The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A standardized Communication / Information Protocol is necessary for implementing the 4 upper digitalization layers of Industrie 4.0-compliant solutions. OPC UA is one of the leading and preferred technology. Currently, there are many different OPC UA implementations available on the market. This paper gives an overview of existing solutions and shows the results of an initial benchmarking based on...
Internet Finance promote the innovation and development of financial field, at the same time, it also has its own risks, such as system security risk, capital security risk, higher liquidity risk, market selection risk, monetary policy risk. So the internet financial supervision is very necessary, regulators should pay attention to the risk characteristics of the Internet financial regulation, establish...
This paper selected the 29 shares of listed companies as samples, including 13 shadow banks. This paper will use the company's shares daily closing price as the research sample and use GARCH model to calculate the VaR and CoVaR value of the company's share price gains. The empirical results show that compared with the traditional banking institutions, shadow banking institutions risk spillover effect...
According to Industrial Organization Security Theory, this article defines the concept and influencing factors of culture industry organization security at the beginning. Then, the article points out the main factors threatening China's culture industry organization based on domestic and international situations. The first threat is caused by developed overseas cultural organizations because China's...
The security situation of China's futures industry is currently in good condition on the whole, with strong industrial competitiveness and control force, as well as low external dependency. However, under the new normal, there still exist some problems, such as fewer trading varieties of futures, irrational investor structure and the slow internationalization process and so on. So we must accelerate...
The world is advancing towards technological evolution day by day resulting in an exponential rise in Data. This massive volume of Data has introduced the idea of Big Data, which has captured the attention of business and IT scholars as a blessing and a source of immense opportunities for large organizations. Securing this huge amount of data has become a great concern in the field of information...
FPGA based product development companies need third party IP cores to complete the product design time effectively and cost effectively. The one-time payment upfront licensing of IP cores is impractical for FPGA based products, which does not benefit either IP core vendors or product engineering companies. There is a need for good competitive pricing scheme which benefit product development companies...
A service-oriented architecture (SOA)-based application is composed of a number of distributed and loosely-coupled services which are interconnected to accomplish a more complex functionality. The main security challenge in SOA is that we cannot trust the participating services in a service composition to behave as expected all the time. Moreover, the chain of all services involved in an end-to-end...
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or Commercial Off the Shelf (COTS)), uniting disparate on-premise and cloud systems, and integrating existing and evolved business processes and applications.
In the past twenty years the energy consumption of the world has grown significantly. There are many countries for which it is a huge challenge to ensure energy reliability and security. This situation is even getting more intense with the upcoming spread of renewable energy sources and the continuous need of lowering CO2 emission. Nuclear energy which is a possible solution for both difficulties...
This paper makes an empirical test on the correlation between financial restatement and audit report lag (ARL) using data of non-financial listed companies in China during the period 2009–2012. The empirical results show that there is a significant positive correlation between financial restatement and ARL. The longer the ARL is, the more likely it is for the company to perform a financial restatement...
The rapid spread of the Internet in China is also changing people's consumption habits and lifestyle, small to food and entertainment, large to the defense industry, the Internet has been integrated into every corner of China's economic industry. With the Internet consumption of consumer spending and the promotion of consumer ideas, China's Internet consumer financial market came into being and achieved...
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
With the wide adoption of hybrid cloud, there are many potential risks that need to be mitigated to ensure that the utilizations of services are at their optimal levels. One of the major risks that has garnered much attention is maintaining maximum security and confidentiality for sensitive information. Detecting sensitive content at near real-time and at cloud scale has become a critical first step...
The efforts and findings of the last decades of research on the formalization and the verification of Web services have given a certain level of assurance on Web services. However new challenges such as high availability and security issues are not fully addressed. In fact, Web services are exposed to attacks that appear continuously. These issues have naturally paved the way to a new research topic...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
The impact of efficient Information System Strategy Plans has proven crucial to modern-day corporations. However, during the analysis phase for a technical solution to fulfil an identified need in an enterprise, many teams tend to focus on a very issue-specific analysis and overlook its underlying global corporate impacts. On the other hand, it is difficult and time-expensive for these teams to analyse...
The synchronization of stock price in recent years is the hot topic of corporate finance. In this paper, we use the data of A share listed companies in China in 2010–2015 to study the barrier of separation of two rights (control right and cash flow right) to market information transmission characterized by stock price synchronization. The results show that: firstly, the separation of the two powers...
The personalization is one of the main success factor in Mobile Commerce. This paper presents the main characteristic for Mobile Commerce and describes factors of personalization in Mobile Commerce, it also shows how these factors affects user satisfaction positively or negatively. The mechanism for personalization and recommendation system used in personalized Mobile Commerce are described. Many...
Recently, China economy has entered the stage of “new normal”, series of reforms and the steady growth of economy boost the rapid development of China securities industry. In this paper, we designed a Data Envelopment Analysis (DEA) Model with multi inputs and outputs, and statically and dynamically evaluated the firms and the industry. Our findings indicated that in the period of “new normal”, there...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.