339 research outputs found

    An Empirical Analysis of Development Processes for Anticipatory Standards

    Get PDF
    There is an evolution in the process used by standards-development organizations (SDOs) and this is changing the prevailing standards development activity (SDA) for information and communications technology (ICT). The process is progressing from traditional SDA modes, typically involving the selection from many candidate, existing alternative components, into the crafting of standards that include a substantial design component (SSDC), or 'anticipatory' standards. SSDC require increasingly important roles from organizational players as well as SDOs. Few theoretical frameworks exist to understand these emerging processes. This project conducted archival analysis of SDO documents for a selected subset of web-services (WS) standards taken from publicly available sources including minutes of meetings, proposals, drafts and recommendations. This working paper provides a deeper understanding of SDAs, the roles played by different organizational participants and the compliance with SDO due process requirements emerging from public policy constraints, recent legislation and standards accreditation requirements. This research is influenced by a recent theoretical framework that suggests viewing the new standards-setting processes as a complex interplay among three forces: sense-making, design, and negotiation (DSN). The DSN model provides the framework for measuring SDO progress and therefore understanding future generations of standards development processes. The empirically grounded results are useful foundation for other SDO modeling efforts

    End-user security in mobile telecommunications: Policy perspectives anda research agenda

    Get PDF
    The recent advances in mobile technologies have brought about increased functionality, however this increased functionality in turn increases the vulnerability of mobile networks, services and users. In such an environment supplying secure mobile services requires a high degree of coordination among a variety of industry players including equipment manufacturers, application developers, operating system developers and service providers. The scale of the challenge can be assessed by merely observing the difficulties faced by administrators of fixed organizational networks in their attempts to maintain virus-free networks in a context where the end users are to some degree under their control. In this light it is easy to imagine that providing secure services to end users in a highly decentralized public mobile network environment will certainly be a challenge. The complexity such services entail raises questions about whether or not service providers will be able to deliver and even more challenging offer security quality of service guarantees. Whether or not secure mobile services will be offered is a function of both supply and demand. While certain measures can be taken to assist the traditional market mechanisms that face challenges when high degrees of coordination are required there may also be a role for public policy. As both a component of critical infrastructures and as a licensed use of the public spectrum with public interest obligations, there may be a basis for public policy mechanisms to be employed to facilitate the supply of such services. In this paper we address these issues by first exploring factors affecting the supply and demand of security technologies and services. This is followed by a review of the policy context and recent developments in the U.S. and Europe. Information from these synopses are then combined with findings from our companion report "The Delft UMTS Testbed and End-user Security Features: to suggest a research agenda that if implemented will answer fundamental questions concerning the future of end-user mobile security

    General Education Revision 3-26-69

    Get PDF

    Senate Memo 1971

    Get PDF

    Senate Constitution Revision 3-10-71

    Get PDF

    Senate Constitution Revision 9-1-79

    Get PDF

    Senate Constitution 2-3-77

    Get PDF

    Inter-Generational Transitions in Technological Ecosystems: The Case of Mobile Telephony

    Get PDF
    Many technology studies have conceptualized transitions between technological generations as a series of S-curve performance improvements over time. Surprisingly, the interregnum between successive technological generations has received little attention. To understand what happens in the interregnum, we build upon a framework of technological change as happening within an ecosystem that is characterized by both momentum and inertia. Applying this framework to study the mobile communications ecosystem, we found that the transition between 2G to 3G wireless was far from sequential. Different parts of the ecosystem evolved at different rates exerting both inertia and momentum with 'collateral technologies' playing an important role in shaping the transition path that unfolded. Based on this study we suggest that, rather than a distinct or unitary shift from an old to a new technology, transitions proceed in a zigzag manner resulting in the emergence of hybrid technologies. These processes hold implications for both theory and practice that we explore in this paper

    Enhancing Disaster Resilience of Highway Bridges to Multiple Hazards

    Get PDF
    This research includes analytical investigation of the effectiveness of bridge retrofit in enhancing seismic resilience of highway bridges. A reinforced concrete bridge in the La Cienega- Venice Boulevard sector of the Santa Monica (I-10) freeway in Los Angeles, California, is analyzed. During the 1994 Northridge earthquake, this bridge was severely damaged primarily due to shear failure of one bridge pier. Post-event reconnaissance indicated that the failure was initiated from inadequate lateral confinement of bridge piers designed in pre-1971 era. As part of this research, bridge piers are retrofitted with steel jackets assuming the undamaged condition of the bridge prior to the Northridge event. Research outcome showed that applied retrofit resulted in an enhancement of seismic resilience of the bridge from 57.5 to 99.9 percent. A cost-benefit analysis revealed that the applied retrofit technique is also cost effective (Venkittaraman and Banerjee 2013)
    • …
    corecore