9,540 Hits in 6.0 sec

Archival Strategies

David Bearman
1995 The American Archivist  
Editor's Note-Five years after the publication of Archival Methods, David Bearman invited three archival colleagues with international reputations as theorists and administrators to comment on and critique  ...  both the assertions in Archival Methods and the proposed solutions which he offered in a follow-up essay entitled Archival Strategies.  ...  "'Margaret Hedstrom, "Progress Report on Building Partnerships and the Government Information Locator" (Paper delivered at a conference of the Vermont State Archives, National Historical Publications and  ... 
doi:10.17723/aarc.58.4.pq71240520j31798 fatcat:vxiy64ta2zal5aatcwlsdsvsui

Business Intelligence Systems in the business strategy - an approach to the Romanian reality

Dan Serghie, Ana Maria Balan
2010 Studies and Scientific Researches: Economics Edition  
In the Economics, the complementarities between practice and theory are potentiated first by utilitarian reasons and highlighted through the correlation between static systems with dynamic ones.  ...  The Economics doesn't mean an accumulation of disparate sciences, is a coherent set of related theories in the support of certain ideas from the schools of thought or arising from different research areas  ...  In an interview accorded in 2004, Shaku Atre defined Business Intelligence like "a developmental strategy, vision and architecture that keep a constant alignment between the operations/directions of a  ... 
doi:10.29358/sceco.v0i15.157 fatcat:jialexvm3nbvrpkpvv5lj4g54e

Information Security Risks in Civil Aviation Network: Classification, Identification and Preventive Strategies

Lian Ran
2021 DEStech Transactions on Environment Energy and Earth Science  
Based on the ISO27001 information security management system, the main contribution of this paper is build a classification and identification framework to identify key sources and specific factors of  ...  In accordance with the attributes of different risk sources, systematic preventive strategies are proposed in this paper to serve as references for preventing and resolving information security risks in  ...  , a process represented by visualization, intelligence, and interactive and sharing development.  ... 
doi:10.12783/dteees/peees2020/35463 fatcat:cdm2m3u6q5h33k6dfkr2dhsfxm

Overcoming the intelligence-sharing paradox: Improving information sharing through change in organizational culture

Marie-Helen Maras
2017 Comparative Strategy  
for the formal establishment of more than 40 state, local, and regional fusion centers across the country.  ...  One of the central options is the potential drafting of a formal national fusion center strategy that would outline, among other elements, the federal government's clear expectations of fusion centers,  ...  with state employees focused on strategic analysis and/or response efforts in support of federal, state, and local missions.  ... 
doi:10.1080/01495933.2017.1338477 fatcat:owvrfcv6pvdcha572deh4ynygi

Malawi: Poverty Reduction Strategy Paper

International Monetary Fund
2012 IMF Staff Country Reports  
Joyce Banda and the late President His Excellency Ngwazi Professor Bingu wa Mutharika, for the guidance provided during the formulation processes of the Malawi Growth and Development Strategy.  ...  ACKNOWLEDGEMENTS The Ministerial Committee, the Steering Committee and the Drafting Team would like to thank the President of the Republic of Malawi, Her Excellency Mrs.  ...  This thematic area however, focuses on gender and capacity development.  ... 
doi:10.5089/9781475506129.002 fatcat:p7bcct6o6zcxfajix2t3k73xfq

A Comparative Analysis of the Cyber Security Strategy of Bangladesh

Kaushik Sarker, Hasibur Rahman, Khandaker Farzana Rahman, Shohel Arman, Saikat Biswas, Touhid Bhuiyan
2019 International Journal on Cybernetics & Informatics  
Formerly, researchers have worked on NCSS by comparing NCSS between different nations for international collaboration and harmonization and some researchers worked on policy framework for their respective  ...  A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country.  ...  Priority 1: Legal Measures The first priority is focused on the strategies that are involved with the development of cybercrime legislation that is globally applicable.  ... 
doi:10.5121/ijci.2019.8201 fatcat:b7u5f2uqe5f7fjkj7q6jbxkceq

Lithuanian Deterrence Strategy

Vaidotas Urbelis
2006 Lithuanian Annual Strategic Review  
It provides estimation on the sufficiency of Lithuanian capabilities to provide effective deterrence and recommends a potential direction for their use to strengthen deterrence. : KAM Leidybos ir informacinio  ...  There are two major components that determine the success or failure of the Lithuanian deterrence strategy: the militarys capabilities to carry out its threat against potential aggressors, and the will  ...  Intelligence and Early Warning Systems Intelligence and early warning systems contribute to deterrence by providing timely and accurate information on a potential aggressors behaviour, actions of its leaders  ... 
doi:10.47459/lasr.2006.4.9 fatcat:3r4bzoooqva7hkn4gqfwlgxsf4

Strategies of Inhibition: U.S. Grand Strategy, the Nuclear Revolution, and Nonproliferation

Francis J. Gavin
2015 International Security  
Most accounts of postwar U.S. grand strategy focus on two broad but distinct missions: (1) to contain great power rivals and (2) to open the world's economy and political systems to encourage the ºow of  ...  has developed and implemented a wide range of tools, applied in a variety of combinations, which might be thought of as the "strategies of inhibition."  ...  Rhetorically, the United States has supported arms control and even disarmament despite continuing to spend enormous sums of money not just on building more nuclear forces, but on building nuclear systems  ... 
doi:10.1162/isec_a_00205 fatcat:434qfgl55fhjbaj6bkbdffdaoq

Research on Development Strategies for China's Advanced Materials Industry

Tu Hailing, Zhang Shirong, Li Tengfei
2016 Chinese Journal of Engineering Science  
Finally, the authors propose the major development directions and put forth suggestions on government policies for promoting the advanced materials industry.  ...  As a sector of strategic emerging industry, the advanced materials industry is vital for the socioeconomic development and security of the country.  ...  and intelligent manufacturing, so as to provide the advanced materials support for realizing the innovation-driven development strategies; more focus should be placed on the systematic development of  ... 
doi:10.15302/j-sscae-2016.04.014 fatcat:3rcjpua2ibfpxjimfikpwghwii

Meaningful Big Data Integration for a Global COVID-19 Strategy

Joao Pita Costa, Marko Grobelnik, Flavio Fuart, Luka Stopar, Gorka Epelde, Scott Fischaber, Piotr Poliwoda, Debbie Rankin, Jonathan Wallace, Michaela Black, Raymond Bond, Maurice Mulvenna (+11 others)
2020 IEEE Computational Intelligence Magazine  
and scrutiny of more and richer data sources by users of the system.  ...  The model of governance and ethical review, incorporated and defined within MIDAS, also addresses the complex privacy and ethical issues that the developing pandemic has highlighted, allowing oversight  ...  It focused on entertainment, messages of solidarity and showing support for healthcare workers [31] , [33] .  ... 
doi:10.1109/mci.2020.3019898 fatcat:botqkwlnwbeqxieet5qgwe5jzm

E-Government Strategy and Plans in Jordan

Yousef Kh. Majdalawi, Tamara Almarabeh, Hiba Mohammad, Wala Quteshate
2015 Journal of Software Engineering and Applications  
One of the major developing aspects is information technology (IT), and communication technology which makes life easier, faster, and more connected.  ...  Life is being developed every day in all of the life aspects.  ...  Most researches on E-government have focused on developed countries.  ... 
doi:10.4236/jsea.2015.84022 fatcat:p3urcf2na5gvxoeybksdaqrosy

Strategy for Fintech Applications in the Pacific Island Countries

Sonja Davidovic, Elena Loukoianova, Cormac Sullivan, Hervé Tourpe
2019 Departmental Papers / Policy Papers  
The authors are grateful to Kenneth Kang, Alison Stuart, and our colleagues who provided useful comments, guidance, and support.  ...  On the other hand, mobile operators would benefit from the established financial infrastructure, lending channels, and market intelligence of the banking sector.  ...  Although open-source software code requires maintenance, configuration, and ongoing support, it is free of charge, is supported by a community of developers, and prevents dependence on one vendor (Zivtech  ... 
doi:10.5089/9781498326735.087 fatcat:ru34iyp3cbeqxnbfyx66tzabjy

Report on AM future scenarios and strategies

Marianne Hörlesberger, Andrea Kasztler, Wepner Beatrix
2022 Zenodo  
Four future scenarios for the AM webs of innovation value chains and their open-ings for RRI are co-created, described, discussed, and their chances and risks elabo-rated.  ...  The system of foresight influencing factors, their interactions, and colours according to STEE-PLE 3 is visualized and a top view on the system is established.  ...  Education is focused on technical skills on knowledge and on creativity. It has undergone radical change as it also focuses on creative thinking.  ... 
doi:10.5281/zenodo.6373640 fatcat:2imuvksu5fejphttccbhr7fwxu

The Impact of the Internet of Things to Value Added in Knowledge‐Intensive Organizations [chapter]

Maja Meško, Jana Suklan, Vasja Roblek
2017 Knowledge Management Strategies and Applications  
The chapter considers the development of knowledge management through different periods; it has focused on its importance during the use of social media and the rise of the Internet of Things.  ...  This chapter has focused on the importance and influence of Industry 4.0 and consequently the Internet connected technologies' creation of the value added for knowledgeintensive organizations and society  ...  also to support the social innovative projects and thus have an impact on social and economic development of the society [14] .  ... 
doi:10.5772/intechopen.70070 fatcat:oznixuabinhozfc6iiv74xbjee

D3.1: Strategy analysis report and Cloud Computing

Dietrich Mark, Federico Facca
2021 Zenodo  
To tackle Europe digitalisation priority, the European Commission defined "A European strategy for data" and "A new Industrial Strategy for Europe", including a strong focus on data spaces and federated  ...  To support the work on the definition of priorities for the upcoming programmes, this report explores the question of how supply and demand can be improved in terms of quality and conditions of use, and  ...  Develop a European strategy focusing on SME adoption that supports the deployment and the maturation of edge computing technologies while in parallel fosters the development of needed skills in the European  ... 
doi:10.5281/zenodo.5530740 fatcat:j56fkvlparegliqexa5p27ckge
« Previous Showing results 1 — 15 out of 9,540 results