首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 78 毫秒
1.
The investment made in research and development (R&D) by the Department of Energy's (DOE) Environmental Management (EM) program must result in products that will significantly benefit the Department's cleanup efforts. A customer-oriented decision-making process for managing technology development is needed to appropriately link technology development activities with cleanup operations. This paper presents a process for R&D management, which we have named the Technology Investment Decision Model.The model identifies six R&D stages leading to technology implementation. The model incorporates decision points (or “gates”) within the R&D process where projects are selected for funding. The purpose of this “stage-gate” process is to ensure early evaluation of projects against technical and nontechnical criteria in order to ensure that end products will not only provide superior performance, but also meet the acceptance requirements of the intended customers. The model addresses the technology transfer and commercialization factors that must be considered to get technological innovations into the marketplace. The model is now being implemented within the EM technology development program and is providing a common framework to align the Department's environmental R&D activities with its cleanup goals.  相似文献   

2.
Most efforts in transferring technology to a specific location are carried out following essentially a research approach. However, imposing the research approach onto a situation for which a specific solution needs to be created or restructured represents an inappropriate transfer of technology. A planning and design approach (PDA) is called for. “TOTALS” is based on planning and design concepts adapted to solving the problems of technology transfer. It is composed of six time-based and repeating phases, comprised of nineteen steps. It is based on four important concepts: a systems view of technology, a Technology Transfer Equation, five different purposeful perspectives regarding technology transfer activities, and a holistic PDA. No particular approach, technique, model or body of knowledge can be said to be predominant.  相似文献   

3.
The military threat to national security has substantially diminished, and the need for a stronger focus on economic competitiveness for the US is becoming more pronounced every day. We must find ways to accomplish more-effective technology transfer. This paper outlines four technology-transfer strategies used by the Department of Energy's national laboratories: the passive strategy, the active strategy, the entrepreneurial strategy, and the national-competitiveness strategy. It compares these strategies in terms of organizational structure, performance measures, and staffing, and it discusses the implications of these comparisons of technology transfer. The findings contained in this paper are based on the author's interviews with technology-transfer staff and program directors at the national laboratories and on analysis of the institutional plans.  相似文献   

4.
National technological programs in Taiwan aiming at commercial applications have been proliferating. However, their management is incompletely documented. This paper uses a comparative-technology perspective to examine taiwan's eight national programs in energy, materials, information, automation, biotechnology, electro-optics, hepatitis control, and food. It offers management implications concerning (a) national technology capability based on technology imitation and a strategy of backward integration; (b) R&D selection, technical service strategy, and performance; (c) interorganizational technology transfer; (d) alliance strategies; and (e) functional integration.  相似文献   

5.
One of the most admired aspects of U.S. technology has been the ability to assimilate and commercialize new science and technology. In light of the rising international competition, there has been new emphasis placed on the commercialization of U.S. science and technology developed in the federal laboratories. While research and development remains the focus of these laboratories, passage of the Stevenson-Wydler Technology Act of 1980 and the Technology Transfer Act of 1986 has resulted in a means to further the exploitation of discoveries, patents, and copyrights developed within the laboratories. The transfer of technology to industrial partners and users is a complex task for a federal laboratory. Since the interaction with industry, as well as market knowledge and assessment of the needs of business users are beyond the charter of a federal laboratory, new organizational mechanisms are required in order to obtain full commercial value from the laboratories' efforts. A study was instituted to examine selected organizational and policy arrangements for achieving the optimum commercial value from the science and technology research at the research and development laboratories sponsored and funded by the U.S. government.  相似文献   

6.
In this paper we explore the importance of marketing activities during the Fuzzy Front End of Innovation (FFEI), which in product life cycle management is described as the phase between R&D and the beginning of formal new product development. The FFEI is characterized by informal processes and many industry specific conditions. The particular context in which the study was conducted involved research emerging from a US government sponsored institution. Firms obtain licenses for technology from the government sponsored institution with the purpose of advancing them towards commercialization. But, the process of development often gets stalled, especially during the initial stages due to the lack of a number of resources (financial, key personnel, etc.). The specific interest in this study was, therefore, to understand the extent to which various marketing efforts by the licensees enabled the survival of early stage biotech innovations. Licensees would be expected to seek resources by undertaking a number of marketing activities designed to communicate a value proposition to potential resource providers. The study involved qualitative data collection among licensees to uncover marketing activities in which they engaged during the FFEI phase. The data was coded to develop the specific types of marketing activities that had been employed so as to provide insight into which activities were important in enabling early stage innovation survival. Future research can build upon this study’s findings in industries other than biotech and involving different sources of technology transfer (universities, etc.).  相似文献   

7.
This article argues that Google's essentially blanket and unsafeguarded dissemination to webmasters of URLs delisted under the Google Spain judgment disclosures claimants’ personal data, cannot be justified either on the purported basis of their consent or a legal requirement but instead seriously infringes European data protection standards. Such disclosure would only be compatible with the initially contextually sensitive context of collection where it was (i) reasonably necessary and explicitly limited to the purposes of checking the legality of the initial decision and/or bona fide research and (ii) prevented unauthorised repurposing or other misuse through robust safeguards. Strict necessity thresholds would need to apply where disclosure involved special categories of data or was subject to reasoned objection by a data subject and international transfers would require further controls, ideally as provided by the European Commission's standard contractual clauses. Disclosing identifiable data on removals to end users would directly and fundamentally undermine a data subject's rights and, therefore, ipso facto violate purpose limitation and legality, irrespective of whether rights are claimed in data protection, defamation or civil privacy. The public's legitimate interests in receiving information on personal data removals are best secured through safeguarded scientific research, which search engines should facilitate.  相似文献   

8.
This paper addresses three questions: First, what is the extent of research transfer in natural sciences and engineering among Canadian university researchers? Second, are there differences between various disciplines with regard to the extent of this transfer? And third, what are the determinants of research transfer? To answer these questions, the paper begins by differentiating between technology transfer and knowledge transfer. It then identifies the individual researcher as the unit of analysis of this study and introduces a conceptual framework derived from the resource-based approach of firms. The paper then reviews the literature on each of the factors included in the conceptual framework, beginning with the dependent variable, knowledge transfer. The conceptual framework includes four categories of resources and one category of research attributes that are likely to influence knowledge transfer. Based on a survey of 1,554 researchers funded by the Natural Sciences and Engineering Research Council of Canada (NSERC), comparisons of means of research transfer across research fields were conducted. Multivariate regression analyses were used to identify the determinants of research transfer by research field. The results of these analyses indicate that researchers transferred knowledge much more actively when no commercialization was involved than when there was commercialization of protected intellectual property. This paper thus adds to the relatively scarce evidence about knowledge transfer by examining knowledge transfer from a broader perspective than strict commercialization. The findings of this paper are also interesting for other reasons. We obtained statistical evidence indicating that researchers in certain research fields were much more active in knowledge transfer than those in other fields, thereby pointing to differences in levels of knowledge activities across research fields. Furthermore, we obtained evidence showing that only two determinants explained knowledge transfer in all the six research fields considered in this study, namely, focus of research projects on users’ needs, and linkages between researchers and research users. Statistical evidence obtained indicates that the other determinants that influence knowledge transfer vary from one research field to another, thus suggesting that different policies would be required to increase knowledge transfer in different research fields. The last part of the paper outlines the implications of the regression results for theory building, public policy and future research.  相似文献   

9.
Cloud computing is a technology that facilitates improved productivity, improved efficiency and lower costs. This technology has the potential to improve the reliability and scalability of organizational systems and leads to an enhanced focus on core business and strategy. Despite the Australian Federal Government's ‘cloud-first’ strategy and policies and the Queensland State Government's ‘digital-first’ strategy, the adoption of cloud services at the local government level has been limited, largely due to a lack of specificity among government regulations and a lack of regulations that provide support to local governments. This empirical study deploys a mixed research method designed to develop a cloud regulations model to assist governments in adopting cloud computing services. By integrating Australian Cloud Policy Frameworks with the extant research on cloud computing, this study conducted 21 field interviews with Information Technology (IT) managers and surveyed 480 IT staff from Australia's 47 local governments. This research paper presents and validates a revised set of factors used to develop government regulations specific to cloud computing adoption. The factors that we found to be statistically significant were cost, quality of services, security, privacy, management, government-based facilitating conditions, and firm-based facilitating conditions regulations. Based on these findings, this research concludes that government regulation is a significant aspect in decision making for the adoption of any new technology such as cloud computing.  相似文献   

10.
With a little-used gold mine of federal technical resources available to American industry, and adequate networking structure to expedite the transfer of valuable information is needed. The US government's laboratories have assisted some corporations, particularly those in defense-oriented industries, through collaborative research activities. To face the competition from abroad, a greater segment of American industry, of necessity, must tap the technical information and assistance available within the maze of federal laboratories to convert new and existing research into tangible, marketable products. NERAC has designed and tested an accessing model that matches the technological needs of American industry with federal experts through an existing network of federal-laboratory technology-transfer officers. The process is uncomplicated and direct. As a knowledgeable liaison, NERAC has developed a communication network to facilitate the transfer of often-unique material from the federal laboratories to American industry.  相似文献   

11.
Corruption is pervasive, rampant, enduring, and above all else a tolerated and taken for granted social problem in China. Still, corruption is a major concern for the political leaders, general public and foreign observers. Foreigners complained about the corruption cost of doing business in China. Students took to the street and peasants staged violent protest against government corruption. The consensus is that corruption challenges CPC's legitimacy and threatens China's stability.A systematic review of literature uncovers no investigation on the Chinese people's reception and reaction to the corruption, in the net. This is a first attempt to do so.This is a research into the “feelings” and “thinking” of Chinese internet users (e-public) on (anti)corruption in China. Specially, it tries to document and analyze the comments – reaction of the e-public to news articles on various aspects of “Audit Storm” in June–July of 2004.  相似文献   

12.
In the early 1990s, unmanned aerial vehicles (UAV) were used exclusively in military applications by various developed countries. Now with its ease of availability and affordability in the electronic device market, this aerial vehicular technology has augmented its familiarity in public and has expanded its usage to countries all over the world. However, expanded use of UAVs, colloquially known as drones, is raising understandable security concerns. With the increasing possibility of drones' misuse and their abilities to get close to critical targets, drones are prone to potentially committing crimes and, therefore, investigation of such activities is a much-needed facet. This motivated us to devise a comprehensive drone forensic framework that includes hardware/physical and digital forensics, proficient enough for the post-flight investigation of drone's activity. For hardware/physical forensics, we propose a model for investigating drone components at the crime scene. Additionally, we propose a robust digital drone forensic application with a primary focus on analyzing the essential log parameters of drones through a graphical user interface (GUI) developed using JavaFX 8.0. This application interface would allow users to extract and examine onboard flight information. It also includes a file converter created for easy and effective 3D flight trajectory visualization. We used two popular drones for conducting this research; namely, DJI Phantom 4 and Yuneec Typhoon H. The interface also provides a visual representation of the sensor recordings from which pieces of evidence could be acquired. Our research is intended to offer the forensic science community a powerful approach for investigating drone-related crimes effectively.  相似文献   

13.
Corruption is pervasive, rampant, enduring, and above all else a tolerated and taken for granted social problem in China. Still, corruption is a major concern for the political leaders, general public and foreign observers. Foreigners complained about the corruption cost of doing business in China. Students took to the street and peasants staged violent protest against government corruption. The consensus is that corruption challenges CPC's legitimacy and threatens China's stability.A systematic review of the literature uncovers no investigation on the Chinese people's reception and reaction to the corruption, on the internet. This is a first attempt to do so.This is a research into the “feelings” and “thinking” of Chinese internet users (e-public) on (anti)corruption in China. Specially, it tries to document and analyze the comments–reaction of the e-public to news articles on various aspects of “Audit Storm” in June–July 2004.  相似文献   

14.
15.
The role of an individual known as a ‘linker’ is examined and the similarities between his role and those of ‘gatekeeper’, ‘opinion leader’, and ‘innovator’ are discussed in detail. Not only are the similarities among these roles pointed out but also the unique characteristics of the ‘linker’ are clarified. A Linker Model for Technology Transfer is presented showing the value of a ‘linker’ to the parent and users organizations. Managerial endeavors to understand and promote technology transfer can be facilitated by the in-depth research presented.  相似文献   

16.
Technology transfer should not be viewed as a single, “one shot” process. There are downstream strategic issues that must be dealt with if the technology-transfer process is to be well-integrated into a firm's activities. Too often these downstream issues are not apparent during the decisions leading to the actual transfer of the technology. Several key issues that should be weighed by managers are presented, their impact on competitive positioning is considered, and they are discussed in the contexts of maquiladora (twin-plant) factories in Mexico and investments in Chinese Special Economic Zones.  相似文献   

17.
Companion papers by Drs. Horn and Doelling have described the objectives of the National Sea Grant College Program and the breadth of activities presently sponsored, ranging from research and education through information and technology transfer. Dr. Doelling in particular has dealt with the university-industry interface and a specific attempt at the Massachusetts Institute of Technology to develop a mutually profitable dialog on current problems in ocean engineering and related university research. This paper deals with a planned program aimed at the development of new ocean technologies through university research in cooperation with industry.  相似文献   

18.
19.
Legislative studies research often insists on the weakness of the French Parliament compared with the executive. Yet very little qualitative and quantitative empirical research has been done into the work of deputies in the French National Assembly, or into the institution's role in policy and law-making. This article addresses these research gaps by first analysing the characteristics and drivers of French MPs' involvement in law-making rather than in other parliamentary activities, either in the Parliament or in their constituency. Second, it takes an original approach by comparing MPs' perceptions of their activities with those of their electorate through the use of mixed-method analyses (open and closed questionnaires with 230 MPs; 13 focus groups with ordinary citizens). This is indeed a crucial issue in order to better understand the causes fuelling citizens' criticism of their representatives.  相似文献   

20.
Presidents have become their parties' chief fund‐raisers and thus have the capacity to further their parties' collective fortunes by imposing a more efficient distribution of campaign resources than might otherwise prevail. In order to succeed, presidents must, first, accurately target their efforts where they will best improve candidates' prospects for winning seats, and second, either directly or indirectly (through signaling to other donors) generate sufficient new resources to affect the election outcome. Analyses of Bill Clinton's extensive fund‐raising efforts during the 1999–2000 election cycle confirm that presidents can indeed use their unmatched fund‐raising ability to help their parties win congressional contests they might otherwise lose. But analysis of the Clinton record also shows that presidential fund‐raising activities may be shaped by other purposes that lead to a distribution of effort that is suboptimal for the party.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号