11 |
An Evaluation of Organizations Servicing Internally Displaced Persons in the Republic of AzerbaijanAliyev, Emil Malik 16 September 2002 (has links)
No description available.
|
12 |
Secure Management System for UPnP Digital Home NetworkLu, Yu-Chun 16 August 2010 (has links)
The rapid development in wireless network technology, together with the extensive progress in the digital home hardware and software, have allowed every family to enjoy the conveniences of these new technologies. In particular, the UPnP network technologies link various digital home devices together, coming alone with seamless connection and configuration-less environment. These benefits make it very easy for users to enjoy their digital home devices. However, related security issues have begun to surface one after another. Under a UPnP network environment, users¡¦ identity are not distinguished and therefore, they can not authorize the usage of those devices, services and content. Devices with similar types of service and content lack of integration, it is inconvenient when users need to search or access. In addition, there seems to be a lack of proper handling mechanisms when these devices, services, and content encounter anomaly problems and errors. Lastly, family users will also inevitably have connection requirements between homes but unfortunately, the current UPnP network environment is unable to provide convenient and secured home-to-home content exchange mechanisms.
To address the issues mentioned above, this study surveyed the UPnP network environment from a fresh perspective. And through virtual resources, central control network framework and fault tolerance design, it further provides abilities to do related resource authentication, authorization, auditing, and fault handling. It also uses PKI framework to provide the authentication and secure connection between homes. Lastly, we designed and implemented a secure Management System for a UPnP digital home network. It provides secure and convenient home network environment that is compatible with UPnP/UPnP AV standards. On the user¡¦s control aspect, we provided user authentication, authorization, and auditing functionalities. On the home resource management aspect, we provided networks, devices, services, and content which can be controlled and managed. And we also provide integrated and customized entries for service and content. We have a management system with smart and user friendly features. On the anomaly management aspect, we provide fault detection, handling, and basic fault tolerance mechanism. Lastly, we provide trusted homes mechanism, supporting secure user roaming outside their homes, allowing content sharing between trusted homes, and ensuring that users roaming in other locations may still access specific content in their homes.
|
13 |
The intersection of social networks in a public service model: A case study.Schultz-Jones, Barbara Ann 12 1900 (has links)
Examining human interaction networks contributes to an understanding of factors that improve and constrain collaboration. This study examined multiple network levels of information exchanges within a public service model designed to strengthen community partnerships by connecting city services to the neighborhoods. The research setting was the Neighbourhood Integrated Service Teams (NIST) program in Vancouver, B.C., Canada. A literature review related information dimensions to the municipal structure, including social network theory, social network analysis, social capital, transactive memory theory, public goods theory, and the information environment of the public administration setting. The research method involved multiple instruments and included surveys of two bounded populations. First, the membership of the NIST program received a survey asking for identification of up to 20 people they contact for NIST-related work. Second, a network component of the NIST program, 23 community centre coordinators in the Parks and Recreation Department, completed a survey designed to identify their information exchanges relating to regular work responsibilities and the infusion of NIST issues. Additionally, 25 semi-structured interviews with the coordinators and other program members, collection of organization documents, field observation, and feedback sessions provided valuable insight into the complexity of the model. This research contributes to the application of social network theory and analysis in information environments and provides insight for public administrators into the operation of the model and reasons for the program's network effectiveness.
|
14 |
Exploring Digital Collaboration : Case study of police - military interorganizational dynamics in Sweden / Undersökning av digitalt samarbete : Fallstudie av polis - militär interorganisatorisk dynamik i SverigeBrunnberg, André January 2024 (has links)
This thesis addresses the challenge of integrated service deliveries (ISD) and e-government principles in civil-military cooperation, a domain relatively unexplored in existing literature. The research questions delve into the comparative analysis of current and envisioned future communication systems for a Swedish military-police collaboration. This includes identifying and evaluating key development factors to facilitate the imagined future system and potentially shape future paths for the envisioned collaboration. The decision was made to adopt a combined framework of a scenario typology and a participatory backcasting framework while utilizing an explorative abductive research approach. A Delphi study and semi-structured interviews with stakeholders and experts on this phenomenon were used to gather the primary data. The research identifies three distinct future visions from today's communication chain in Sweden. Eight key developmental factors for each vision, from political considerations to technological developments, were also identified. However, the Delphi study analysis in this thesis indicates disagreement among the stakeholders and experts on evaluating the key development factors for the future scenarios, emphasizing the complexity of constructing definitive transition pathways for this phenomenon. This thesis emphasizes, therefore, the urgency for further research to consolidate consensus among stakeholders and experts and formulate concrete pathways for the envisioned scenarios. This thesis also acknowledges the necessity and importance of a digital transition within the Swedish police and military to achieve the Swedish national agenda of constructing effective, robust, and secure digital communication across public agencies. / Denna avhandling tar upp utmaningen med integrerade tjänsteleveranser och e-förvaltningsprinciper i civil-militärt samarbete, en domän som är relativt outforskad i befintlig litteratur. Forskningsfrågorna i detta arbete fördjupar sig i den jämförande analysen av nuvarande och tänkta framtida kommunikationssystem för ett svenskt militär-polissamarbete. Detta inkluderade att identifiera och utvärdera viktiga utvecklingsfaktorer för att underlätta det tänkta framtida systemet och för att kunna potentiellt forma framtida vägar för det tänkta samarbetet. Beslutet togs att anta ett kombinerat ramverk av en scenario typologi och ett deltagande backcasting-ramverk samtidigt som en explorativ abduktiv forskningsmetod användes. En Delphi-studie och semistrukturerade intervjuer tillsammans med intressenter och experter om detta fenomen användes för att samla in primärdata. Forskningen lyckades identifiera tre distinkta framtidsvisioner från dagens kommunikationskedja i Sverige. Åtta viktiga utvecklingsfaktorer för varje vision, från politiska överväganden till teknisk utveckling, identifierades också. Delphi-studien och dess analys i denna avhandling indikerar dock oenighet mellan intressenter och experter om utvärderingen av utvecklings faktorerna för scenarierna, vilket betonar komplexiteten i att konstruera definitiva omställningsvägar för detta fenomen. Denna avhandling betonar därför vikten av ytterligare forskning för att konsolidera samförstånd mellan intressenter och experter och formulera konkreta vägar för de tänkta scenarierna inom ett svenskt militär-polissamarbete. Denna avhandling erkänner också nödvändigheten och betydelsen av en digital omställning inom svensk polis och militär för att uppnå den svenska nationella agendan att bygga effektiv, robust och säker digital kommunikation mellan offentliga myndigheter.
|
15 |
電子發票未來發展之研究葉慧容 Unknown Date (has links)
財政部自2000年11月29日頒布「網際網路傳輸統一發票(簡稱電子發票)試辦作業要點」以來,僅有三千多家申請試辦,且應用面仍侷限在B2B 的發票和折讓單e 化,且買方和賣方都必須加入同一加值服務中心,和實務應用面仍有一段距離。
隨著電子商務快速發展,不論是B2B、B2C、或是C2C,均已具一定規模且持續蓬勃發展中,並在資訊流、物流和金流上都已先後導入e 化應用。但統一發票為整個供應鏈流程中的一段,却尚未導入e 化,導入電子發票有助於整個供應鏈的e化,並可以降低整體作業的運作成本。然而,電子發票之應用涉及財稅政策、會計師簽證、電子簽章、認證機制、個人隱私權、公司e化及公司稽核管控等等核心問題,這種種相關因素如何相互配合,才能發揮電子發票之最大綜效,值得進一步探討。
本研究係參考金財通導入捷盟公司的電子發票個案分析,及國內外電子發票之現況,研討電子發票對企業作業流程、加值服務中心之運作、網路安控機制、政府法令規章、稅務行政、會計師查核等等的挑戰,據以提出可能的作業模式與建議,以供相關單位未來推動統一發票全面電子化的參考。 / The e-invoice trial operations are only adopted by 3,000+ enterprises ever since the Ministry of Finance announced the trial operation law of e-invoice communication through Internet on 29 Nov 2000. The application scope is only within the B2B communication of invoice and allowance note between the enterprises and the value added service center. This is a big gap to implement in a multi-to-multi business environment.
Transactions of B2B, B2C or C2C have been on-going grew to an economic scale along with the rapid growth of e-commerce development. Electronic techniques have been applied to the information flow, goods delivery flow and cash flow in the supply chain management. However, invoice is part of the supply chain but not yet integrated into the supply chain e-cycle. Implement e-invoice will integrate the electronic system for supply chain and will help to reduce the total operation costs. E-invoice application involves the core issues of such as government’s financial policy, accounting auditing, public key infrastructure, certificate authority, personal privacy, enterprise EAI system and internal auditing. How these factors incorporate with each other to maximize the most e-invoice benefit deserves further study.
This study references the BankPro’s e-invoice implementation case and current e-invoice development situation in Taiwan, America and Europe. On such basis, we further discuss the challenges of e-invoice that will be brought to the enterprise operation flow, service value added center, Internet security control, government legal law, taxing administration and accounting auditing etc, so as to provide possible operation model and recommendations to the related units as the reference to implement e-invoice globally in the future.
|
Page generated in 0.0704 seconds