110,704 research outputs found

    A Systemic View of South Africa’s Software Industry

    Get PDF
    Computer software are increasingly becoming an integral part of how businesses and society at large can innovatively use technology to increase efficiency, set up new business models as well as improve their overall productivity. Developing countries are also realising the potential impact of a successful software industry on structural transformation, education, innovation, service delivery, job creation and export revenue. While these positive impacts of a successful software industry have been well documented, there is also evidence that failure to establish the right policies can severely hinder prospects of a country in realising the benefits. The paper makes use of system thinking techniques to explore the systemic issues implicated in the South Africa’s software industry and advocates for the government to take an active role in spearheading an industry that can have a sustainable and meaningful impact to businesses and the society at large. This requires the government to carefully and strategically mediate the efforts and interests of stakeholders in private sector as well as academia

    Growth, Integration and Spillovers in the Central and East European Software Industry

    Get PDF
    This paper explores growth and competitive advantage in CEE software firms; it looks at the role of strategic partnerships and industry (spillover) effects. The empirical analysis is based on survey data from 224 software firms from six CEE countries (Bulgaria, Czech R, Estonia, Serbia, Slovenia, Romania). The results of the descriptive analysis are interpreted from the perspective of the role of capabilities in industrial development. The analysis shows that the patterns of growth are a mix of sector, region and sub--region specific determinants and show important national differences. This suggests that the CEE software industry cannot be considered as a homogenous phenomenon. There is no general tendency towards an expansion in exports; based on our sample only Romania is developing an export oriented software industry. Research shows that the CEE software industry is populated by young, dedicated, domestic firms, which are independent, and privately owned and which are mainly oriented towards localisation of software. They are strongly dependent for trade and production on alliances and strategic partnerships with foreign partners and a small share of technology based partnerships. There is an extensive process of industry upgrading underway, involving country and sub-region specific changes. The spillover effects are significant, through links with clients and intensive intra-industry knowledge transfer through high employment turnover and potentially high knowledge transfer from foreign to local projects. Differences between central and eastern Europe are strong in terms of degree of diversification of software supply, industrial upgrading and quality of demand. The pattern of software development in CEE differs from that in other emerging markets in the sense that it is domestic market oriented, but with an emerging export market for services. Its further growth and upgrading will be strongly dependent on the acquisition of organisational capabilities by local firms

    Encryption’s Importance to Economic and Infrastructure Security

    Get PDF
    Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården. Inom hälso- och sjukvården är network coopetition ett ämne som fått liten uppmärksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hälso- och sjukvården. Modellen applicerades sedan på en del av vårdkedjan för patienter i behov av neurokirurgisk vård. Resultaten från avhandlingen visar att: (1) Förutsättningarna för network coopetition i vårdkedjan för patienter i behov av neurokirurgisk vård är uppfyllda. (2) Det finns exempel på horisontell network coopetition i den studerade vårdkedjan. (3) Det existerar en diskrepans mellan hur aktörerna  ser  på  sitt  eget  och  de  andra  aktörernas  värdeskapande. (4)  Värdeskapandet bör utvärderas som ett gemensamt system där hänsyn tas till alla aktörer och utvärderas på process- nivå där hänsyn tas till alla intressenter. Dessa resultat leder fram till den övergripande slutsatsen är att network coopetition bör kunna öka värdeskapandet för högspecialiserade vårdkedjor med en stor andel inomlänspatienter.The overall purpose of this thesis was to investigate whether network coopetition, cooperation between competitive actors, can increase the value creation within the health care system. Within health care, network coopetition is a subject granted little attention in previous research. To fulfil the purpose a model for network coopetition within the health care system was developed. The model was the applied to one part of the chain of care for patients in need of neurosurgery. The results from this thesis show: (1) The conditions for network coopetition in the chain of care for patients in need of neurosurgery are fulfilled. (2) Examples of horizontal network coopetition have been found in the studied chain of care. (3) There is an existing discrepancy between how each actor recognizes its own and the other actors’ value creation. (4) The value creation ought to be evaluated as a common system where all actors are taken into account and at a process level where all stakeholders are considered. These results supports the final conclusion that network coopetition ought to be able to increase the value creation for highly specialized chain of cares with a large share of within-county patients

    Computer-Aided System for Wind Turbine Data Analysis

    Get PDF
    Context: The current work on wind turbine failure detection focuses on researching suitable signal processing algorithms and developing efficient diagnosis algorithms. The laboratory research would involve large and complex data, and it can be a daunting task. Aims: To develop a Computer-Aided system for assisting experts to conduct an efficient laboratory research on wind turbine data analysis. System is expected to provide data visualization, data manipulation, massive data processing and wind turbine failure detection. Method: 50G off-line SCADA data and 4 confident diagnosis algorithms were used in this project. Apart from the instructions from supervisor, this project also gained help from two experts from Engineering Department. Java and Microsoft SQL database were used to develop the system. Results: Data visualization provided 6 different charting solutions and together with robust user interactions. 4 failure diagnosis solutions and data manipulations were provided in the system. In addition, dedicated database server and Matlab API with Java RMI were used to resolve the massive data processing problem. Conclusions: Almost all of the deliverables were completed. Friendly GUI and useful functionalities make user feel more comfortable. The final product does enable experts to conduct an efficient laboratory research. The end of this project also gave some potential extensions of the system

    Personal Data Security: Divergent Standards in the European Union and the United States

    Get PDF
    This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the advantages this advanced data security system provides. Part I discusses the EU\u27s legislative efforts to ensure personal data security and analyzes the evolution of encryption technology in the United States. Part II examines the methods employed by the U.S. Government to establish EES as the de facto U.S. encryption standard. Part III argues that the U.S. Government should terminate its effort to establish EES as the de facto U.S. encryption standard and institute an alternative standard that ensures continued U.S. participation in the international marketplace

    The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election

    Full text link
    In the world's largest-ever deployment of online voting, the iVote Internet voting system was trusted for the return of 280,000 ballots in the 2015 state election in New South Wales, Australia. During the election, we performed an independent security analysis of parts of the live iVote system and uncovered severe vulnerabilities that could be leveraged to manipulate votes, violate ballot privacy, and subvert the verification mechanism. These vulnerabilities do not seem to have been detected by the election authorities before we disclosed them, despite a pre-election security review and despite the system having run in a live state election for five days. One vulnerability, the result of including analytics software from an insecure external server, exposed some votes to complete compromise of privacy and integrity. At least one parliamentary seat was decided by a margin much smaller than the number of votes taken while the system was vulnerable. We also found protocol flaws, including vote verification that was itself susceptible to manipulation. This incident underscores the difficulty of conducting secure elections online and carries lessons for voters, election officials, and the e-voting research community
    corecore