首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
移动政务是将移动技术运用于政府行政管理,为公众及企业提供公共服务。本文阐述了移动政务与移动服务的概念,内容与应用;简要探讨了发展中国家的移动通信现状;分析了移动政务为公众提供的移动服务案例;探讨了移动政府所带来的机遇与挑战并界定了发展中国家的移动服务。  相似文献   

2.
国内外移动电子商务的发展现状与制约因素的解析   总被引:4,自引:0,他引:4  
移动商务作为一种新的商务模式, 随着移动网络和移动终端的不断发展, 移动商务必将成为未来经济增长的重要推动力量.而在我国移动商务目前仍处于发展的初级阶段, 本文以最新的数据分析了国内外移动电子商务的发展现状,并重点指出了我国移动商务发展滞后的主要因素.  相似文献   

3.
李立威 《现代情报》2014,34(6):171-176
随着手机网民数量的不断增加,各种创新的移动商务服务不断涌现。用户对不同移动商务服务的采纳行为存在明显差异。本文在对国内外移动商务分类进行界定的基础上,对移动支付、移动银行、移动证券、移动信息、移动广告、移动购物等不同移动商务服务的用户采纳研究的国内外文献进行了综述,并从研究方法、研究对象、未来研究方向三方面进行了述评。  相似文献   

4.
刘金玲 《现代情报》2012,32(8):12-1
移动互联网已逐渐渗透到人们工作、生活的各个领域,正在深刻改变着信息时代社会生活的方方面面。在这样的背景下,图书馆以传统图书馆、数字图书馆的发展成果为基础,结合最新的移动通信技术应用,开辟出新的服务技术和服务方法,建立基于移动互联网的移动搜索服务、移动阅读服务、移动自助服务、个人移动空间、移动学习社区和移动身份认证及移动支付服务等全新服务体系,以满足读者在移动互联网环境下的信息服务需求。  相似文献   

5.
简要介绍了当前移动图书馆服务产生的背景,概括了图书馆移动服务的含义及特点,高校图书馆开展移动服务的意义,当前移动服务的主要模式等.  相似文献   

6.
移动互联网技术、移动终端技术的快速发展推动制造企业的经营管理方式向移动商务模式转变。根据制造企业自身组织关系、业务关系与业务流程的复杂性特点,分析移动互联网环境下促进制造企业现有商务模式变革的驱动因素,研究制造企业的移动经营管理模式,提出基于移动互联网的制造企业移动商务模式以及与ERP软件厂商、移动终端厂商、移动互联网运营商的合作策略。  相似文献   

7.
本文结合未来传感网络发展方向,研究多层移动传感网络中移动聚集节点sink的移动控制策略.首先介绍移动传感器网络的相关研究工作,进而介绍多层移动传感网络结构模型,研究网络结构中移动聚集节点Sink的移动策略,提出了一种基于Delaunay三角剖分的Sink节点移动控制策略模型.  相似文献   

8.
彭涛 《今日科苑》2009,(18):158-158
随着移动计算技术的发展,移动数据库逐步走向应用,未来的应用前景将更加广阔。本文分析移动数据库的特点、体系结构;介绍移动数据库的复制缓存技术,根据移动数据库的典型模型提出了移动数据库的复制缓存综合策略。  相似文献   

9.
随着移动通信技术的发展和移动设备的普及,企业管理将逐渐进入移动商务时代。移动商务的优越性使得供应链成本管理面临新一轮的机遇和挑战。本文介绍了移动商务和移动供应链管理模式,并系统地阐述了移动商务环境下的供应链成本管理。  相似文献   

10.
分析了目前读者移动阅读环境,从阅读内容的推荐、移动阅读指导技术的应用、移动阅读软件的评估和推荐、移动阅读指导的细节等方面,提出了高校图书馆移动阅读的指导方式。  相似文献   

11.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

12.
中德海洋学核心期刊论文国际合著的比较分析   总被引:1,自引:0,他引:1  
万琪  华薇娜 《现代情报》2016,36(2):150-156
本研究选取Web of Science数据库,收集中国和德国发表的海洋学论文,将论文分为国际合著组与非国际合著组,利用文献计量学的方法,借助EXCEL、SPSS和UCINET软件,比较两国各年的发文量、论文的篇均作者和篇均参考文献数、收录期刊的影响因子、论文的被引频次以及合著国家。研究结果显示,中国海洋学领域的国际合著起步晚于德国,但发展迅速,近年来中国海洋学国际合著的论文量已超过德国;同时中国海洋学国际合著论文的质量和学术影响力都弱于德国,并且中国海洋学论文合著国家的范围也小于德国海洋学的合著国家。  相似文献   

13.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

14.
The main premise of this article is that in information societies generally, and in virtual social contexts particularly, a distinctive style of interaction to facilitate the communication of difference, heterotopic communication , has emerged. It rests on two cultural foundations: an ideological belief in the positive, socially integrating power of communication, and a prevailing ethic of instrumental rationality, subjective individualism, and strategically practiced self-interest. The former is demonstrated by the use of simulation and spectacle as sources of information; exhibitionism/voyeurism as a communicative style; and the awareness of surveillance. The latter is seen in the competitive use of knowledge as a commodity; a surface globalism masking deep parochialism; lateral as well as vertical information inequity; and the use of public versus private as strategies for engagement rather than as spaces. Those who engage in heterotopic communication resort to their 'own devices' both in the sense of personal agendas, strategies, interests, and interpretations, and in the form of the telecommunication tools that help realize them. These personal and technological devices allow individuals with the right educational and technical resources to avoid exposure to disagreement, difference, or other information that does not serve their direct purposes or reflect their particular views of the world; yet they also help convey the appearance of openness, availability, and cooperation. This style of interaction is used strategically in combination with information and communication technologies to gain social or economic advantages, but it may encourage social separatism and parochialism, inhibit the negotiation of disputes, and emphasize competing interests.  相似文献   

15.
This article presents an account of the process of development of the NSFNET and its significance for the emergence of the Internet of the 1990s. The fact that the development of the interconnected system of computer networks occurred within the realm of academic research is not incidental. The dynamics of the world of scientific research were intimately related to the shaping of the network and to the way in which it spread to other sectors of society. The construction of computer networks crossed the boundaries between science and society in order to build the scientific realm by transforming the world in which it is embedded.  相似文献   

16.
The development of vaccines to prevent infectious diseases has been one of the most important contributions of biomedical sciences. Increasing understanding in biochemistry, molecular biology, molecular genetics and related fields have provided an opportunity for the development of new generation vaccines that are based on rational design approaches. This is possible because of proper understanding of the microbial-genetics, biochemistry, host-pathogen interaction and recent developments in molecular immunology. Another important improvement made in the quality of vaccine production is the incorporation of immunomodulators or adjuvants with modified delivery vehicles viz liposomes, Iscoms and microspheres apart from alum being used as a gold standard. This article reviews the art of vaccination from Jenner period to present day context highlighting all the developments made at each stage of the vaccine development. Various criteria have been discussed regarding the selection of epitopes that expand B & T cells, its linkage with other accessory cells of the immune system, means to overcome MHC linked immune unresponsiveness, enhanced antigen processing and presentations that specially induce either helper or cytotoxic or mucosal immune responses were critically discussed.  相似文献   

17.
Trust between transaction partners in cyberspace has come to be considered a distinct possibility. In this article the focus is on the conditions for its creation by way of assuming, not inferring trust. After a survey of its development over the years (in the writings of authors like Luhmann, Baier, Gambetta, and Pettit), this mechanism of trust is explored in a study of personal journal blogs. After a brief presentation of some technicalities of blogging and authors’ motives for writing their diaries, I try to answer the question, ‘Why do the overwhelming majority of web diarists dare to expose the intimate details of their lives to the world at large?’ It is argued that the mechanism of assuming trust is at play: authors simply assume that future visitors to their blog will be sympathetic readers, worthy of their intimacies. This assumption then may create a self-fulfilling cycle of mutual admiration. Thereupon, this phenomenon of blogging about one’s intimacies is linked to Calvert’s theory of ‘mediated voyeurism’ and Mathiesen’s notion of ‘synopticism’. It is to be interpreted as a form of ‘empowering exhibitionism’ that reaffirms subjectivity. Various types of ‘synopticon’ are distinguished, each drawing the line between public and private differently. In the most ‘radical’ synopticon blogging proceeds in total transparency and the concept of privacy is declared obsolete; the societal gaze of surveillance is proudly returned and nullified. Finally it is shown that, in practice, these conceptions of blogging are put to a severe test, while authors often have to cope with known people from ‘real life’ complaining, and with ‘trolling’ strangers.  相似文献   

18.
军队信息化的动因、任务及对策探讨   总被引:2,自引:0,他引:2  
基于未来高技术战争需求的牵引、军用信息技术发展的推动和构建核心能力的内在要求,我军必须加快信息化建设。为此,本文运用战略管理中的价值链方法对军队的任务及军队信息化的任务进行了全面分析,并提出了加速我军信息化建设的对策。  相似文献   

19.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

20.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号