23,551 research outputs found

    A comparison between e-government practices in Taiwan and New Zealand.

    Get PDF
    Few studies have focused on comparing the state of e-government in Western- and Non-Western settings, where the political, social, economic, and cultural environments can be markedly different. This paper compares the views of local authority policymakers in Taiwan and New Zealand, in order to judge the sophistication of their e-government initiatives via the formal and informal policies underpinning website development. Good level of agreement were observed between the Taiwanese and New Zealander respondents for the high levels of significance they attached to 3 key issues, which the authors argue are critical for successful e-government: Accessibility, Security and Privacy. Similarly, the policymakers agreed on a medium level of significance for the 7 key issues: E-procurement, Digital Divide, Private Sector, Taxation, Cultural Obstacles, IT Workforce, and Social Effects (and on a low level of significance for E-Tailing). It was concluded that government policymakers in both countries, in an era of commercial online social networking, are continuing to favour pushing(what they deem to be important) information to citizens, rather than creating collaborative service channels with citizens, contractors and suppliers or integrating separate service processes to satisfy all stakeholders. An attendant lack of commitment to promoting heightened (e-)democracy was also noted, especially in New Zealand

    How Mobile Devices are Transforming Disaster Relief and Public Safety

    Get PDF
    With its growing usage, mobile technology is greatly improving disaster relief and public safety efforts. Countries around the world face threats from natural disasters, climate change, civil unrest, terrorist attacks, and criminal activities, among others. Mobile devices, tablets, and smart phones enable emergency providers and the general public to manage these challenges and mitigate public safety concerns.In this paper, part of the Brookings Mobile Economy Project, we focus on how mobile technology provides an early warning system, aids in emergency coordination, and improves public communications. In particular, we review how mobile devices assist with public safety, disaster planning, and crisis response. We explain how these devices are instrumental in the design and functioning of integrated, multi-layered communications networks. We demonstrate how they have helped save lives and ameliorate human suffering throughout the world

    On the international ranking and classification of research universities

    Get PDF

    The world of synchrotrons

    Get PDF
    A summary of results on synchrotron radiation is presented along with notes on its properties and applications. Quantum aspects are briefly mentioned. Synchrotron radiation facilities are described briefly with a detailed coverage to the accelerator programmes in India. The relocated and other upcoming synchrotrons are also described in some detail.Comment: ReVTeX, 07 pages, in Resonance, 6, No. 11, pp. 77-86 (November 2001). http://www.pd.infn.it/~khan/ and http://www.imsc.ernet.in/~jagan

    Information Literacy in the Workplace: A Cross-cultural Perspective

    Get PDF
    This cross-cultural study has two main purposes: to investigate how information literacy is perceived in the workplace and to discover how employees obtain information to carry out their jobs in an effective and timely fashion. This project applies a mix of research methods, including site visits, interviews, and a survey. More than 120 participants from forty companies were involved in this study. They were from a wide variety of industries in Taiwan and Silicon Valley, in Northern California, where many companies base offices or operations from around the world. Major obstacles in conducting cross-continent research are cost, time demands, scheduling, and adaptation to local culture. In this global economy, cross-cultural and cross-border research will help educators, such as librarians, understand the complexity of skills expected in the workplace. Much has been written on information literacy, yet very few can relate how information literacy is applied in the workplace. This primary study sheds some light to help academic librarians reposition themselves as researchers-educators integral to student success

    Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

    Full text link
    The advance of smartphones and cellular networks boosts the need of mobile advertising and targeted marketing. However, it also triggers the unseen security threats. We found that the phone scams with fake calling numbers of very short lifetime are increasingly popular and have been used to trick the users. The harm is worldwide. On the other hand, deceptive advertising (deceptive ads), the fake ads that tricks users to install unnecessary apps via either alluring or daunting texts and pictures, is an emerging threat that seriously harms the reputation of the advertiser. To counter against these two new threats, the conventional blacklist (or whitelist) approach and the machine learning approach with predefined features have been proven useless. Nevertheless, due to the success of deep learning in developing the highly intelligent program, our system can efficiently and effectively detect phone scams and deceptive ads by taking advantage of our unified framework on deep neural network (DNN) and convolutional neural network (CNN). The proposed system has been deployed for operational use and the experimental results proved the effectiveness of our proposed system. Furthermore, we keep our research results and release experiment material on http://DeceptiveAds.TWMAN.ORG and http://PhoneScams.TWMAN.ORG if there is any update.Comment: 6 pages, TAAI 2017 versio

    Public service in the information age: A study of e-government in Taiwan

    Get PDF
    This article reviews the literature on e-government and discusses policy implications stemming from e-government initiatives in Taiwan. Drawing from evaluation frameworks established in previous research, this study surveys the content of 62 websites maintained by the local, secondary and central government. Study findings suggest that, while Taiwan has made significant progress in deploying e-government initiatives across different administrative levels-especially in delivering a single service window model providing one-stop service for citizens and businesses-the technology\u27s overall implementation is hampered by operational inconsistencies at the local level and differential access across the population. The article argues that to fully realise the potential of e-government, the Taiwanese government should adopt systematic measures that reach beyond service delivery to encourage wider citizen inclusion and civic participation

    Information Technology Applications in Hospitality and Tourism: A Review of Publications from 2005 to 2007

    Get PDF
    The tourism and hospitality industries have widely adopted information technology (IT) to reduce costs, enhance operational efficiency, and most importantly to improve service quality and customer experience. This article offers a comprehensive review of articles that were published in 57 tourism and hospitality research journals from 2005 to 2007. Grouping the findings into the categories of consumers, technologies, and suppliers, the article sheds light on the evolution of IT applications in the tourism and hospitality industries. The article demonstrates that IT is increasingly becoming critical for the competitive operations of the tourism and hospitality organizations as well as for managing the distribution and marketing of organizations on a global scale

    Extreme Candidates as the Beneficent Spoiler? Range Effect in the Plurality Voting System

    Full text link
    How does the entrance of radical candidates influence election results? Conventional wisdom suggests that extreme candidates merely split the votes. Based on the range effect theory in cognitive psychology, we hypothesize that the entrance of an extreme candidate reframes the endpoints of the ideological spectrum among available candidates, which makes the moderate one on the same side to be perceived by the voters as even more moderate. Through two survey experiments in the United States and Taiwan, we provide empirical support for range effect in the vote choice in the plurality system. The results imply that a mainstream party can, even without changing its own manifesto, benefit from the entrance of its radical counterpart; it explains why the mainstream party may choose cooperation strategically. Our findings also challenge the assumption in regression models that the perceived ideological positions of candidates are independent of each other
    • 

    corecore