首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
A feedback model of the criminal justice system (CJS) incorporates the continuing input of people arrested for the first time (virgin arrests) and the recycling of individuals with prior arrests (recidivists). Such a model is needed to enable CJS planners to assess the impact of possible actions on the future arrests and system workloads. Using an empirically determined estimate of the number of virgin arrests in the U.S. as input to a feedback model of the CJS, recidivism parameters, probability of rearrest, and average time between arrests were estimated by matching the output of the model to the total arrests in the U.S. in the period 1960–70. The average deviation between the model output and total U.S. arrests was minimized at less than 4% when the probability of rearrest is equal to 0.875 and the average time between arrests equal to 1.1. years. The relative sensitivity of total arrests to changes in virgin arrests and the probability of rearrest are also presented.  相似文献   

2.
Peer-to-peer (P2P) technologies are often seen as a threat by copyright owners because they encourage piracy by making digital copies easier to obtain. In response, major record companies have come up with new devices designed to protect original material, and lobbied to reinforce legal protection. We view traditional distribution as an information-push technology in which the firm pays to provide information to consumers and P2P as an information-pull technology where consumers spend resources to acquire information on products they have a potential interest in by searching, downloading and testing digital copies of original products before they make their purchase decision. We determine copyright owners’ protection strategies according to the level of legal protection, and we study their effects on profits and consumers’ surplus with the two different information transmission technologies.  相似文献   

3.
This article discusses the complex problems involved in minimizing risks when applying automated information systems to functions that can affect human safety and lives, and limitations on the way technological risk is assessed in todays environment. It calls for policies at the highest levels and research on management approaches to providing a focus for evaluating and solving automated information system problems causing failure and for applying the automated systems in a manner that will minimize the potential for harm to individuals. The author also believes it to be very important that problems presented are disclosed to information managers that may be part of the decision-making on what and how much to automate, and also those involved in other technologies and functions that use automated information at their core. Automated information systems (computers and telecommunications) have changed our everyday life. Because of fast changing technology and creative software development, beneficial computer applications in business, education, scientific applications, and personal use now prevail. With automated information systems, our society has increased productivity, saved money, and has made possible many things previously considered impossible. In general, society has benefitted from increased automation of information.  相似文献   

4.
With the increasing importance of technology, the efficiency of R&D investment is becoming a critical factor to an organisation’s success. As a result, many studies have carried out to create useful information to support various decision-makings faced during R&D planning but few efforts were made to discuss technology transferability in creating the information. Technology transferability can be an important factor to increase the efficiency of R&D investment especially in a multi-technology industry, where a compound of several industries produces a variety of components and systems. Therefore, this study purposes to develop a systematic method to analyse the transferability of technology, aiming to facilitate R&D spill-over. For the purpose of analysis, patent data from USPTO (United States Patent and Trademark Office) was adopted and patent citation analysis applied, which shows the relationship between technologies and industries as quantitative measures. The research result then was applied to Korean aerospace industry and its utility verified. The suggested method is expected to be used in understanding technology characteristics and making the most use of R&D outputs by promoting technology transfer in multi-technology industries.  相似文献   

5.
Information technology is changing the way we live and work. Government is not immune to this technology revolution. Emerging information technology now affords justice agencies the opportunity to work together in one integrated justice system. From dispatch and patrol, to arrest and booking, through the identification process and on into the courts, technology is allowing all segments of the justice community to work more efficiently and to work with both more information as well as more accurate information. IBM Corporation's Public Safety, Justice & Identification organization is playing an important role in assisting justice agencies in applying this new technology.In justice agencies around the world,computer aided dispatch and related systems allow more police officers to be where needed more rapidly. Mobile data systems for officers in the field allow them to gather and process information more quickly and accurately, and be back on patrol and available for another call more rapidly. Automated arrest and booking systems free up patrol officers more quickly so they can be back on patrol. These systemsalso allow the arrested person to be processed through the jail system more rapidly, by fewer people. In the courts, electronic case files, automatic document generation, automated scheduling and sophisticated programs for tracking court operations all mean more work can be accomplished faster, with greater accuracy and efficiency, without increased personnel. Most justice agencies today act as independent, yet interdependent entities. Their primary mode of communication is paper. Advances in information technology, together with the adoption of common technical standards and common business definitions, is now allowing justice agencies to integrate their operations by electronically sharing important information. It is through this integration process that justice agencies are making the term, 'justice system' a reality.  相似文献   

6.
7.
Successful technology transfer depends on the skills and knowledge of those who must implement new or rapidly advancing technologies. Often, new systems and technologies are delivered without proper preparation of the intended users. Thorough documentation is only part of the solution-during development, many important and technology-specific lessons are learned. These include problem diagnosis, troubleshooting techniques, and strategies for optimum utilization. Many such skills develop in response to incidents that occur during testing and evaluation and are rarely incorporated into formal documentation or instructional materials. Yet they can make the difference between skilled satisfied users and frustrated non-users. Gary A. Klein, who received his Ph.D. in experimental psychology at the University of Pittsburgh in 1969, is chairman and chief scientist of Klein Associates Inc. (Fairborn, OH) an R&D company he founded in 1978 to do work in applied cognitive psychology. His principal research area is methods of knowledge elicitation that reflect the perceptual-cognitive aspects of expertise. He previously worked at the US Air Force Human Resources Laboratory. Beth Crandall holds a dual appointment as research associate and director of operations at Klein Associates Inc., which she joined in 1986. Her research interests include expert knowledge and decisionmaking skills, and methods for eliciting this information. She received her BS in psychology from Wright State University in 1978.  相似文献   

8.
This article investigates, evaluates, and summarizes pertinent research on technical information systems (TIS) — the vehicle by which technology is disseminated and acquired by potential users of that technology. Since the TIS is a critical element in the transfer process, it is recommended as the place to begin — employing the principles of systems analysis and design — to optimize transfer of technology.  相似文献   

9.
Emerging technologies, including nanotechnologies, are generally seen as those latest scientific innovations which have a potential impact on industry structure, and commercialization and economic potential. Work in this area of emerging technologies has distinct boundary spanning characteristics from the perspective of academic science. First, many emerging technologies involve collaboration of scientists across disciplinary boundaries. Second, because of the commercializability of many emerging technologies, scientists may interact more often with industry throughout the research and commercialization process. We ask, what are the boundary-spanning characteristics of scientists engaged in emerging technology research and how do those characteristics matter in obtaining funding in this area? We examine the characteristics of academic scientists in the United States who are employed in research intensive institutions and who are engaged in funded research in the area of emerging technologies. We address the factors that predict their grant success in areas of emerging technology. Findings reveal that interdisciplinary activities and industry orientation are both important in predicting funding in areas of emerging technology. Moreover, the findings imply that the emergence of new technologies may offer opportunities for women in low representation fields.  相似文献   

10.
The NASA/Florida Minority Institution Entrepreneurial Partnership (FMIEP) represents a new infrastructure for technology transfer based on an alliance between the National Aeronautics and Space Administration (NASA)-Kennedy Space Center (KSC), the Technological Research and Development Authority (TRDA), and four Minority Institutions in the State of Florida. This paper describes this partnership, their key activities, and some of the initial results accomplished. The NASA-FMIEP was developed in order to assist in the technological advancement of small businesses through the support of existing federal programs. Many of these programs are underutilized, particularly by small and minority-owned businesses. One of these programs aims to transfer advanced NASA technologies to the private sector. The FMIEP supports Kennedy Space Center by identifying new potential markets for technologies developed at the Center and by developing innovative information technology applications necessary to support the efforts of technology transfer. In addition, the FMIEP';s business thrust includes assisting Kennedy Space Center in promoting the participation by small business in the Technology Outreach Program and the Small Business Innovation Research Program. To date, one NASA technology has been successfully commercialized, seven hundred businesses have been made aware of these federal business-assistance programs, and four companies received important assistance that enabled them to become SBIR winners.  相似文献   

11.
Mobile Rapid DNA technology is close to being incorporated into crime scene investigations, with the potential to identify a perpetrator within hours. However, the use of these techniques entails the risk of losing the sample and potential evidence, because the device not only consumes the inserted sample, it is also is less sensitive than traditional technologies used in forensic laboratories. Scene of Crime Officers (SoCOs) therefore will face a ‘time/success rate trade-off’ issue when making a decision to apply this technology.In this study we designed and experimentally tested a Decision Support System (DSS) for the use of Rapid DNA technologies based on Rational Decision Theory (RDT). In a vignette study, where SoCOs had to decide on the use of a Rapid DNA analysis device, participating SoCOs were assigned to either the control group (making decisions under standard conditions), the Success Rate (SR) group (making decisions with additional information on DNA success rates of traces), or the DSS group (making decisions supported by introduction to RDT, including information on DNA success rates of traces).This study provides positive evidence that a systematic approach for decision-making on using Rapid DNA analysis assists SoCOs in the decision to use the rapid device. The results demonstrated that participants using a DSS made different and more transparent decisions on the use of Rapid DNA analysis when different case characteristics were explicitly considered. In the DSS group the decision to apply Rapid DNA analysis was influenced by the factors “time pressure” and “trace characteristics” like DNA success rates. In the SR group, the decisions depended solely on the trace characteristics and in the control group the decisions did not show any systematic differences on crime type or trace characteristic.Guiding complex decisions on the use of Rapid DNA analyses with a DSS could be an important step towards the use of these devices at the crime scene.  相似文献   

12.
Over the last decades digital technologies have penetrated our daily lives affecting all aspects of our societal and economic activities. Even though the benefits of relying on information systems to run everyday tasks, organise one's business, interact with each other or enjoy public services are undisputable, the increasing use of digital technologies comes with a price: the growing exposure to cyber risks. This new type of threat has been in the center of the EU agenda for over 15 years during which a solid legislative framework for the protection S of network and information systems against cyber incidents has been developed. However, security and resilience of infrastructures and networks is one parameter of the challenge. Dealing with the financial risk emerging from a cyber incident, is another, equally important one. The need to mitigate these risks led to the emergence of a new insurance market, the cyber insurance market. Despite though the constantly growing demand for this type of insurance coverage, the market is still under development. The fast-evolving nature of cyber threats, the lack of a common language as regards risks, losses and coverages and the lack of historical data on cyber incidents are listed among the factors that slow down the market's growth. Currently, all involved stakeholders in the insurance field are considering specific initiatives that would accelerate the process of turning the EU market more competitive and efficient against its many challenges. The example of the US cyber insurance market, with its shortcomings and know-how, could also contribute to this effort, as an example of a market that has been intensively facing these challenges for almost twenty years.  相似文献   

13.
This paper presents information on the current capability and future potential of the Government-Industry Data Exchange Program (GIDEP) as a viable data exchange program in terms of technology transfer and resources conservation providing a key to technological growth and profit. This information transfer function of technology utilization is an important aspect to be considered. This paper presents an overview of the ways the GIDEP Program is utilized by over 650 government and industry organizations to provide a technology transfer function for quality and reliability improvement. How increased productivity and economic benefits are derived from use of GIDEP data banks and its communication network are described. Specific examples of data utilization and benefits are provided.  相似文献   

14.
Governmental policy, social factors, individual behavior, and technology play critical roles in improving the environment. The Department of Defense is not immune to these factors as its actions have, and will continue, to impact its operational environments.This research analyzes the technological aspect of improving environmental conditions. Of particular interest, are the barriers encountered when laboratories transfer environmental technology to an end-user, and the bridges used to mitigate these barriers. A case study methodology is utilized analyzing five environmental technology transfers within the U.S. Air Force.Several key barriers and bridges are specific to the transfer of environmental technologies. They include environmental regulatory agency oversight, difficulty in clearly defining the end-user, and the need to demonstrate technologies to potential end-users. However, many barriers and bridges encountered in the environmental technology transfer, are also encountered in the transfer of other technologies. Based on these findings, recommendations are provided for improving the environmental technology transfer process.  相似文献   

15.
The extent and use of technology in the British criminal justice system is uneven. Two areas are examined; first where technology is used in prisons or by the police, and secondly when it is used to develop new sanctions, as with electronic monitoring, or as attachments to existing sanctions such as drug testing. Technology in prisons is mainly in the form of perimeter security, and in the police through CCTV cameras or databases. In the second the emphasis is on tracker systems which gives the supervisor greater control. Technological development in criminal justice is not without its critics. Some regard existing technological developments with suspicion, seeing them as a means of enhancing control, or as an attack on traditional liberal values, or more importantly as an extension of a form of behaviourism which is concerned only with the observable act. Others note the expensive failures of technology where systems fail to work or are delivered late. It is suggested a Government study is required to examine existing technologies and its likely future impact whether on the criminal justice system generally or on those working within it or as inmates.  相似文献   

16.
A number of trends are apparent from the current development of existing Criminal Justice computer systems (CJS). Apart from in probation, the first systems in each criminal justice agency in this country have been designed to assist with routine clerical and administrative tasks — book-keeping in the magistrates' courts, wordprocessing and finance in prisons, etc, which although effective at easing the clerical and administrative tasks have made little overall impact on the operation of criminal justice. They have not, for example, reduced the delays in the criminal justice process, or reduced the overcrowding in prisons. This is in contrast to the US, where computerisation in some courts, for example, has significantly reduced delay and has helped with the operation of sentencing guidelines to bring about a great consistency of sentencing. In Part II of his article A D Maclean looks at what the future holds as far as computers in criminal justice and concerned.  相似文献   

17.
Adding to the current debate, this article focuses on the personal data and privacy challenges posed by private industry's use of smart mobile devices that provide location-based services to users and consumers. Directly relevant to personal data protection are valid concerns about the collection, retention, use and accessibility of this kind of personal data, in relation to which a key issue is whether valid consent is ever obtained from users. While it is indisputable that geo-location technologies serve important functions, their potential use for surveillance and invasion of privacy should not be overlooked. Thus, in this study we address the question of how a legal regime can ensure the proper functionality of geo-location technologies while preventing their misuse. In doing so, we examine whether information gathered from geo-location technologies is a form of personal data, how it is related to privacy and whether current legal protection mechanisms are adequate. We argue that geo-location data are indeed a type of personal data. Not only is this kind of data related to an identified or identifiable person, it can reveal also core biographical personal data. What is needed is the strengthening of the existing law that protects personal data (including location data), and a flexible legal response that can incorporate the ever-evolving and unknown advances in technology.  相似文献   

18.
Commercialization of new university technology within the new product development process is an important tool by which established firms can expand their innovative capabilities. The strategic importance of the university technology to the firm, however, can vary considerably. An exclusivity agreement is a useful tool to protect the firm’s investment and help ensure that value is appropriated through the commercialization process. An empirical study of 66 technology transfer projects in the information and communications technology industry reveals that licensing transactions are usually secured by some form of exclusivity agreements when the product innovation enabled by the new university technology is new-to-the-firm or new-to-the-market and the firm’s perception of the strategic value of the new technologies is high.   相似文献   

19.
As the Internet and World Wide Web have rapidly evolved and revolutionized the applications in everyday life, it is a demanding challenge for investigators to keep up with the emerging technologies for forensic analyses. Investigating web browser usages for criminal activities, also known as web browser forensics, is a significant part of digital forensics as crucial browsing information of the suspect can be discovered. Particularly, in this study, an emerging web storage technology, called IndexedDB, is examined. Characteristics of IndexedDB technology in five major web browsers under three major operating systems are scrutinized. Also, top 15 US websites ranked by Alexa are investigated for their data storage in IndexedDB. User screen names, ids, and records of conversations, permissions, and image locations are some of the data found in IndexedDB. Furthermore, BrowStEx, a proof‐of‐concept tool previously developed, is extended and cultivated into BrowStExPlus, with which aggregating IndexedDB artifacts is demonstrated.  相似文献   

20.
A law firm can be understood as a social community specializing in the speed and efficiency of creating and transferring legal knowledge. Knowledge management was first introduced to law firms in order to help them create, share and apply knowledge more effectively: information technology (IT) might well play an important role in the success of such knowledge management initiatives. In this paper, IT support for knowledge management is linked to stages of growth, with a stages‐of‐growth model proposed that consists of four stages. The first stage addresses the end‐user tools made available to knowledge workers (people to technology), while the second involves information about who knows what (people to people). The third stage concerns the information held by knowledge workers (people to documents), with information systems actually solving knowledge problems constituting the fourth and final stage (people to systems). Stages‐of‐growth models have been widely used in both organizational research and IT management research: such models have also been criticized for their lack of empirical validity. This paper develops such a survey instrument in order to test a knowledge management technology stage model empirically.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号