A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Archival Strategies
1995
The American Archivist
Editor's Note-Five years after the publication of Archival Methods, David Bearman invited three archival colleagues with international reputations as theorists and administrators to comment on and critique ...
both the assertions in Archival Methods and the proposed solutions which he offered in a follow-up essay entitled Archival Strategies. ...
"'Margaret Hedstrom, "Progress Report on Building Partnerships and the Government Information Locator" (Paper delivered at a conference of the Vermont State Archives, National Historical Publications and ...
doi:10.17723/aarc.58.4.pq71240520j31798
fatcat:vxiy64ta2zal5aatcwlsdsvsui
Business Intelligence Systems in the business strategy - an approach to the Romanian reality
2010
Studies and Scientific Researches: Economics Edition
In the Economics, the complementarities between practice and theory are potentiated first by utilitarian reasons and highlighted through the correlation between static systems with dynamic ones. ...
The Economics doesn't mean an accumulation of disparate sciences, is a coherent set of related theories in the support of certain ideas from the schools of thought or arising from different research areas ...
In an interview accorded in 2004, Shaku Atre defined Business Intelligence like "a developmental strategy, vision and architecture that keep a constant alignment between the operations/directions of a ...
doi:10.29358/sceco.v0i15.157
fatcat:jialexvm3nbvrpkpvv5lj4g54e
Information Security Risks in Civil Aviation Network: Classification, Identification and Preventive Strategies
2021
DEStech Transactions on Environment Energy and Earth Science
Based on the ISO27001 information security management system, the main contribution of this paper is build a classification and identification framework to identify key sources and specific factors of ...
In accordance with the attributes of different risk sources, systematic preventive strategies are proposed in this paper to serve as references for preventing and resolving information security risks in ...
, a process represented by visualization, intelligence, and interactive and sharing development. ...
doi:10.12783/dteees/peees2020/35463
fatcat:cdm2m3u6q5h33k6dfkr2dhsfxm
Overcoming the intelligence-sharing paradox: Improving information sharing through change in organizational culture
2017
Comparative Strategy
for the formal establishment of more than 40 state, local, and regional fusion centers across the country. ...
One of the central options is the potential drafting of a formal national fusion center strategy that would outline, among other elements, the federal government's clear expectations of fusion centers, ...
with state employees focused on strategic analysis and/or response efforts in support of federal, state, and local missions. ...
doi:10.1080/01495933.2017.1338477
fatcat:owvrfcv6pvdcha572deh4ynygi
Malawi: Poverty Reduction Strategy Paper
2012
IMF Staff Country Reports
Joyce Banda and the late President His Excellency Ngwazi Professor Bingu wa Mutharika, for the guidance provided during the formulation processes of the Malawi Growth and Development Strategy. ...
ACKNOWLEDGEMENTS The Ministerial Committee, the Steering Committee and the Drafting Team would like to thank the President of the Republic of Malawi, Her Excellency Mrs. ...
This thematic area however, focuses on gender and capacity development. ...
doi:10.5089/9781475506129.002
fatcat:p7bcct6o6zcxfajix2t3k73xfq
A Comparative Analysis of the Cyber Security Strategy of Bangladesh
2019
International Journal on Cybernetics & Informatics
Formerly, researchers have worked on NCSS by comparing NCSS between different nations for international collaboration and harmonization and some researchers worked on policy framework for their respective ...
A National Cyber Security Strategy (NCSS) of a country reflects the state of that country's cyber strength which represents the aim and vision of the cyber security of a country. ...
Priority 1: Legal Measures The first priority is focused on the strategies that are involved with the development of cybercrime legislation that is globally applicable. ...
doi:10.5121/ijci.2019.8201
fatcat:b7u5f2uqe5f7fjkj7q6jbxkceq
Lithuanian Deterrence Strategy
2006
Lithuanian Annual Strategic Review
It provides estimation on the sufficiency of Lithuanian capabilities to provide effective deterrence and recommends a potential direction for their use to strengthen deterrence. : KAM Leidybos ir informacinio ...
There are two major components that determine the success or failure of the Lithuanian deterrence strategy: the militarys capabilities to carry out its threat against potential aggressors, and the will ...
Intelligence and Early Warning Systems Intelligence and early warning systems contribute to deterrence by providing timely and accurate information on a potential aggressors behaviour, actions of its leaders ...
doi:10.47459/lasr.2006.4.9
fatcat:3r4bzoooqva7hkn4gqfwlgxsf4
Strategies of Inhibition: U.S. Grand Strategy, the Nuclear Revolution, and Nonproliferation
2015
International Security
Most accounts of postwar U.S. grand strategy focus on two broad but distinct missions: (1) to contain great power rivals and (2) to open the world's economy and political systems to encourage the ºow of ...
has developed and implemented a wide range of tools, applied in a variety of combinations, which might be thought of as the "strategies of inhibition." ...
Rhetorically, the United States has supported arms control and even disarmament despite continuing to spend enormous sums of money not just on building more nuclear forces, but on building nuclear systems ...
doi:10.1162/isec_a_00205
fatcat:434qfgl55fhjbaj6bkbdffdaoq
Research on Development Strategies for China's Advanced Materials Industry
2016
Chinese Journal of Engineering Science
Finally, the authors propose the major development directions and put forth suggestions on government policies for promoting the advanced materials industry. ...
As a sector of strategic emerging industry, the advanced materials industry is vital for the socioeconomic development and security of the country. ...
and intelligent manufacturing, so as to provide the advanced materials support for realizing the innovation-driven development strategies; more focus should be placed on the systematic development of ...
doi:10.15302/j-sscae-2016.04.014
fatcat:3rcjpua2ibfpxjimfikpwghwii
Meaningful Big Data Integration for a Global COVID-19 Strategy
2020
IEEE Computational Intelligence Magazine
and scrutiny of more and richer data sources by users of the system. ...
The model of governance and ethical review, incorporated and defined within MIDAS, also addresses the complex privacy and ethical issues that the developing pandemic has highlighted, allowing oversight ...
It focused on entertainment, messages of solidarity and showing support for healthcare workers [31] , [33] . ...
doi:10.1109/mci.2020.3019898
fatcat:botqkwlnwbeqxieet5qgwe5jzm
E-Government Strategy and Plans in Jordan
2015
Journal of Software Engineering and Applications
One of the major developing aspects is information technology (IT), and communication technology which makes life easier, faster, and more connected. ...
Life is being developed every day in all of the life aspects. ...
Most researches on E-government have focused on developed countries. ...
doi:10.4236/jsea.2015.84022
fatcat:p3urcf2na5gvxoeybksdaqrosy
Strategy for Fintech Applications in the Pacific Island Countries
2019
Departmental Papers / Policy Papers
The authors are grateful to Kenneth Kang, Alison Stuart, and our colleagues who provided useful comments, guidance, and support. ...
On the other hand, mobile operators would benefit from the established financial infrastructure, lending channels, and market intelligence of the banking sector. ...
Although open-source software code requires maintenance, configuration, and ongoing support, it is free of charge, is supported by a community of developers, and prevents dependence on one vendor (Zivtech ...
doi:10.5089/9781498326735.087
fatcat:ru34iyp3cbeqxnbfyx66tzabjy
Report on AM future scenarios and strategies
2022
Zenodo
Four future scenarios for the AM webs of innovation value chains and their open-ings for RRI are co-created, described, discussed, and their chances and risks elabo-rated. ...
The system of foresight influencing factors, their interactions, and colours according to STEE-PLE 3 is visualized and a top view on the system is established. ...
Education is focused on technical skills on knowledge and on creativity. It has undergone radical change as it also focuses on creative thinking. ...
doi:10.5281/zenodo.6373640
fatcat:2imuvksu5fejphttccbhr7fwxu
The Impact of the Internet of Things to Value Added in Knowledge‐Intensive Organizations
[chapter]
2017
Knowledge Management Strategies and Applications
The chapter considers the development of knowledge management through different periods; it has focused on its importance during the use of social media and the rise of the Internet of Things. ...
This chapter has focused on the importance and influence of Industry 4.0 and consequently the Internet connected technologies' creation of the value added for knowledgeintensive organizations and society ...
also to support the social innovative projects and thus have an impact on social and economic development of the society [14] . ...
doi:10.5772/intechopen.70070
fatcat:oznixuabinhozfc6iiv74xbjee
D3.1: Strategy analysis report and Cloud Computing
2021
Zenodo
To tackle Europe digitalisation priority, the European Commission defined "A European strategy for data" and "A new Industrial Strategy for Europe", including a strong focus on data spaces and federated ...
To support the work on the definition of priorities for the upcoming programmes, this report explores the question of how supply and demand can be improved in terms of quality and conditions of use, and ...
Develop a European strategy focusing on SME adoption that supports the deployment and the maturation of edge computing technologies while in parallel fosters the development of needed skills in the European ...
doi:10.5281/zenodo.5530740
fatcat:j56fkvlparegliqexa5p27ckge
« Previous
Showing results 1 — 15 out of 9,540 results