The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this short position paper I consider the contributions that software engineering as a discipline can make to the development and implementation of government policy. It is intended to support the growing body of knowledge on scientific advice in government and to encourage software engineers to engage with policy and the policy community.
This report introduces the Web2Touch 2016, a Track at the 25th IEEE WETICE Conference. This track involves works from collaborative web knowledge research community and related themes. Web2Touch 2016 explores the state-of-the-art on users' practical experiences, as well as trends and research topics paving the way for future collaborative approaches to knowledge management. Papers come from areas...
When and how should we encourage network providers to mitigate the harm of security and privacy risks? Poorly designed interventions that do not align with economic incentives can lead stakeholders to be less, rather than more, careful. We apply an economic framework that compares two fundamental regulatory approaches: risk based or ex ante and harm based or ex post. We posit that for well known security...
This paper is about a framework that would help developing nations like the Philippines minimize if not eliminate the various social problems such as poverty, unemployment, insurgency, traffic congestions, pollution, etc., in the various metropolitan cities like Metro Manila. The US occupation of the Philippines did not only teach Filipinos speak English but also leave some infrastructures that can...
HP (Analytic Hierarchy Process) is a kind of method that people use frequently in the financial performance evaluation. Traditional AHP method often leads to uncertainty of information cognition considering the uncertainty of person's cognition. It's not easy to get good results only with AHP. According to 3E principle of financial expenditure, this paper proposes the strategy which combines the gray...
Housing security is one of the main content of public services. According to performance every area of our country, the way and level of housing security has nothing in common with each other. In this paper, the factor analysis model is established to identify the key factors of the level of urban housing security. And then, cluster analysis model is constructed to research the regional difference...
In this paper we establish a reputation mechanism model, based on the effective reaction of rational investors to fresh news, to regard the supervision ability as an endogenous variable, and therefore to analyze the relationship among the listed company, the regulatory authority and the exterior investors. This model may contribute to realization of the exterior investors' self-protection by impelling...
The social security system should be based on the reality of our country. The social security level should be adapted to the economic development level of different phases. In the process of reform, "Lindblomism" should be observed. This paper has fully analyzed the advantages and disadvantages of the traditional State-Unit Security model of our country, gradual reform and gradual transfer...
Financing of the infrastructure is always a focus and also it is difficult for the government, especially the local government which is not rich. In the processing of Infrastructure construction, the government's guarantee plays an important role. Government may be charged with contingent expenses. Based on prestige model, the paper compare the government's the behavior with and without the pressure...
In order to solve the difficulty to change and expand the application system and field security in government economic integrated system, a new star-like of database design model is proposed. The new model is proved to be more suitable for the complicated, changeable and field security database systems integration by giving an example of the government economic integrated system.
National energy system was regarded as one kind of complex adaptive system, pointing out that it covers four adaptive agents, that is the agent of energy production, the agent of energy consumption, the agent of government and the agent of research institute. On the basis of this understanding, the adaptive mechanism of energy enterprises (including the agent of energy production and energy consumption),...
The inefficiency of the securities regulation results in the instead development of the securities in China. Dealing with the inefficiency of the securities regulation is very vital to the development of the the securities in china. We developed an infinitely repeated game model and a simplified KMRW reputation model to prove that the construction and maintenance of the listed companies' reputation...
The recent financial crisis has prompted governments to become more pro-active in order to increase confidence and reestablish trust in the overall economic system. Accordingly, confidential information, such as secret bank accounts and personal information are nowadays being exposed and shared between institutions in order to minimize potential risks. However, exercising control and maintaining transparency...
Assuming that individuals are altruistic, this paper employs an overlapping generations model with lifetime uncertainty to study the partially funded public pension in China. By comparing the market economy equilibrium with the social optimum allocation, we find the optimal firm contribution rate. Our simulation results show that this rate increases when the life expectancy rises, while decreases...
This paper addresses the use of a specific decision support methodology in operational research termed the analytic hierarchy process (AHP). We examine the application of AHP method in guiding information security policy decision making with respect to Indonesia. We suggest four aspects of information security policy, namely management, technology, economy and culture. In addition, information security...
The global market for information security services nearly tripled in 2007, up from about $6.7 billion in 2000, according to International Data Corporation.This trend that focuses on information security stresses the translation of strategic business objectives and models into an information systems architecture that combines data process, workflow, financial and simulation models. E-commerce security...
Government departments play an important role in the country's economic development and building, along with the continuous deepening of network application, some important contents such as the government services have gradually started on the Internet. Based on information security model, we designed and implemented a security system of e-government information. And introduced the various components...
VaR method is the mainstream technology to measure market risk in the current international financial field. As one of the basic VaR methodologies, Historical Simulation Method (HS) is effective and widely accepted and adopted by many international financial institutions and governments. However, there are still many aspects to improve it. This paper brings forward a modified VaR model based on historical...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
It is necessary to analyze the anti-terrorism performance of Taiwanpsilas security system after September 11, 2001 attacks. We use three stage data envelopment analysis model that Fried et al. (2002) developed, getting intelligence performance of the Investigation Bureau of the Ministry of Justice, to discuss the ability of anti-terrorism in Taiwanpsilas national security system. Putting 10 outputs,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.