110,704 research outputs found
A Systemic View of South Africa’s Software Industry
Computer software are increasingly becoming an integral part of how businesses and society at large can innovatively use technology to increase efficiency, set up new business models as well as improve their overall productivity. Developing countries are also realising the potential impact of a successful software industry on structural transformation, education, innovation, service delivery, job creation and export revenue. While these positive impacts of a successful software industry have been well documented, there is also evidence that failure to establish the right policies can severely hinder prospects of a country in realising the benefits. The paper makes use of system thinking techniques to explore the systemic issues implicated in the South Africa’s software industry and advocates for the government to take an active role in spearheading an industry that can have a sustainable and meaningful impact to businesses and the society at large. This requires the government to carefully and strategically mediate the efforts and interests of stakeholders in private sector as well as academia
Growth, Integration and Spillovers in the Central and East European Software Industry
This paper explores growth and competitive advantage in CEE software firms; it looks at the role of strategic partnerships and industry (spillover) effects. The empirical analysis is based on survey data from 224 software firms from six CEE countries (Bulgaria, Czech R, Estonia, Serbia, Slovenia, Romania). The results of the descriptive analysis are interpreted from the perspective of the role of capabilities in industrial development. The analysis shows that the patterns of growth are a mix of sector, region and sub--region specific determinants and show important national differences. This suggests that the CEE software industry cannot be considered as a homogenous phenomenon. There is no general tendency towards an expansion in exports; based on our sample only Romania is developing an export oriented software industry. Research shows that the CEE software industry is populated by young, dedicated, domestic firms, which are independent, and privately owned and which are mainly oriented towards localisation of software. They are strongly dependent for trade and production on alliances and strategic partnerships with foreign partners and a small share of technology based partnerships. There is an extensive process of industry upgrading underway, involving country and sub-region specific changes. The spillover effects are significant, through links with clients and intensive intra-industry knowledge transfer through high employment turnover and potentially high knowledge transfer from foreign to local projects. Differences between central and eastern Europe are strong in terms of degree of diversification of software supply, industrial upgrading and quality of demand. The pattern of software development in CEE differs from that in other emerging markets in the sense that it is domestic market oriented, but with an emerging export market for services. Its further growth and upgrading will be strongly dependent on the acquisition of organisational capabilities by local firms
Encryption’s Importance to Economic and Infrastructure Security
Det övergripande syftet med den här avhandlingen var att utreda om network coopetition, samarbete mellan konkurrerande aktörer, kan öka värdeskapandet inom hälso- och sjukvården. Inom hälso- och sjukvården är network coopetition ett ämne som fått liten uppmärksamhet i tidigare studier. För att besvara syftet utvecklades en modell för network coopetition inom hälso- och sjukvården. Modellen applicerades sedan på en del av vårdkedjan för patienter i behov av neurokirurgisk vård. Resultaten från avhandlingen visar att: (1) Förutsättningarna för network coopetition i vårdkedjan för patienter i behov av neurokirurgisk vård är uppfyllda. (2) Det finns exempel på horisontell network coopetition i den studerade vårdkedjan. (3) Det existerar en diskrepans mellan hur aktörerna ser på sitt eget och de andra aktörernas värdeskapande. (4) Värdeskapandet bör utvärderas som ett gemensamt system där hänsyn tas till alla aktörer och utvärderas på process- nivå där hänsyn tas till alla intressenter. Dessa resultat leder fram till den övergripande slutsatsen är att network coopetition bör kunna öka värdeskapandet för högspecialiserade vårdkedjor med en stor andel inomlänspatienter.The overall purpose of this thesis was to investigate whether network coopetition, cooperation between competitive actors, can increase the value creation within the health care system. Within health care, network coopetition is a subject granted little attention in previous research. To fulfil the purpose a model for network coopetition within the health care system was developed. The model was the applied to one part of the chain of care for patients in need of neurosurgery. The results from this thesis show: (1) The conditions for network coopetition in the chain of care for patients in need of neurosurgery are fulfilled. (2) Examples of horizontal network coopetition have been found in the studied chain of care. (3) There is an existing discrepancy between how each actor recognizes its own and the other actors’ value creation. (4) The value creation ought to be evaluated as a common system where all actors are taken into account and at a process level where all stakeholders are considered. These results supports the final conclusion that network coopetition ought to be able to increase the value creation for highly specialized chain of cares with a large share of within-county patients
Recommended from our members
China-U.S. Trade Issues
[Excerpt] U.S.-China economic ties have expanded substantially over the past several years. Total U.S.-China trade, which totaled only 387 billion in 2007. China overtook Japan to become the third largest U.S. export market, and overtook Canada to become the largest source of U.S. imports. With a huge population and a rapidly expanding economy, China is a potentially huge market for U.S. exporters. However, U.S.-China economic relations have become strained over a number of issues, including large and growing U.S. trade deficits with China (which hit $256 billion in 2007), China’s failure to fully implement its World Trade Organization (WTO) commitments (especially in regards to protection of intellectual property rights), its refusal to adopt a floating currency system, its use of industrial policies and other practices deemed unfair and/or harmful to various U.S. economic sectors, and failure to ensure that its exports to the United States meet U.S. health and safety standards. The Bush Administration has come under increasing pressure from Congress to take a more aggressive stance against various Chinese economic and trade practices. In response, it filed a number of trade dispute resolution cases against China in the WTO, including China’s failure to protect IPR and afford market access for IPR-related products, discriminatory regulations on imported auto parts, and import and export subsidies to various industries in China. In addition, the Administration reversed a long-standing policy that countervailing cases (dealing with government subsidies) could not be brought against non-market economies (such as China). In December 2006, the Administration began a “Strategic Economic Dialogue” (SED) with China to discuss major long-term economic issues between the two countries; the latest SED talks were held in December 2007. In response to growing concerns in the United States over the health, safety, and quality of certain Chinese products, the Administration in 2007 concluded agreements with China on toys, food and feed, drugs and medical devices, and tires. Numerous bills have been introduced in Congress that would impact U.S.-China economic relations. H.R. 321, H.R. 782, H.R. 1002, H.R. 2942, S. 364, S. 796, S. 1607, and S. 1677 seek to address China’s currency policy. H.R. 388 would prohibit U.S. imports of Chinese autos as long as Chinese tariffs on autos are higher than U.S. tariffs. H.R. 708, H.R. 1229, and S. 974 would apply U.S. countervailing laws to China. H.R. 1958 and S. 571 would terminate China’s permanent normal trade relations status. H.R. 275 would prohibit U.S. companies from aiding regimes that restrict Internet access. S. 1919 would limit the president’s discretion on Section 421 investigations on import surges from China. H.R. 3273 would expand U.S. export promotion programs to boost exports to China. Finally, numerous bills have been introduced to address concerns over unsafe imports (including from China). This report examines major U.S.-China trade issues and will be updated as events warrant
Computer-Aided System for Wind Turbine Data Analysis
Context: The current work on wind turbine failure detection focuses on researching suitable signal processing algorithms and developing efficient diagnosis algorithms. The laboratory research would involve large and complex data, and it can be a daunting task.
Aims: To develop a Computer-Aided system for assisting experts to conduct an efficient laboratory research on wind turbine data analysis. System is expected to provide data visualization, data manipulation, massive data processing and wind turbine failure detection.
Method: 50G off-line SCADA data and 4 confident diagnosis algorithms were used in this project. Apart from the instructions from supervisor, this project also gained help from two experts from Engineering Department. Java and Microsoft SQL database were used to develop the system.
Results: Data visualization provided 6 different charting solutions and together with robust user interactions. 4 failure diagnosis solutions and data manipulations were provided in the system. In addition, dedicated database server and Matlab API with Java RMI were used to resolve the massive data processing problem.
Conclusions: Almost all of the deliverables were completed. Friendly GUI and useful functionalities make user feel more comfortable. The final product does enable experts to conduct an efficient laboratory research. The end of this project also gave some potential extensions of the system
Personal Data Security: Divergent Standards in the European Union and the United States
This Note argues that the U.S. Government should discontinue all attempts to establish EES as the de facto encryption standard in the United States because the economic disadvantages associated with widespread implementation of EES outweigh the advantages this advanced data security system provides. Part I discusses the EU\u27s legislative efforts to ensure personal data security and analyzes the evolution of encryption technology in the United States. Part II examines the methods employed by the U.S. Government to establish EES as the de facto U.S. encryption standard. Part III argues that the U.S. Government should terminate its effort to establish EES as the de facto U.S. encryption standard and institute an alternative standard that ensures continued U.S. participation in the international marketplace
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election
In the world's largest-ever deployment of online voting, the iVote Internet
voting system was trusted for the return of 280,000 ballots in the 2015 state
election in New South Wales, Australia. During the election, we performed an
independent security analysis of parts of the live iVote system and uncovered
severe vulnerabilities that could be leveraged to manipulate votes, violate
ballot privacy, and subvert the verification mechanism. These vulnerabilities
do not seem to have been detected by the election authorities before we
disclosed them, despite a pre-election security review and despite the system
having run in a live state election for five days. One vulnerability, the
result of including analytics software from an insecure external server,
exposed some votes to complete compromise of privacy and integrity. At least
one parliamentary seat was decided by a margin much smaller than the number of
votes taken while the system was vulnerable. We also found protocol flaws,
including vote verification that was itself susceptible to manipulation. This
incident underscores the difficulty of conducting secure elections online and
carries lessons for voters, election officials, and the e-voting research
community
- …