, Hwirang;Dang, Ngoc Son;Lee, Deokkeun
    • Smart Structures and Systems
    • /
    • v.20 no.6
    • /
    • pp.697-708
    • /
    • 2017
  • Maintenance plays a critical role in the bridge industry, but actual practices show many limitations because of traditional, 2D-based information systems. It is necessary to develop a new generation of maintenance information management systems for more reliable decision making in bridge maintenance. Enhancing current work processes requires a BIM-based 3D digital model that can use information from the whole lifecycle of a project (design, construction, operation, and maintenance) through continuous exchanges and updates from each stakeholder. This study describes the development of a data scheme for maintenance of cable-stayed bridges. We implemented the proposed system for a cable-stayed bridge and discussed its effectiveness.

Statistical calibration of safety factors for flexural stiffness of composite columns

  • Aslani, Farhad;Lloyd, Ryan;Uy, Brian;Kang, Won-Hee;Hicks, Stephen
    • Steel and Composite Structures
    • /
    • v.20 no.1
    • /
    • pp.127-145
    • /
    • 2016
  • Composite column design is strongly influenced by the computation of the critical buckling load, which is very sensitive to the effective flexural stiffness (EI) of the column. Because of this, the behaviour of a composite column under lateral loading and its response to deflection is largely determined by the EI of the member. Thus, prediction models used for composite member design should accurately mirror this behaviour. However, EI varies due to several design parameters, and the implementation of high-strength materials, which are not considered by the current composite design codes of practice. The reliability of the design methods from six codes of practice (i.e., AS 5100, AS/NZS 2327, Eurocode 4, AISC 2010, ACI 318, and AIJ) for composite columns is studied in this paper. Also, the reliability of these codes of practice against a serviceability limit state criterion are estimated based on the combined use of the test-based statistical procedure proposed by Johnson and Huang (1997) and Monte Carlo simulations. The composite columns database includes 100 tests of circular concrete-filled tubes, rectangular concrete-filled tubes, and concrete-encased steel composite columns. A summary of the reliability analysis procedure and the evaluated reliability indices are provided. The reasons for the reliability analysis results are discussed to provide useful insight and supporting information for a possible revision of available codes of practice.

A Study on the Impact of IT and SCM Process Management Capability on e-SCM Performance (IT와 SCM 프로세스 관리역량이 e-SCM 성과에 미치는 영향에 관한 연구)

  • Lee, Sun-Ro;Kim, Ki-Young
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.79-103
    • /
    • 2007
  • The main purpose of this study is to define antecedents that influence e-SCM synchronization and to investigate how it affects e-SCM performance. We, therefore, investigate (1) the impact of firms' internal IT planning capabilities on e-SCM synchronization and on SCM process management capability, (2) the impact of firms' internal IT infrastructure on e-SCM synchronization and on SCM process management capability, (3) the impact of firms' internal SCM process management capabilities on e-SCM synchronization, and finally (4) the impact of e-SCM synchronization on SCM performance. A survey has been administrated to the firms' SCM and marketing staffs and 171 returns analyzed. The results show that (1) IT plan has not direct impacts on e-SCM synchronization, but has direct impacts on organizational support, purchasing, and operations processes except logistics process. IT plan, however, has indirect impacts on e-SCM synchronization through purchasing and operations of SCM process management capability. (2) IT infrastructure has both direct and indirect effects on e-SCM synchronization, and also has direct impacts on organizational support, purchasing, and operations processes except logistics process. (3) SCM process management capabilities have direct impacts on e-SCM synchronization. Among these SCM core processes purchasing positively influences operations, which in turn positively influences logistics process management capability. (4) e-SCM synchronization has positive impacts on SCM performance indicator (SCOR), such as delivery reliability, responsiveness & flexibility, and cost. These results indicate that e-SCM synchronization can be critical to achieve better internal performance like cost and external performance like delivery reliability, responsiveness & flexibility of firms' SCM. In sum, this study demonstrates that the intervening role of e-SCM synchronization between e-SCM performance and IT management capability and between e-SCM performance and SCM core process management capability has been significant in achieving better e-SCM performance. Therefore, it can be suggested that e-SCM performance should be accomplished in consequence of the acceleration of e-SCM synchronization through the enhancement of preceding factors for the e-SCM synchronization.

Status and Trend of Foreign Underground Data Centers (해외 지하 데이터센터의 현황과 동향 분석)

  • Lee, Chulho;Choi, Soon-Wook;Kang, Tae-Ho;Chang, Soo-Ho
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.52-63
    • /
    • 2019
  • It is highly in demand to establish a bunker-type underground data center to ensure the safety of national critical data, such as financial information and medical information, and prevent those outflow of national important data. In particular, the security of a data center which is a key national structure has become a social issue due to EMP weapon and earthquakes, but data centers in the nation have not been able to deal with it properly. Therefore, it is necessary to develop an underground data center that is safe from human-induced and natural disasters while reducing power costs by utilizing the benefits of underground spaces such as constant temperature and isolation. In this analysis, the status and trends of data centers around the world were analyzed and based on those trend analyses, the research strategy for underground data center were discussed.

The US National Ecological Observatory Network and the Global Biodiversity Framework: national research infrastructure with a global reach

  • Katherine M. Thibault;Christine M, Laney;Kelsey M. Yule;Nico M. Franz;Paula M. Mabee
    • Journal of Ecology and Environment
    • /
    • v.47 no.4
    • /
    • pp.219-227
    • /
    • 2023
  • The US National Science Foundation's National Ecological Observatory Network (NEON) is a continental-scale program intended to provide open data, samples, and infrastructure to understand changing ecosystems for a period of 30 years. NEON collects co-located measurements of drivers of environmental change and biological responses, using standardized methods at 81 field sites to systematically sample variability and trends to enable inferences at regional to continental scales. Alongside key atmospheric and environmental variables, NEON measures the biodiversity of many taxa, including microbes, plants, and animals, and collects samples from these organisms for long-term archiving and research use. Here we review the composition and use of NEON resources to date as a whole and specific to biodiversity as an exemplar of the potential of national research infrastructure to contribute to globally relevant outcomes. Since NEON initiated full operations in 2019, NEON has produced, on average, 1.4 M records and over 32 TB of data per year across more than 180 data products, with 85 products that include taxonomic or other organismal information relevant to biodiversity science. NEON has also collected and curated more than 503,000 samples and specimens spanning all taxonomic domains of life, with up to 100,000 more to be added annually. Various metrics of use, including web portal visitation, data download and sample use requests, and scientific publications, reveal substantial interest from the global community in NEON. More than 47,000 unique IP addresses from around the world visit NEON's web portals each month, requesting on average 1.8 TB of data, and over 200 researchers have engaged in sample use requests from the NEON Biorepository. Through its many global partnerships, particularly with the Global Biodiversity Information Facility, NEON resources have been used in more than 900 scientific publications to date, with many using biodiversity data and samples. These outcomes demonstrate that the data and samples provided by NEON, situated in a broader network of national research infrastructures, are critical to scientists, conservation practitioners, and policy makers. They enable effective approaches to meeting global targets, such as those captured in the Kunming-Montreal Global Biodiversity Framework.

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.6
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.