• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 5
  • 4
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 21
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Could Pricing Strategies in Different Regions Create a Sense of Division? : A Qualitative Study in the Pursuit of Scrutinizing European Individuals' Views on Penetration Pricing, Price Skimming, and Prestige Pricing Pertaining to a New Sugar-Sweetened Beverage

Tóth, Zoltán János January 2023 (has links)
Background: To many customers, prices are mundane; however, marketers engage in casuistry to purport their product as superior to others by enticing prices. Prices are the most susceptible variable in the Marketing Mix. The thesis posits a discussion on whether marketers should change pricing techniques depending on if they want to launch a (new) sugar-sweetened beverage in Eastern or Western Europe. Not a plethora of research has been written on this topic, which is why this thesis agog to find out which pricing strategies or strategy they should use when they enter Eastern or/and Western Europe with (new) sugar-sweetened beverages. The three quintessence of price-setting methods this paper exerts and later reflects painstakingly in the analysis chapter are penetration pricing, price skimming, and prestige pricing. Sugar-sweetened beverages were chosen as a central topic of interviews as the great majority of the population consumes sugar- sweetened beverages. All participants could form their opinion on the issue by dint of this aspect.  Method: Qualitative method was chosen for the thesis. The qualitative method opens more room for insights and in-depth discussions with the participants. Seven individuals from Eastern and Western Europe were enquired to answer the questions can be found in the appendix.  Results: The results reflect that it is worth ruminating to marketers to use different pricing strategies in Eastern and Western Europe based on the answers gathered. Besides, the interviews also shed light on how complexly customers view the price and the differences within Europe based on regions. Despite some differences, many similarities were also found in the individuals' perceptions. Lastly, publishing the result, the thesis also aims to draw on how one individual's perceptions change with time and the circumstances that influence it.  Conclusions: From the findings, it might be possible to extrapolate which pricing strategy marketers should use to enter Eastern and Western Europe with a (new) sugar-sweetened beverage. The outcome of the interviews reflects that Eastern European individuals who were interviewed are dismissive of price skimming; meanwhile, the asked Western Europeans were dismissive about penetration pricing and prestige pricing in the context of sugar-sweetened beverages.
12

Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare

Savostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
<p>Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. </p><p>The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. </p><p>Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. </p><p>Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.</p>
13

Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare

Savostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.
14

Design och implementering av en datorsäkerhetsdatabas – samt en behovsanalys därav

Lagergren, Tobias January 2010 (has links)
Denna rapport beskriver de behov vilka ligger tillgrund för att skapa en IT-säkerhetsdatabas. Rapporten tar även upp olika IT-säkerhetsproblem och för en diskussion om vad som är faran med dessa problem. Diskussionen förs inom två områden rörande IT-säkerhet.Det ena området är om IT-säkerhet i allmänhet och tar upp begreppet CIA. CIA står för de engelska begreppen Confidentiality, Integrity och Availability och på svenska, sekretess, integritet och tillgänglighet.Den andra delen handlar om lite mer specifika IT-säkerhetsproblem, som till exempel virus och sniffing.På uppdrag av FOI är en databas, vilken är avsedd för att lagra information rörande IT-säkerhet, skapad. Rapporten tar upp en del grundläggande databasteori och beskriver designen och implementationen av databasen. Även hur databasen fungerar beskrivs.Slutligen förs en diskussion om uppnådda resultat och om möjlig framtida utveckling av databasen. / This report describes the needs which are the basis for creating an IT security database.The report also discusses various IT security issues and a discussion of what are the dangers of these problems. The discussion conducted in two areas relating to IT security.The first part is about IT security in general and addresses the concept of the CIA. CIA stands for the English concepts of Confidentiality, Integrity and Availability. The terms in Swedish are sekretess, integritet and tillgänglighet.The second part deals with some more specific IT security problems, such as viruses and sniffing.On behalf of FOI a database is created, which is designed to store information relating to IT security. It outlines some basic database theory and describes the design and implementation of the database. Also the functions in the database are described.Finally a discussion over the results achieved and the possible future development of database is carried out.
15

Escoamento deslizante sobre turbilhões em descarregadores em degraus de largura constante e convergentes, usando o método Hidrodinâmica Suavizada de Partículas / Skimming flow over stepped spillways with non-converging and converging sidewalls using Smoothed Particles Hydrodynamics Method

Juliana Dorn Nóbrega 23 November 2018 (has links)
O método Hidrodinâmica Suavizada de Partículas (em inglês: Smoothed Particle Hydrodynamics - SPH) foi utilizado para o desenvolvimento de um estudo numérico envolvendo descarregadores lisos e descarregadores em degraus (considerando escoamento deslizante sobre turbilhões), com paredes laterais paralelas e paredes convergentes, usando o software DualSPHysics. Muitas vezes é conveniente utilizar a construção de descarregadores com maior largura na crista, e menor largura do descarregador, para adaptação das limitações físicas locais. O estreitamento do descarregador de forma gradual até atingir a largura da seção de jusante é feito por meio de paredes laterais convergentes, que por sua vez induzem à formação de ondas estacionárias laterais, e consequentemente aumento da altura do escoamento junto às paredes. Existem poucos estudos na literatura sobre esse tema, justificando o estudo numérico desenvolvido neste trabalho. O modelo numérico foi desenvolvido com base em um modelo físico do Laboratório de Hidráulica e Recursos Hídricos do Instituto Superior Técnico, Portugal, sendo os resultados experimentais obtidos em estudos anteriores. A instalação experimental é composta por um descarregador com declividade de fundo de 26,6º, e ângulo das paredes de 0º; 9,9º e 19,3º em relação ao plano vertical. As simulações foram realizadas em duas ou três dimensões, conforme a condição de largura constante ou convergente. Os resultados foram comparados com dados experimentais em termos de alturas do escoamento na parede e no eixo do descarregador, perfis de velocidade na região não-aerada do escoamento, e largura da onda estacionária lateral. Para as simulações tridimensionais, também foram elaborados gráficos de isolinhas para a altura do escoamento, podendo-se observar a extensão das ondas estacionárias laterais conforme a condição de superfície lisa ou em degraus, e a elevação de água junto às paredes. Em geral, houve boa aproximação entre dados numéricos e experimentais, verificando-se a aplicabilidade do método SPH para simular o escoamento deslizante sobre turbilhões em estruturas em degraus, ou estruturas convencionais de paramento liso. / A numerical study using the Smoothed Particle Hydrodynamics method (SPH) was developed for smooth and stepped spillways (for skimming flow regime), with converging and non-converging sidewalls, using the software DualSPHysics. In numerous situations, it is convenient to built spillways with longer width at the crest and narrower width at the downstream end of the spillway, depending on the site constrains. The gradual narrowing of the spillway width is usually made through converging sidewalls, which induce the formation of shockwaves, leading to higher flow depths along the sidewalls. Few studies in the literature were carried out in this research topic to date, justifying the numerical study developed in this project. The numerical model was based on a physical model assembled at the Hydraulic and Water Resources Laboratory of the Instituto Superior Técnico, Portugal, using experimental data obtained in previous studies. The experimental setup was composed by a spillway with slope of 26.6º, and angles of converging sidewalls of 0º, 9.9º, and 19.3º in relation to the vertical plane. Two-dimensional or three-dimensional simulations were carried out according to the condition of constant width or converging walls. The results were compared with experimental data, related to the flow depths at the centerline and sidewall of the spillway, the velocity profiles on the non-aerated region, and the lateral standing wave width. Regarding the three-dimensional simulations, contours of the flow depth were also represented, to visualize the extent and height of the sidewall shockwaves, according to the smoothed or stepped face. In general, a good agreement was obtained between numerical and experimental results, which confirms the ability of the SHP method to simulate the skimming flow over stepped spillways, or the flow on more conventional, smooth spillway chutes.
16

Escoamento deslizante sobre turbilhões em descarregadores em degraus de largura constante e convergentes, usando o método Hidrodinâmica Suavizada de Partículas / Skimming flow over stepped spillways with non-converging and converging sidewalls using Smoothed Particles Hydrodynamics Method

Nóbrega, Juliana Dorn 23 November 2018 (has links)
O método Hidrodinâmica Suavizada de Partículas (em inglês: Smoothed Particle Hydrodynamics - SPH) foi utilizado para o desenvolvimento de um estudo numérico envolvendo descarregadores lisos e descarregadores em degraus (considerando escoamento deslizante sobre turbilhões), com paredes laterais paralelas e paredes convergentes, usando o software DualSPHysics. Muitas vezes é conveniente utilizar a construção de descarregadores com maior largura na crista, e menor largura do descarregador, para adaptação das limitações físicas locais. O estreitamento do descarregador de forma gradual até atingir a largura da seção de jusante é feito por meio de paredes laterais convergentes, que por sua vez induzem à formação de ondas estacionárias laterais, e consequentemente aumento da altura do escoamento junto às paredes. Existem poucos estudos na literatura sobre esse tema, justificando o estudo numérico desenvolvido neste trabalho. O modelo numérico foi desenvolvido com base em um modelo físico do Laboratório de Hidráulica e Recursos Hídricos do Instituto Superior Técnico, Portugal, sendo os resultados experimentais obtidos em estudos anteriores. A instalação experimental é composta por um descarregador com declividade de fundo de 26,6º, e ângulo das paredes de 0º; 9,9º e 19,3º em relação ao plano vertical. As simulações foram realizadas em duas ou três dimensões, conforme a condição de largura constante ou convergente. Os resultados foram comparados com dados experimentais em termos de alturas do escoamento na parede e no eixo do descarregador, perfis de velocidade na região não-aerada do escoamento, e largura da onda estacionária lateral. Para as simulações tridimensionais, também foram elaborados gráficos de isolinhas para a altura do escoamento, podendo-se observar a extensão das ondas estacionárias laterais conforme a condição de superfície lisa ou em degraus, e a elevação de água junto às paredes. Em geral, houve boa aproximação entre dados numéricos e experimentais, verificando-se a aplicabilidade do método SPH para simular o escoamento deslizante sobre turbilhões em estruturas em degraus, ou estruturas convencionais de paramento liso. / A numerical study using the Smoothed Particle Hydrodynamics method (SPH) was developed for smooth and stepped spillways (for skimming flow regime), with converging and non-converging sidewalls, using the software DualSPHysics. In numerous situations, it is convenient to built spillways with longer width at the crest and narrower width at the downstream end of the spillway, depending on the site constrains. The gradual narrowing of the spillway width is usually made through converging sidewalls, which induce the formation of shockwaves, leading to higher flow depths along the sidewalls. Few studies in the literature were carried out in this research topic to date, justifying the numerical study developed in this project. The numerical model was based on a physical model assembled at the Hydraulic and Water Resources Laboratory of the Instituto Superior Técnico, Portugal, using experimental data obtained in previous studies. The experimental setup was composed by a spillway with slope of 26.6º, and angles of converging sidewalls of 0º, 9.9º, and 19.3º in relation to the vertical plane. Two-dimensional or three-dimensional simulations were carried out according to the condition of constant width or converging walls. The results were compared with experimental data, related to the flow depths at the centerline and sidewall of the spillway, the velocity profiles on the non-aerated region, and the lateral standing wave width. Regarding the three-dimensional simulations, contours of the flow depth were also represented, to visualize the extent and height of the sidewall shockwaves, according to the smoothed or stepped face. In general, a good agreement was obtained between numerical and experimental results, which confirms the ability of the SHP method to simulate the skimming flow over stepped spillways, or the flow on more conventional, smooth spillway chutes.
17

Stategie firmy pro elektronický obchod - platební karty / Company policy for electronical business - credit cards

Šulc, Vladimír January 2009 (has links)
This dissertation work deals with the subject of a company in the area of e-commerce, which represents short-term or long-term plans in controlling the financial relationship toward the outer environment but also inside the company. The problem of possible abuse of credit cards is briefly analysed as well. The impulse for choosing this topic was increasing number of falsification and abusing of credit cards. When this subject is analysed in detail, the problem connected with lack of information on this particular area of crime inevitably appears. Clients of individual banking institutions often do not have even the basic knowledge about the ways their cards could be abused or misused. This is why the question of certain, at least minimal, basic information campaign done by the banks, which are supposed to protect the financial means of their clients. This dissertation work sets its goal in creating the methods of investigation of credit cards abuse not only in the Czech Republic but in the growing system of countries of Schengen Treaty and European Union. The benefit of the work can be seen in the level of theory as well of practice. The theoretical part of the work contains the analysis of the current situation of scientific knowledge in the area of information and communication technology of companies, which is implemented into information systems. Then the advantages and disadvantages connected with this kind of e-commerce are assessed and the specific opportunities for abuse of these media of payment are characterised. The problem sees mainly in writing a specialised publication, which would deal with the problem of abuse and falsification of credit cards and its possible use would be at police academies. Its main part should be the characteristics of particular forms of cards forging and also possible identification of these forgeries. This book could also help in prevention and inform clients of financial institutions about the ways of credit cards abuse. In the practical part, which concentrates on the Czech and foreign market, the author sets the basic premises for realisation of safe business of companies in the Czech Republic and its procedures. Furthermore the reasons of e-commerce abuse in the Czech Republic are analysed and results of quantification research presented. This was concentrated on ascertainment of reason of low interest in information among the public. In the conclusive part of the work the whole problem is summarised and there are also outlined perspectives and possibilities of further development
18

Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais. / New side-channel attacks on devices for manual input of sensitive data.

Faria, Gerson de Souza 09 December 2016 (has links)
Esta tese apresenta três novos ataques a equipamentos de pagamento eletrônico que possuem teclado mecânico, conhecidos como \"PIN pads\". Mostramos de três formas distintas como tais equipamentos possuem vulnerabilidades de segurança na camada física que permitem o vazamento do PIN (Personal Identification Number) quando o mesmo é digitado. Demonstramos experimentalmente que é possível inferir com elevada taxa de acerto (100% em um dos ataques) a senha digitada, de forma não-invasiva. Os ataques desenvolvidos são baseados na introdução de sensores nos próprios equipamentos ou em seu ambiente de operação: acelerômetros para análise de vibração, microfones para análise acústica e células de carga para medição de forças do pressionamento. Devido à massificação no uso de sensores por dispositivos de consumo, o roubo de informação por meios não convencionais é atividade crescente. Os resultados dos ataques de baixo custo realizados expõem sérias deficiências no processo de certificação de segurança de tais equipamentos. / This thesis presents three new attacks on electronic payment equipment having mechanical keypads, known as \"PIN pads\". We show in three different ways how they have security vulnerabilities at the physical layer allowing the leak of the PIN (Personal Identification Number) when it is entered. We experimentally demonstrated that it is possible to infer with high success rate (100% in one of the attacks) the password entered on the device, in a non-invasive way. The attacks are based on the placement of sensors inside the equipment itself or in its operating environment: accelerometers for doing vibration analysis, microphones for acoustic analysis and load cells for measuring the pressing force. Due to massive deployment of sensors in consumer devices, information theft by unconventional means is increasing. The results of the low-cost attacks here developed expose serious shortcomings in the process of security certification of such equipment.
19

Novos ataques de canal secundário a dispositivos de entrada manual de dados confidenciais. / New side-channel attacks on devices for manual input of sensitive data.

Gerson de Souza Faria 09 December 2016 (has links)
Esta tese apresenta três novos ataques a equipamentos de pagamento eletrônico que possuem teclado mecânico, conhecidos como \"PIN pads\". Mostramos de três formas distintas como tais equipamentos possuem vulnerabilidades de segurança na camada física que permitem o vazamento do PIN (Personal Identification Number) quando o mesmo é digitado. Demonstramos experimentalmente que é possível inferir com elevada taxa de acerto (100% em um dos ataques) a senha digitada, de forma não-invasiva. Os ataques desenvolvidos são baseados na introdução de sensores nos próprios equipamentos ou em seu ambiente de operação: acelerômetros para análise de vibração, microfones para análise acústica e células de carga para medição de forças do pressionamento. Devido à massificação no uso de sensores por dispositivos de consumo, o roubo de informação por meios não convencionais é atividade crescente. Os resultados dos ataques de baixo custo realizados expõem sérias deficiências no processo de certificação de segurança de tais equipamentos. / This thesis presents three new attacks on electronic payment equipment having mechanical keypads, known as \"PIN pads\". We show in three different ways how they have security vulnerabilities at the physical layer allowing the leak of the PIN (Personal Identification Number) when it is entered. We experimentally demonstrated that it is possible to infer with high success rate (100% in one of the attacks) the password entered on the device, in a non-invasive way. The attacks are based on the placement of sensors inside the equipment itself or in its operating environment: accelerometers for doing vibration analysis, microphones for acoustic analysis and load cells for measuring the pressing force. Due to massive deployment of sensors in consumer devices, information theft by unconventional means is increasing. The results of the low-cost attacks here developed expose serious shortcomings in the process of security certification of such equipment.
20

電信普及服務制度之研究 / A study on Universal service obligations in Telecommunications Environment

黃世雄 Unknown Date (has links)
過去電信事業強調無論任何一端用戶透過電話機、傳輸線路、交換機等網路連接至另一端用戶,進行點對點(end to end)語音或數據之通信時,基於網路不可分割之特性,進行整體固定網路設備投資相當龐大,且因具規模經濟特性而形成自然獨占;加以其多屬民生攸關之公用事業,又須具備一定之服務品質及可負擔之合理價格,始能提供不論居住何處之全國民眾使用,故大多由政府主導經營。   然隨著電信自由化來臨,民國八十五年七月一日電信解制,分為監理電信業務之電信總局及國營事業之中華電信公司,確立監管架構及電信業務開放以引進競爭市場。惟為避免新進業者會對更多需求及更可獲利的城市地區首先提供服務,而忽略了鄉村偏遠地區,形成吸脂作用(Cream skimming)。故顯然電信自由化後,儘管商業利益的考量是競爭市場存續的重要因素之一,然而為避免關切公共服務的精神隨之而消失,那麼政府如何適度藉入以求得其間的平衡性,這應屬必要的。   基本上,應以國民基本通信之概念考量普及服務之範圍,同時應基於公平及合理的原則下,以負擔得起且日常生活中有必要的電信服務;然由於在公平的、合理的、負擔得起、有必要性等充分條件下,仍須加上一定的「服務品質」為必要條件,才能使普及服務的精神顯露,特別在隨著電信科技發展、社會環境變遷及民眾需求,仍須作階段性不同之定義,才能符合普及服務的真正目的。   因此,本論文採用文獻探討、政策德菲法(Delphi method)及實例探討,從管制理論的基礎,說明管制因環境之所需,尤其當電信自由化之初,引入市場競爭之同時,適時的管制對於公平的競爭是有需要的;另再參酌美國、英國、澳洲、香港及法國等先進國家之電信普及服務機制,透過美國、英國、澳洲及香港等國家之電信監理機構之網站,及相關電信自由化之文獻,蒐集到各國對普及服務相關之管理方式與法規規定,歸納出各國對普及服務目標之界定,普及服務之提供者,成本計算方式,分攤普及服務之義務者及分攤方式等,再進行整理、分析與比較,嚐試提出一個適合國情的普及服務制度,並對實務執行所面對的問題提出建議,以供主管機關參考。   本論文結論重點為,除建立一套含理論及實務運作的電信普及服務機制外,為發現整理出相關問題如:(1)「電信事業普及服務基金」非為政府基金之管理,是否須要編列年度業務計畫及預算書,值得商榷。(2)就商業利益考量,固網業者收取申裝市內電話之「界外工料費」應無不可,然是否能適用普及服務補助的問題。(3)易將普及服務基金視為另一個社會安全或防災救助的課題,扭曲其設立之精神。(4)提供普及服務所產生之無形利益是否應納入棄置營收之計算。(5)海岸電台船舶遇險及安全通信服務是否納入普及服務之考量。   其政策建議重點則為:(1)為消彌外界之疑慮,並兼顧效率運作之原則,除必要之管理費用應撙節使用外,相關之收支帳目宜經由會計師簽證予以公開透明化。(2)為維護消費者之權利,裝置材料費用應有下降趨勢,應重新檢討並提出合理成本,訂定合理之收費方式。(3)社會安全或急難救助所經費,應由社會福利安全政策編列預算支應,以免增加電信業者之成本負擔,並轉價至最終消費者。(4)無形利益應可加以計算納入棄置營收項目內,可利用每一家或前五大業者平均的廣告效果估算;或利用消費者行為之抽樣問卷調查,求出潛在消費者及平均消費之貢獻,做為無形利益的推估。(5)可成立專案小組,針對海岸電台設備及維運費用等訂定效率化之衡量標準;或以公開招標方式,徵求自願投入之電信業者;或協調海巡暑整編至該單位。(6)必須建立一套成本資料管理及稽核制度,以增加核算資料的明確性。(7)考慮修法開放可以行動電話做為普及服務之提供,公開徵詢有興趣之行動電話業者,並於北、中、南區各找一處以行動電話提供普及服務之實驗。(8)第一類電信事業部分,可由普及服務管理委員會就經營效率性、虧損之持續性等相關因素,予以審核後得免予繳交;第二類電信事業部分,以經營語音單純轉售及網路電話兩項從事語音電話服務為主,衡酌經營差異程度,排除一定營業額以下者可免予繳交。 / In the past, in order to provide seamless end-to-end communications services for the end users, telecom enterprises that required cost-sunk expenditure, economies of scale and operated an indivisible network had been regarded as a naturally monopolistic business. Moreover, telecommunications as one of public services relevant to the people’s livelihood has to be provided for all nationals at an affordable price and a reasonable level of service quality. As a result, most telecom enterprises worldwide were operated and conducted by the Government.   Nevertheless, along with the global trend of telecom liberalization, on July 1 1996 our government reorganized the DGT into a sole telecom regulator and established the state-own holding company, CHT, to provide telecom services, with a view to build up a regulatory regime and to open the telecom market further. To avoid newcomers in a competitive environment tending to focus on high revenue growth telecommunication markets, such as metropolitan areas, resulting in the phenomenon of ‘cream skimming’ and in the impediment to the spirit of public services, there is a need for government intervention in the provision of telecom services.   Basically, the concept of universal telecommunications service shall be confined to the basic telecommunication services which are indispensable to every citizens and should be provided on reasonable request at an affordable price and a reasonable level of quality. However, universal telecommunications service might has different definitions over time so as to fulfill its policy objectives in each phase given the development of technologies and the changes in social environment.   Accordingly, by conducting Documentary-type method, Delphi method and Case Studies, this dissertation has illustrated with regulatory theory why regulation shall be based on the requirement of the environment. Particularly, during the early stages of telecom liberalization, regulatory involvement at right moment is required for creating a level-playing field when introducing competition. From the websites of several telecom regulators in advanced countries, e.g. US, UK, Australia, HK, etc., and some literatures on telecom liberalization, this dissertation has collected those countries’ management criteria and legal framework for universal service and summed up their universal service objectives, providers, cost calculation methods and obligation sharing mechanisms. Then through a further analysis and comparison, it has tried to propose a universal service mechanism that might better fit our national conditions and offer the authority concerned some practical recommendations for the implementation issues.   In conclusion, this dissertation has built up a universal telecommunications service mechanism based on both theoretical analyses and practical considerations. Besides, it has included some key findings as follows: (1) Given the fact that the universal service fund is not one kind of government funds, shall it still be managed through annual official planning and budgeting? (2) From a viewpoint of profitable undertaking, a fixed network operator might want to charge a remote subscriber outside its service area for some extra facilities fees for service installation. This might be reasonable under commercial terms. But shall we allow such extra fees to be subsidized by the universal service fund? (3) Some people might regard the purpose of the universal service fund as an issue on social security or emergency rescue, and hence distort the spirit of universal service fund. (4) It is questionable whether intangible benefits, resulting form the provision of universal service, could be grouped into revenue forgone. (5) Is it appropriate for an operator to recover its costs of providing coastal radio maritime emergency and safety communication services from the universal service fund?   Furthermore, it has given several key policy recommendations as follows: (1) For the sake of dispelling people’s doubts and managing the efficiency in universal service fund, all of the accounts of expenditures shall be open and transparent except that the administrative costs must be kept at minimum. (2) In order to protect consumers’ rights, the equipment installation fee should follow a downward trend and must be cost based. (3) To avoid increasing the burden of telecom operators whose costs are ultimately entailed by consumers, budgets for social security or emergency rescue should be supported by national social welfare policies. (4) Intangible revenue that might be calculable by evaluating average effect of advertisement of each operator or top five operators should be grouped into revenue foregone. Or it may be possible to make a sampling survey of consumers’ behavior, finding the average contribution of each potential customer so as to estimate intangible revenue. (5) Grouping a task force to revise measuring criteria for the facilities and maintenance costs in coastal radio services efficiently. Besides, bids for these services may be opened for volunteers, or be coordinated with and incorporated into the function of Coast Guard Administration, Executive Yuan. (6) It is necessary to build up a mechanism of data management and auditing so as to increase the accountability of re-calculating data. (7) To think over the feasibility that mobile phone can be used for the provision of universal service as well by revising the relevant laws, and then in North, Middle, and South Taiwan, try to conduct a field trial in each area for providing universal service by using mobile phone. (8) For Type I telecommunications businesses, universal service committee can exempt them from universal service obligations with the concerns about their operation efficiency and the duration of losing money, and so on. For Type II telecommunications businesses, only those operating voice communications services, including simple resale and internet phone services, should bear the obligations, but whether they need to make contributions to the universal service fund or not can be decided through the evaluation of their business performance.

Page generated in 0.0695 seconds