The Federation of Critical Infrastructure Information via Publish-Subscribe Enabled Multise
外刊每日精读 Making trouble
外刊每日精读 | Making trouble文章脉络【1】看重制造业的国家都有工业战略,但是英国没有。
【2】英国对自己的可再生能源产业非常自满。
【3】安迪·霍尔丹称英国很可能在这场再工业化军备竞赛中落后。
【4】与中国相比,西方在绿色技术方面觉醒地太晚了。
【5】英国想要成为一个制造业“超级大国”还有一段路要走。
【6】英国不再是一流的制造业经济体,而且几十年以来都不是。
【7】戴森最近宣布将把电池工厂建在新加坡,这也完美诠释了英国现在正面临的挑战。
【8】戴森没有选择在英国建厂有多重原因。
【9】英国进行高价值的脑力劳动,其他国家负责生产的想法已经不再符合实际。
【10】国家相关战略的缺失让制造商处于竞争劣势。
【11】缺少合适的、有规划的工业战略是英国的致命弱点。
【12】从行动来看,英国似乎并没有参与竞争。
经济学人原文Making trouble:UK needs an industrial strategy to compete in manufacturing【1】Countries that are serious about manufacturing have industrial strategies.The US and China have one. So do Germany and France. Britain does not . Rishi Sunak talks about turning the UK into a “science and technology superpower” but that’s all it is: talk. It is a PR strategy masquerading as an industrial strategy.【2】Faced with the challenge presented by Joe Biden’s inflation reduction act (IRA), the government says it has no need to respond to the package of green subsidies being provided by Washington because Britain has already established a thriving renewables sector and the Americans are playing catch up. The complacency is staggering.【3】Andy Haldane , once the Bank of England’s chief economist and now the chief executive of the Royal Society of Arts, last week said: “The world is facing right now an arms race in re-industrialisation. And I think we’re at risk of falling behind in that arms race unless we give itthe giddy-up.”【4】China, Haldane added, had been focusing on green technology for many, many years and had forged ahead in tech such as solar and batteries. “The west has belatedly woken up,” he said. “The IRA is throwing cash to the wall on that. The cost of that [is] almost certainly north of half a trillion dollars. Possibly north of $1tn. The EU is now playing catch up, [and] the UK currently is not really in the race at any kind of scale.”【5】A quick glance at the latest trade figures shows Britain has some way to go to be a manufacturing“superpower”.manufacturing’s share of the economy shrank from more than 30% to less than 10% of national output in Elizabeth II’s reign. The goods deficit, last in surplus in the early 1980s, stood at £55bn in the first three months of this year, with imports more than 50% higher than exports. A £40bn quarterly surplus in services was not enough to close the trade gap.【6】Those who supported Brexit say the UK now has the freedom to export more to faster growing parts of the world economy . Those who opposed it say exporting to the EU has become more burdensome. Both are right, but both are missing the point. Before Britain can take advantage of export opportunities it has to have stuff to export. The fact is the UK is no longer a firstrank manufacturing economy and hasn’t been for decades.【7】Dyson’s recent announcement that it will build a battery factory in Singapore is a perfect illustration of the challenge facing the UK. There was never the remotest possibility that the plant would be in the UK due to what its founder James Dyson, a prominent Brexit supporter, called in a letter to the Times, t he “scandalous neglect” of science and technology businesses.【8】Only part of the company’s reluctance to manufacture in the UK is due to the recent jump in corporation tax, though that wipes out any benefit from tax breaks for research and development. It is also the planning system, the lack of trained engineers, the disdain shown for science and technology, and government interference in the way businesses are run.【9】The company says the UK will remain a centre for R&D, and it will invest £100m in a new tech centre in Bristol for software and AI research. But the idea that Britain can do all the high-value brain power stuff while other countries do the production is an illusion. Increasingly, Dyson’s R&D happens in Singapore, the site of its global HQ, and in the Philippines.【10】Dyson is by no means alone. A report by the lobby group Make UK found that six in 10manufacturers thought government had never had a longterm vision for manufacturing, while eight in 10 considered the absence of a strategy put their company at a competitive disadvantage compared with other manufacturing nations. It is no surprise that AstraZeneca recently announced it was building its new factory in Ireland .【11】Stephen Phipson, Make UK ’s chief executive , said last week the US was spending 1.5% of national output on its IRA. The equivalent sum in the UK would be £33bn. It was not just the money, though. “A lack of a proper, planned industrial strategy is the UK’s achilles heel ,” Phipson said. “Every other major economy, from Germany, to China, to the US, has a long-term national manufacturing plan, underlying the importance of an industrial base to the success of its wider economy. The UK is the only country to not have one.“If we are to not only tackle our regional inequality, but also compete on a global stage, we need a national industrial strategy as a matter of urgency.”【12】One option is to concentrate instead on sectors where the UK does have global clout: financial and business services, for example. In that case, the pretence has to stop that levelling up will be delivered by new factories turning out world-beating products.The government can either make Britain an attractive place for manufacturing companies to invest or it can decide not to compete. Judged by its actions rather than by its rhetoric, it seems to have chosen the latter option.。
公共管理专业英语第二单元课文翻译.
Lesson 2 The Managerial Approach to Public Administration公共管理涉及一系列复杂的关系和函数。
毫不奇怪,因此,作为一个学科或身体或理论,公共管理缺乏连贯性。
公共管理包含三个比较明显的方法生长出不同的角度对其功能。
有些人认为这是一个管理的努力,类似的做法在私人部门。
其他人,强调“公共性”的公共管理,强调其政治方面。
还有人指出,主权的重要性,宪法,并规定在公共管理,把它视为一个明显的法律问题。
每个这些办法往往强调不同的价值,程序和结构安排的公共行政活动,每一个意见,市民在一个非常不同的方式,和各采用不同的角度对如何发展知识。
进一步复杂的是,管理方法有2个亚群:传统(或传统)公共管理与当代改革故宫*。
记住,这些做法是嵌入在我们的政治文化。
它们反映了宪法权力分立和分配职能的不同分支。
管理方法与行政机构的利益,忠实执行或执行法律。
政治态度与立法决策问题。
法律方法侧重于政府的审判职能,致力于维护宪法权利和法治。
一旦我们已经提出的依据这三个广泛的办法,广泛的管理,我们将完成我们的定义的讨论。
我们可以把一个如何解释每个人提出的各种活动的当代公共管理。
公共行政的管理办法那些定义公共行政管理方面,以高效率的方法它往往以尽量减少之间的公共和私人管理的区别。
在他们看来,公共管理基本上是一样的大企业,应当是按照同样的管理原则和价值观。
这一观点根深蒂固的某些部分的美国社会,是经常发现在选修的政治领袖,往往对政治的影响行使公务员*这是不寻常的总统选举的候选人不强调所谓的能力,“管理”的联邦官僚机构并使其更有效和经济。
州长和市长候选人经常吹嘘他们的管理技能以及*。
今天,那些谁看公共行政管理分为2组。
传统主义者所取代正在改革者呼吁“重塑政府“发展”。
故宫是取代传统的方法在几个联邦机构,国家和地方政府。
它也很强,在其他一些国家,包括英国,澳大利亚,新西兰,和斯堪的纳维亚国家。
Identifying Critical Infrastructure The Median and Covering Facility Interdiction Problems
Identifying Critical Infrastructure:The Median and Covering Facility Interdiction ProblemsRichard L.Church,Maria P.Scaparra,and Richard S.MiddletonDepartment of Geography,University of California,Santa BarbaraFacilities and their services can be lost due to natural disasters as well as to intentional strikes,either by terrorismor an army.An intentional strike against a system is called interdiction.The geographical distribution of facilitiesin a supply or service system may be particularly vulnerable to interdiction,and the resulting impacts of the loss ofone or more facilities may be substantial.Critical infrastructure can be defined as those elements of infrastructurethat,if lost,could pose a significant threat to needed supplies(e.g.,food,energy,medicines),services(e.g.,police,fire,and EMS),and communication or a significant loss of service coverage or efficiency.In this article weintroduce two new spatial optimization models called the r-interdiction median problem and the r-interdictioncovering problem.Both models identify for a given service/supply system,that set of facilities that,if lost,wouldaffect service delivery the most,depending upon the type of service protocol.These models can then be used toidentify the most critical facility assets in a service/supply system.Results of both models applied to spatial dataare also presented.Several solutions derived from these two interdiction models are presented in greater detailand demonstrate the degree to which the loss of one or more facilities disrupts system efficiencies or coverage.Recommendations for further research are also made.Key Words:critical infrastructure,facility location,p-medianproblem,maximal covering,interdiction.S upply systems involve a set of manufacturing, storage,and transportation facilities and assetsthat accomplish the supply of goods and services. There is a risk of sudden loss of facilities and assets due to natural causes such asfloods andfire and due to man-made causes such as terrorism and military action.Our concern in this article deals with the latter type of problem,that is,a loss of capacity due to some type of attack.Intentional disruption of a supply system is called interdiction.The problem of interdiction has received considerable attention due to the interest in interdicting supply lines during warfare(McMasters and Mustin 1970).More recently,interest has focused on what is termed‘‘critical infrastructure.’’W e define critical in-frastructure as those elements of infrastructure that,if lost,could pose a significant threat to needed supplies (e.g.,food,energy,medicines),services(e.g.,police,fire, and EMS),and communication or a significant loss of service coverage or efficiency.These services and sup-plies are often termed‘‘lifelines.’’Losing capacity of a lifeline could have a great impact on a population or army.Each lifeline system has certain elements that are more important than others.Those elements of infra-structure that are most important in a lifeline system are often called the‘‘vital’’links.For example,one element of a power transmission system may be a key link in providing power to a very large area,and alternate system routes may not have the capacity to provide ad-equate supply.The loss of that key link would be det-rimental to the full operation of the system and is therefore vital to system supply.Cutter,Richardson,and Wilbanks(2003)have identified the need to develop methods for identifying critical infrastructure as one of several national research priorities.In this article we introduce two new models called the r-interdiction median problem and the r-interdiction covering problem.Both models identify for a given service/supply system,that set of facilities that,if lost, would affect service delivery the most,depending upon the type of service protocol.These models can then be used to identify the most critical facility assets in a service/supply system.In the next section,we give a brief review of the literature on modeling interdiction.Then we define a general problem of facility interdiction that can be used to help identify‘‘critical facilities,’’that is, which facilities to interdict or which facilities to protect. In a subsequent section,we define the p-median location model and its interdiction model counterpart.W e then define the maximal covering location problem along with its interdiction model counterpart.Both of these interdiction models are new,innovative models that can be used to identify critical facility assets.W e follow with some computational experience and present several example solutions to both interdiction models.W eAnnals of the Association of American Geographers,94(3),2004,pp.491–502r2004by Association of American GeographersInitial submission,April2003;final acceptance,August2003Published by Blackwell Publishing,350Main Street,Malden,MA02148,and9600Garsington Road,Oxford OX42DQ,U.K.conclude with a summary and recommendations for future work.BackgroundLoss of service or supply can be the result of a number of different types of factors,including system component failure,natural disaster(e.g.,earthquake),catastrophic accident(e.g.,Chernobyl nuclear power plant disaster),financial collapse,and intentional disruption(e.g.,ter-rorism and military action).W e exclude from our con-cern here issues of system reliability due to common component failure.System reliability is a well-defined researchfield that involves the design of a system to meet specified levels of reliability(based upon failure rates of specific components)and the modeling and simulation of system reliability(see,for example Tillman,Hwang,and Kuo1977;Mohamed,Leemes,and Ravindran1992).Reliability analysis has been applied to many different systems including water distribution systems(Kansal,Kumar,and Sharma1995)and tele-communications(Premkumar,Chou,and Chou2000). Our focus in this article is on intentional disruption of specific components of a system and not on analyzing system reliability due to known failure rates of system components.In services or supply,there are two principal types of losses:(1)loss of transportation/communication system capacity,and(2)loss of supply,storage,or manufacturing capacity.For example,consider an integrated petroleum fuel system consisting of oil wells,crude storage facilities, crude transportation facilities(e.g.,ships and pipelines), refineries,and a product distribution system of storage facilities,trucks,and pipelines.If a system operates at capacity in virtually every component,then any dis-ruption of any part of the system will cause loss of supply or service.If excess capacity exists in many of the component parts,then it is possible that the destruction of some parts of the system may have little effect on the ability of that system to supply fuel to its customers. Thus,some components may be more important than others in maintaining system operation without reducing fuel deliveries.Interdicting elements of a supply system has been the subject of interest by military planners(McMasters and Mustin1970).For example,consider a logistics system that supplies an advancing army.The natural question is where along the supply routes are the locations where interdiction would be most effective.For example,what is the impact on a supply route if a bridge used in that supply route is destroyed by a bombing mission?If an alternate bridge crossing is nearby,the system function-ality might be easily restored by forcing the supply route to detour to that nearby bridge.The overall impact of the loss of the bridge might therefore be minimal.In-terdiction is most effective if it is focused on those parts of the supply system that,if disrupted,cause the greatest impact on system operation.Optimal interdiction in-volves identifying the most cost-effective,maximal way to disrupt a system.Assume that a logistics system is represented as a transportation network,representing sources,demands, and transport links or arcs.A feasible supply route can be represented as a series of connected arcs that can ac-commodateflow oriented from the source to the desti-nation.Interdiction on a supply network can be defined at nodes or along arcs.There are two basic types of in-terdiction:(1)partial or incremental interdiction,and (2)complete interdiction.In partial interdiction,the capacity along an arc or at a facility can be lowered in-crementally,by a series of attacks,to a lower bound (!0).For incremental interdiction,it is usually assumed that the capacity reduction is a linear function of the levels of allocated interdiction such as bombing sorties (e.g.,W ood1993).Complete interdiction is based upon the assumption that an arc or facility loses all capacity upon interdiction.Thus,complete interdiction is an all or nothing proposition(i.e.,0or1).Several different types of interdiction models have been developed.T able 1summarizes past work in this area,specifying the types of models that have been developed,based upon the objective used,the type of interdiction used,special constraints(e.g.,interdiction budget),and the underly-ing network model.Three major models,borrowed from thefield of network optimization theory,have been used as underlying models for supply network interdiction:(1) the capacitated networkflow model,(2)the minimum costflow model,and(3)the shortest path model.The first attempt to analyze the sensitivity of a transportation network to interdiction was undertaken by W ollmer (1964),who considered removing afixed number of arcs so as to minimize the networkflow capability(whenever the model requires a preset number of complete inter-dictions to be allocated across a network,we indicate the corresponding constraint in T able1as a‘‘cardinality’’constraint).The interdiction model introduced by McMasters and Mustin(1970)also aims at minimizing the maximalflow capacity from a source to a sink in a network but allows incremental interdiction on each arc and imposes a budget constraint on the cost of inter-diction.Ghare,Montgomery,and T urner(1971)devel-oped a similar model where the type of interdiction was 0or1(complete).An examination of the past work demonstrates an emphasis on the development ofChurch,Scaparra,and Middleton 492models involving arc interdiction.Corley and Chang (1974)were thefirst to demonstrate that an interdiction model based on the disruption of afixed number of nodes could be reduced to an analogous arc interdiction model(Ratliff,Sicilia,and Lubore1975)by suitably augmenting the underlyingflow network.Subsequently, interdiction on nodes was investigated by Whiteman (1999),who used a capacitatedflow network model to identify least-cost target sets for military strikes.Both complete and partial interdictions were allowed,de-pending on the target point,in order to induce a given level of interdiction for each commodity moved on the network.Whiteman’s model is an extension of one of the models introduced by W ood(1993)for arc in-terdiction.W ollmer(1970)was thefirst to model interdiction on a network where the objective was to maximize the minimum costflow.Interdiction reduced the capacity and increased the cost offlow along an arc.W ollmer also considered the time to repair the arc along with repair costs.Thus,interdiction was not permanent,but lasted until repairs could be made.Fulkerson and Harding (1977)and Golden(1978)also modeled interdiction by using a minimum costflow problem.Fulkerson and Harding(1977)considered partial interdiction on arc lengths so as to maximize the shortest paths betweenT able1.Interdiction Problems:References and Structural CharacteristicsReference Objective Decision Constraint Underlying ModelW ollmer(1964)Minimize networkflowcapacity Complete interdiction on arcs Cardinality Maximumflow throughplanar networksW ollmer(1970)Maximize minimum-costflow Complete interdiction on arcs Cardinality Minimum costflowthrough networksMcMasters and Mustin (1970)Minimize networkflowcapacityInterdiction on arc capacitiesby unitsBudget Maximumflow throughplanar networksGhare,Montgomery,and T urner(1971)Minimize networkflowcapacityComplete interdiction on arcs Budget Maximumflow throughnetworksCorley and Chang(1974)Minimize networkflowcapacity Complete interdiction onnodes and incident arcsCardinality Maximumflow throughnetworksRatliff,Sicilia,and Lubore (1975)Minimize networkflowcapacityComplete interdiction on arcs Cardinality Maximumflow throughnetworksFulkerson and Harding (1977)Maximize shortest source-sink pathInterdiction on arc lengths byunitsBudget Minimum costflowthrough networksGolden(1978)Minimize interdiction costs Interdiction on arc lengths byunits Disruption Level Minimum costflowthrough networksCorley and Sha(1982) Ball,Golden,and V ohra (1989)Malik,Mittal,and Gupta(1989)Maximize shortest source-sink pathComplete interdiction on arcs Cardinality Shortest path throughnetworksPhillips(1993)Minimize networkflowcapacity Interdiction on arc capacitiesby unitsBudget Maximumflow throughouterplanar and planarnetworksW ood(1993)Minimize networkflowcapacity Complete interdiction on arcsInterdiction on arccapacities by unitsBudgetCardinalityMaximumflow throughgeneral networks andmulti-commoditynetworksCormican,Morton,and W ood(1998)Minimize expectedmaximumflowInterdiction attempt on arcs Budget Maximumflow throughnetworksWhiteman(1999)Minimize interdiction costs Complete and partialinterdiction on nodes Disruption level Maximumflow throughmulti-commoditynetworksIsraeli and W ood(2002)Maximize shortest source-sink path Complete interdiction on arcs Budget Shortest path throughnetworksBurch et al.(2003)Minimize networkflowcapacity Complete interdiction on arcs Budget Maximumflow throughnonplanar networksHemmecke,Schultz,and W oodruff(2002) Held et al.(2003)Maximize the probability ofgiven disruption levelComplete interdiction on arcs Budget Shortest path throughuncertain networksIdentify Critical Infrastructure:The Median and Covering Interdiction Problems493supply and demand points subject to an interdiction budget.Golden(1978)investigated a least-cost partial interdiction strategy to ensure a predetermined increase in the shortest path length.Several authors(Corley and Sha1982;Ball,Golden,and V ohra1989;Malik,Mittal, and Gupta1989)considered the problem of identifying afixed number of arcs that,if removed(i.e.,complete interdiction),would cause the greatest increase in shortest distance between two prespecified points.Israeli and W ood(2002)addressed a generalization of this problem by including an interdiction budget con-straint.Finally,stochastic variants of networkflow interdiction problems have been investigated by Cormican,Morton,and W ood(1998),Hemmecke, Schultz,and W oodruff(2002),and Held,Hemmecke, and W oodruff(2003).In summary,the major emphasis has been on arc in-terdiction,as opposed to facility interdiction.For the remainder of this article,we will focus on the loss of service or supply facilities and not on the loss of capacity of a transport link.In addition,interdiction will be modeled as all or nothing.Our reason for approaching this type of problem is to identify‘‘critical service facil-ities’’in a system.For example,we may havefive supply facilities servicing a region of100different demand lo-cations.A natural question is,which of thefive facilities are the most important locations in providing efficient service?That is,which facilities,if lost,would lead to the greatest disruption of service provision?Let us say,for the sake of an example,that we had the resources to completely interdict two of thefive facilities.Then,we would want to identify the two facility locations that,if taken out,have the greatest impact on the remaining system.Conversely,assume that we have resources to increase protection of two of thefive facilities,making them less vulnerable to interdiction.Obviously,we would want to protect the two sites that,if lost,would result in the most negative consequences in service provision(or protect the two facilities which are the most important to efficient operation).T o address either question,we would seek tofind the worst-case scenario of losing two facilities.In the next few sections of this article,we will define two new facility interdiction problems,based upon the nature of how disruption to service can be measured.The p-Median Problem and ther-Interdiction Median ProblemThe p-median problem involves the location of p fa-cilities in such a manner that the total weighted distance of supplying each demand from its closest facility is minimized(Hakimi1964,1965).The idea is tofind the set of p sites that can supply all of the demands most efficiently as measured by weighted distance.W eighted distance represents the sum of all demand/facility in-teractions where each demand is assigned to its closest facility.For example,the distance to the closest facility is weighted by the number of trips needed to supply that demand from a facility utilizing some type of transport mode(e.g.,truck).Thus,the objective might represent the total truck miles of travel needed to supply all of the demand from the set of located facilities.The problem is tofind that set of p supply locations that yields the smallest needed amount of truck miles of transport. The p-median problem is based upon the assumption that the capacity of any facility will exceed the demands placed upon it.Given this assumption,each demand can be served by its closest facility.Numerous solution pro-cedures and applications have been proposed for the p-median problem starting with the classic works of T eitz and Bart(1968)and ReV elle and Swain(1970).W e define the r-interdiction median problem as:Of the p different locations of supply,find the subset of r facilities,which when removed,yields the highest level of weighted distance.The interdiction median problem is the antithesis of the p-median problem.Whereas the p-median location problem involves locating a set of facilities that can ef-ficiently supply a set of demand points,the r-interdiction median problem involvesfinding the best subset of ex-isting supply sites to remove in order to decrease the efficiency of the existing supply system the most.The r-interdiction median problem begins with an existing facility system and assignment of demand to supply points.For each facility that is subject to interdiction, the demand that was supplied by that facility must now be assigned to a facility farther away,thus increasing the sum of weighted distances.Formulating the r-Interdiction Median Model In order to formulate an optimization model for the r-interdiction median problem,consider the following notation:i index representing places of demandj index representing existing facility locationss j¼1;if a facility located at j is eliminated;i:e:interdicted0;otherwise:8<:Church,Scaparra,and Middleton 494F5the set of existing facilities jx ij¼1;if demand i assigns to a facility at j 0;otherwisea i5a measure of demand(e.g.,number of supply trips)needed at demand id ij5the shortest distance between the supply/service facility at j and demand ir5the number of facilities to be interdicted or eliminatedT ij5{k A F|k¼j and d ik4d ij},the set of existing sites (not including j)that are as far or farther than j is from demand i.W e can now formulate the r-i nterdiction m edian (RIM)problem as the following integer-programmingproblem:Max Z¼Xi Xj2Fa i d ij x ijð1ÞSubject to:Xj2Fx ij¼1for each demand ið2ÞXj2Fs j¼rð3ÞXk2T ijx ik s j for each i and each j2Fð4Þx ij¼0;1for each i and each j2Fs j¼0;1for each j2Fð5ÞThe objective of this model(1)seeks to maximize the resulting weighted distance impact due to the interdic-tion of r-facilities.Constraint(2)maintains that each demand assigns to a facility after interdiction.Constraint (3)restricts the number of interdicted facilities to equal r.Constraints(4)ensure that the assignment from a given demand i is made to the closest remaining facility to i.Essentially,Constraint(4)prevents assignments from demand i to facilities farther than what j is from i, unless the facility at j has been subject to interdiction. Thus,demand i will be forced to assign to its closest remaining facility.Finally,the set of Constraints(5)es-tablishes the integer restrictions on the variables.Note, if all of the site interdiction variables s j are zero–one in value,then the demand assignment variables,x ij,will be zero–one as well.The RIM model is quite different from the original p-median model formulation of ReV elle and Swain(1970),in that the p-median model locates fa-cilities in order to minimize weighted distance and the RIM model eliminates facilities in order to maximize weighted distance.The above RIM model is an integer-linear program-ming model.Possible solution procedures include gen-eral-purpose,integer-linear programming software(ReV elle and Swain1970),Lagrangian relaxation with sub-gradient optimization(Narula,Ogbu,and Samuelsson 1977),heuristics such as T abu search(Rolland,Schilling, and Current1999)and vertex substitution(T eitz and Bart1968),and in smaller cases,enumeration.In a later section,we will give some computational examples of solving the RIM model using general-purpose integer programming software.The possibility exists that we can solve this type of problem for some applications by enumeration.For ex-ample,if there were10supply sources and the possibility of interdicting3of those sources,then there would be only120different combinations.This is small enough in scope that it would make sense to enumerate all of the possibilities and then study the pattern that results in the highest impact to weighted distance as well as the dis-tribution of impacts for the120different combinations. It also would not be unreasonable to generate all of the combinations that10sources could be interdicted in1, 2,3,and so on,ways.However,there are also many sys-tems in which a brute force enumeration would not be feasible.For example,the City of Los Angeles has105fire stations.When the number of facilities is relatively large,the impact of the loss of a few facilities on the operation of the system may be relatively low.For such problems there is safety in large numbers of facilities.On the other side of the issue is calculating the impact of interdiction of a given number of these facilities.Enu-meration is not realistic for even relatively small prob-lems,such as interdicting10facilities out of105,where the number of possibilities is28,848,458,598,960.The time it would take to enumerate all of these solutions, even on a fast computer,would be measured in decades and is clearly not a realistic approach.Consequently,de-veloping models to study facility interdiction is indicated. The Maximal Covering Problem and ther-Interdiction Covering ProblemThe maximal covering problem involves identifying the best placement for a set of p facilities(Church and ReV elle1974).The objective is to place the facilities in such a manner as to maximize the coverage of demand.A demand is said to be covered if a facility is placed within some maximal range,such as distance,time,or within line of sight.For example,infire station location, it is necessary to locate stations so that neighborhoods are within a prespecified maximal service distance or time of travel(T oregas1970).This ensures that a quickIdentify Critical Infrastructure:The Median and Covering Interdiction Problems495response to a neighborhood can be made from a station.A related problem involves locating the smallest number of facilities in such a manner that every demand area or point is covered by at least one station or facility.This second type of problem is called the Location Set Cov-ering Problem(T oregas1970).Many emergency services, such asfire,EMS,and hazardous materials spill response teams are located using covering objectives(see for ex-ample Eaton et al.1985and Plane and Hendrick1977).Interdiction of emergency services facilities,like haz-ardous materials spill response teams or bomb disposal equipment/teams,would involve eliminating the capa-bility of one or more such facilities from being able to respond or operate in a timely manner.The most critical components would be the facilities that,if lost,would yield the highest drop in operational response capability, that is,coverage.W e define the r-I nterdiction C overing(RIC)problem as:Of the p different service locations,find the subset of r facilities,which when removed,maximizes the resulting drop in coverage.Suppose there is a set of facilities that currently provides a high level of coverage to a set of demands.Perhaps the facilities are hazardous materials response facilities.As long as a facility is within a defined coverage distance of a demand area,adequate response for a hazardous ma-terial spill recovery can be made.The solution to an RIC problem would represent the greatest disruption to service should r facilities be compromised or lost.One might think that,if such a loss happened,there would then be automatic redeployment of the assets of the other facilities.If the facilities were owned and operated by two different political jurisdictions(e.g.,neighboring counties)then redeployment might not immediately occur as a county would want to keep equipment to protect its inhabitants.A second example would be an emergency radio system,communication system,or public safety call center.If one or more were destroyed, redeployment or redirecting calls might be nearly im-possible for quite some time.Obviously,some systems, when disrupted,might be able to reorganize quickly so that the loss of service would be limited.RIM and RIC do not address the time in which a system might be able to replace lost services or reorganize,but only the level of disruption upon the loss of one or more facilities. Formulating the r-Interdiction Covering Model W e can formulate the RIC model as an integer-programming model using the notation that was previ-ously defined along with the following notation:y i¼1;if demand i is no longer covered0;otherwiseN i¼j j site j covers demand if gThe r-Interdiction Covering Problem can then be for-mulated in the following manner:Max z¼Xia i y ið6Þsubject to:y i s j for each i and and for each j2N i\Fð7ÞXj2Fs j¼rð8Þy i¼0;1for each ið9Þs j¼0;1for each jThe objective of the RIC model(6)involves maximizing the amount of demand that is no longer covered after interdiction.A demand i is no longer covered if y i51. The value of y i can equal one only when all of the fa-cilities that currently cover i have been eliminated.This property is ensured in Constraints(7).Constraint(7) limits y i50unless each facility site in F that covers i has been eliminated(i.e.,s j51).Constraint(8)limits the number of facilities to be eliminated to equal r.The last set of constraints(9)represent the integer restrictions on the decision variables y i and s j.It should be noted that one can solve this problem with only integer restrictions on the s j.It can be easily proven that in any optimal solution to the model where the s j values are binary in-teger,the values of y i are binary integer as well.The model has one facility elimination variable,s j,for each existing facility as well as one variable for each demand,y i,that represents if coverage has been lost for a given demand.The number of constraints equals the total number of times demands are covered by existing facilities plus one.This is a relatively small problem as most demands are usually covered only a few times at most.The constraints of type(7)can be condensed into the following set:K i y iÀXj2N i\Fs j0for each i;ð10Þwhere K i is the number of times demand i is covered by existing ing Constraints(10)instead of Constraints(7)yields a model that has one constraintChurch,Scaparra,and Middleton 496。
【GMAT精品资源】暴力归纳题目
Critical Reasoning错题归纳(Reebe破题法)一、削弱类(WEAKEN/UNDERMINE)①措施→目的型★(07prep1-25)Twelve years ago and again five years ago, there were extended periods when the Darfir Republic's currency, the pundra, was weak: its value was unusually low relative to the world's most stable currencies. Both times a weak pundra made Darfir's manufactured products a bargain on world markets, and Darfir's exports were up substantially. Now some politicians are saying that, in order to cause another similarly sized increase in exports, the government should allow the pundra to become weak again.逻辑链:降低pundra币值(措施)→出口像以前一样陡增(目的)答案:Darfir的商品生产已接近顶峰。
削弱:有其他因素阻碍目的达成。
生产已达顶峰,就算贬值出口也无法再大幅增长。
★(07prep1-55)According to the Tristate Transportation Authority, making certain improvements to the main commuter rail line would increase ridership dramatically. The authority plans to finance these improvements over the course of five years by raising automobile tolls on the two highway bridges along the route the rail line serves. Although the proposed improvements are indeed needed, the authority's plan for securing the necessary funds should be rejected because it would unfairly force drivers to absorb the entire cost of something from which they receive no benefit.逻辑链:增加过桥费(措施)→积累资金(目的)答案:费用增加后20%的人会选择走其他的路。
UnitAFewKindforSuperstition课文翻译
U n i t5A F e w K i n d W o r d f o r S u p e r s t i t i o n 引言中文译文本文“为迷信辩解一二”最初发表在1978年11月20日的《新闻周刊》上。
为了分析迷信这个复杂的话题,戴维斯将其作了分类,然后详细探讨了为何有人会相信法术和机缘。
尽管人们对他划分的四类迷信现象并不陌生,但是很少有人花费心思进行界定。
戴维斯理性地分析了许多人认为是个非理性的话题,对人性提出了一些非常有趣的看法。
1. 在我们当代有关“非理性复兴”的严肃讨论中,迷信并未对理性和科学形成严重挑战。
超心理学、不明飞行物、神奇治疗、超脱禅定法以及所有瞬间彻悟方式都遭人谴责,但是人们对迷信却只有一声哀叹。
难道这是因为我们当中许多人依然受制于它吗?虽然我们不公开承认。
2. 很少有人承认自己迷信,因为那意味着幼稚或愚昧。
但我生活在一个很大的大学里,发现在那些无疑是头脑理性、满腹经纶的学者中间,迷信仍以四种方式大行其道,香火旺盛。
3. 你不知道迷信有四种存在的方式吗?神学家使我们确信它们确实存在。
他们称第一种方式为镇邪压魔,如切忌在梯子下面行走等。
我看到一位知识渊博的人类学教授不小心弄撒了盐后,撮了点盐撒向自己的左肩膀后方。
当我问起他缘故时,他眼睛一眨,回答说那是“用来击中恶魔的眼睛。
”我没有继续问他有关恶魔的迷信,但我留意到在我问他之前,他脸上没有笑容。
4. 第二种是占卜,即求神问卦。
我认识的另一位渊博的教授对抛硬币解决问题(这是对命运之神谦卑的请求方式)嗤之以鼻,但有一回他却认真地告诉我,他通过拜读《易经》解决了一件本校的事务。
为什么不呢?这块大陆上有成千上万的人求助于《易经》,而他们普遍的知识水平很高,似乎不至于盲从迷信。
几乎如此,但并非完全如此。
令理性主义者难堪的,《易经》往往会给出绝佳的忠告。
5. 第三种是盲目崇拜,大学里面这种情况司空见惯,举不胜举。
你如果在大教室里当过监考,就会知道在课桌上放护符、幸运币等其他祈运物件的考生有多少。
基于SWOT 分析的昆明市创设减脂营养餐厅的可行性研究
食品科技基于SWOT分析的昆明市创设减脂营养餐厅的可行性研究祁 忻,李 昊,张 伟*,李振杰(西南林业大学 机械与交通学院,云南昆明 650224)摘 要:随着人们对健康和减脂的关注度增高,减脂营养逐渐成为餐饮行业重要的关注要素,在减脂营养越来越受到重视的今天,针对有减脂营养餐需求的人群开设减脂营养餐厅有一定的现实可能性。
本文以昆明减脂营养餐厅产业为研究对象,基于SWOT分析方法研究昆明减脂营养餐行业的发展的优势、劣势、机遇及威胁,从而分析创设营养餐的可行性。
关键词:减脂营养餐厅;SWOT分析;可行性研究Feasibility Study of Creating Fat-Reducing and Nutritious Restaurants in Kunming based on SWOT AnalysisQI Xin, LI Hao, ZHANG Wei*, LI Zhenjie(School of Machinery and Transportation, Southwest Forestry University, Kunming 650224, China) Abstract: As people pay more and more attention to health and fat loss, fat-reducing nutrition has gradually become an important factor of concern in the catering industry. Today, as fat-reducing nutrition is getting more and more attention, for people who need fat-reducing nutritious meals, the establishment of fat-reducing nutrition restaurants have certain real possibilities. This paper takes Kunming’s fat-reducing and nutritious restaurant industry as the research object, and based on the SWOT analysis method, it studies the strengths, weaknesses, opportunities and threats of the development of Kunming’s fat-reducing and nutritious meals industry, so as to analyze the feasibility of creating nutritious meals.Keywords: fat reduction nutrition restaurant; SWOT analysis; feasibility study近年来随着人们生活水平的不断提高,我国的肥胖率不断增高。
E-commerce critical success factors East vs. West
E-commerce critical success factors:East vs.WestTae Kyung Sung *College of Business,Kyonggi University,#94-6Yiui-Dong,Youngtong-Gu,Suwon 443-760,South Korea Received 15February 2003;received in revised form 18January 2004;accepted 1September 2004AbstractThe three main purposes of this paper are to (1)identify critical success factors (CSFs)for electronic commerce (EC),(2)investigate the explanatory power of these CSFs on firm performance,and (3)compare differences in evaluating CSFs and explaining impact of CSFs on performance among in Korea,Japan,and USA.Through a literature review and interviews with managers in EC firms,a list of 16CSFs consisting of 111items was compiled.Questionnaires were administered to managers of EC companies in Seoul,Korea,Tokyo,Japan,and Texas,USA.Survey results show that CSFs have very significant explanatory power for firm performance in all three countries.While security,privacy,and technical expertise are the most explanatory CSFs in Korea,evaluation of EC operations,technical expertise,and ease of use show most explanatory power in USA.D 2004Elsevier Inc.All rights reserved.Keywords:Electronic commerce;Critical success factors;Firm performance1.IntroductionOrganization for Economic Co-Operation and Development (OECD)officially acknowledges electronic commerce (EC)as a new way of conducting business [1].In this report,OECD recognizes that EC has the potential to radically alter economic activities and the social environment.Particularly,the enormous growth of EC along with the rapid development of information technology (IT)is having a0040-1625/$-see front matter D 2004Elsevier Inc.All rights reserved.doi:10.1016/j.techfore.2004.09.002*Tel.:+82312499457;fax:+82312499401.E-mail address:tksung@kcfe.or.kr.Technological Forecasting &Social Change 73(2006)1161–1177profound impact on the world economy.EC allows regional businesses and economies to be less local and more global in keeping with long-term trends toward market liberalization and reduced trade barriers [2].Accordingly,EC is considered to be an unavoidable alternative for companies of the 21st century [3,4].When the term b EC Q was first introduced,it was understood as simple as transactions over the Internet [5].However,as EC evolves,the horizon of EC expands as the conduct of selling,buying,logistics,or other organization-management activities via the Web [6].A step further,Weill and Vitale [7]define EC as doing business electronically by completing business processes over open (nonproprietary)networks.According to U.S.Department of Commerce,almost half of the U.S.workforce will be employed by industries that are either major producers or intensive users of information technology products and services by 2006.Internet-related jobs grew 29%between the first quarter of 1999and the first quarter of 2000compared to 6.9%growth of non-Internet related jobs during the same period.The Internet economy generated an estimated US$830billion in revenue in 2000,a 58%increase over 1999[8].The number of U.S.firms engaging in EC has increased from just under 8%in 1999to over 35%by the end of 2000[9].There is a critical question emerging under this explosive EC growth.What is management b best practices Q of successful EC firms?In this respect,the primary purpose of this paper is to explore what are the critical success factors (CSFs)for EC companies.Another related question is the validity of these CSFs.Do CSFs actually impact firm performance?Thus,the secondary purpose is to investigate explanatory power of selective CSFs on firm performance.OECD [2]report indicates that there is a great difference on the growth of EC and impact of EC over economy and society across the nations in the world.This leads to another academically and practically insightful question.Are there any differences in evaluating CSFs and explaining impact of CSFs on performance across the nations?In this paper,Korea,Japan,and USA are selected to perform comparative analyses on theses issues.The structure of the remainder of the paper is as follows.The following section reviews the literature on CSFs and performance measures.Then the research design section describes operational measures and data collection processes.Next,survey results are presented and important research findings and implications are discussed.Finally,Section 5summarizes findings,draws the conclusions,and provides future research directions.2.Literature review2.1.Critical success factors for electronic commerceThere have been few studies explicitly examining CSFs for EC.Rather,most studies implicitly suggest a range of important factors or issues,which may be considered to be CSFs.Huff et al.[10]emphasize nine CSFs for EC firms:First,add value in terms of convenience,information value,disintermediation,reintermediation,price,and choice;Second,to focus on a niche market and then expand;Third,maintain flexibility;Fourth,segment geographically;Fifth,get the technology right;Sixth,manage critical perceptions;Seventh,provide exceptional customer services;Eighth,create effective connectedness;and ninth,understand the Internet culture.Through case studies,Tabor [11]suggests that a synergistic relationship between business strategy and strategic fit is theT.K.Sung /Technological Forecasting &Social Change 73(2006)1161–11771162T.K.Sung/Technological Forecasting&Social Change73(2006)1161–11771163 critical factor for EC success.Plant[12]studies the success factors associated with over40organizations in the US and Europe and identifies the following seven CSFs:financial impact,competitive leadership, brand,service,market,technology,and site metrics.Hahn and Noh[13]use critical failure factors(CFFs)to explore the factors that inhibit the growth of EC.They listed44variables and through empirical study,they categorized them into the following six CFFs:lower level of data security,inconvenient use,unstable systems,lack of information mind,dissatisfied purchasing,and social disturbance.Regression analysis on perform-ance variables further indicates that unstable system,unsatisfied purchasing,and lower level of data security affect satisfaction while unstable systems and lower level of data security affect usage. CFFs that affect users’expectation of EC usefulness are unsatisfied purchasing,social disturbance, and inconvenient use.Hagel and Rayport[14,15]discuss the implications of consumers taking control of their own information as a result of EC strategy.Their work suggests the importance of information security and privacy as key EC success factors.E(electronic)-Loyalty is targeted by Reichheld and Schefter[16]to emphasize the trust of customers to a specific EC company.Manchala[17]also confirms the importance of trust as a critical factor.To explore web-based electronic commerce opportunities,Riggins[18]presents a framework that identifies15key ways to add value to an organization’s e-commerce strategy.The extent to which each of these is utilized represents critical success factors.Similarly,Barua et al.[19]suggest eight key drivers for EC operational success:system integration,customer orientation of IT,supply orientation of IT, international operation of IT,customer-related processes,supplier-related processes,customer e-business readiness,and supplier e-business readiness.A number of studies emphasize the importance of EC strategy[20–27].Athey[18]stresses that EC requires leadership as challenges for the future.Customer orientation is another critical factor discussed by Elofson and Robinson[29],Fulkerson[30],and Gonsalves et al.[31].Hoffman and Novak[32] suggest a new marketing paradigm for EC and a number of researches explore the importance of marketing including pricing mechanisms[17,33–36].Another stream of research is on the issue of evaluation and assessment of EC operations and web sites[22,33,37–39].These researches suggest that effectiveness of EC operations and web sites should be evaluated as EC is considered a strategic necessity.In summary,the literature review on CSFs for EC indicates a broad range of issues including security of information and systems,privacy of customer information,stability of systems,cost of operations, metrics for EC operations and web sites,ease of use,proper presentation of information about goods and services,customer orientation,EC strategy,EC expertise in both technical and managerial perspectives, payment,delivery,competitive price,speed,services,variety of goods and services,web design, marketing,trust and loyalty of customers.From extensive literature review,16CSFs are identified.The results are summarized in Table1.The CSFs in the upper part of Table1are factors mentioned by at least three studies and there are total of16 CSFs surpassing this standard.Even though the categorization of16CSFs is somewhat arbitrary, derivation of CSFs based on literature review is the only feasible methodology since there have been no comprehensive and empirical studies on CSFs of EC.To develop the operationalization of each CFS,careful examination of literature has been done to identify specific items to measure CSFs.A total of125items were compiled for16CSFs and there are five to nine items for each CSF.T.K.Sung/Technological Forecasting&Social Change73(2006)1161–11771165 2.2.Performance of EC firmsHow to measure the success of EC firms?For example,the most successful online seller, ,which had less than US$1billion in revenue in2000,was worth more than long established corporations including Delta Airlines,Kmart,Apple Computer,and Barnes and Noble[40]. Also,as of2001, had not produced a profit.Even Andy Grove,Chairman of Intel,once mentioned b What’s my ROI on e commerce?Are you crazy?This is Columbus in the New World.What was his ROI?Q But in view of such a broad range of often conflicting views and orientations regarding EC success,it is time for researchers to develop valid and reliable measures to evaluate success of EC firms.Most studies on EC success have been centered on levels of national economy,industry,and web sites [41–46].There have been few studies that measure the organizational performance of EC companies as does this research.Organizational performance is a multi-faced construct that defies measurement by a single item and is also an area where much research work is needed[47].IS researchers have utilized a variety of dependent variables to represent firm performance,including perceptual measures such as IT assimilation[48],and objective measures such as ROA,and Tobin’s q[49,50].Tobin’s q ratio(or simply,the q ratio),which is defined as the capital market value of the firm divided by the replacement value of its assets,represents a market-based measure of firm value that is forward looking,risk adjusted, and less susceptible to changes in accounting practices[51].The q ratio has been widely used in business,economics,and finance literature as a measure of business performance[52–55].More recently,the q ratio has also been used in the IS literature to examine the association between IT and firm performance[49,50].Thus,the use of Tobin’s q as a performance measure is applicable in this study.In addition to using a market-based measure,EC CSFs and firm performance will also be assessed through return on assets(ROA),a widely used accounting measure in the IT business value literature [56,57].Using both marketing and accounting measures of firm performance,we can expect more valid research findings and the comparability of measures.In this study,objective measures of firm performance will be used.Since measures of CSFs will be gathered through questionnaires from managers’perceptions,an objective measure of firm performance eliminates potential concerns about methods bias and provides the basis for a robust test of CSFs on firm performance.Also two widely used measures of firm performance are Tobin’s q ratio, and ROA[58].3.Research methodology3.1.Two-staged data collectionA two-staged data collection methodology was adopted.In the first stage,in depth interviews were conducted to verify CSFs extracted from literature review.Twenty high level EC managers from20 Korean EC companies participated in this ing a7-point Likert scale(Very Strongly Agree–Strongly Agree–Agree–Neutral–Disagree,Strong Disagree–Very Strongly Disagree),the list of16CSFs along with125items was presented to interviewees to evaluate the importance of each item to EC success.The list was written in English and each participant has a good command of written English. Items that scored lower than4were removed from the list.After the evaluation,interviewees were askedto eliminate duplicate or similar items and to integrate them if possible.This process removed 14items from the original list.Then each of 20participants was asked to recategorize 111items into 16CSFs in terms of their commonality.After this grouping,all 20participants discussed the recategorization for further refinement and generalizations.There was only slight deviation from the original categorization of CSFs.These recategoized CSFs were used for the second stage empirical assessment.In the second stage,uniform questionnaires were administered to EC companies in Korea.Japan,and USA.A preliminary version of the questionnaire was pilot-tested for accuracy and reliability.The same 20study participants in the first stage were asked for the review.Respondents reviewed the questionnaire in the presence of one of the authors and provided feedback regarding wording,understandability,and applicability of the instrument.The original questionnaire used a 7-point Likert scale.However,respondents at the pilot-test indicated that a 5-point scale was more comfortable to answer since they tended to avoid the extreme points.Also there is a number of studies supporting this argument that Korean culture prohibits people to express extreme opinions [59–62].Thus,the 5-point Likert scale (Strongly Agree–Agree–Neutral–Disagree,Strong Disagree)was adopted for the study.Questionnaire was written in English to maintain the compatibility among three countries.There were no noticeable problems due to English in Korea and Japan.Special assistance was provided by researchers in case participants encounter problems in understanding English.3.2.SampleAbout 400EC companies were listed at Chamber of Commerce in Korea at the end of December 2000.There are different types of EC firms,from pure-play like Amazon to bricks-and-clicks like Barnes and Noble.This study included all types of EC firms since it was almost impossible to exactly classify all EC firms into different types.Also most of pure-players are small-and medium-sized firms and could not provide accurate information regarding Tobin’s q and ROA.For the sake of convenience,only EC firms in the metropolitan area of Seoul were targeted.This pre-screen process resulted in a sample of 320firms.To avoid contaminating the sample,recently established companies (that could not provide Tobin’s q and ROA)were eliminated.Two hundred and thirty five EC firms were left and were designated as the target sample.The questionnaire was administered to top EC managers at 235EC companies from January 15,2001to January 19,2001by one nationwide Korean newspaper agency.To secure high response rate,newspaper agency reporters visited each EC firm and solicited participation.Out of 203questionnaires returned,7were unusable.Therefore,the final response rate was 83.40%(196questionnaires).Demographic analysis (comparison of size and sales between respondent and non-respondent companies)did not reveal any significance to suspect sample bias.In Japan,a faculty member at University of Tokyo administered questionnaires.The same above procedure was adopted and EC firms in the metropolitan area of Tokyo were targeted.The questionnaires were administered from August 5–August 25,2001.The final response rate was 47.4%(312questionnaires were distributed and 148were returned).In the USA,the State of Texas was selected as the sample frame.This is because one of the authors was participating state-wide EC surveys conducted by the University of Texas at Austin and Great Austin Chamber of Commerce.The University of Texas at Austin and Great Austin Chamber of Commerce designated 358companies as target sample after careful pre-screening process.The questionnaire was distributed to EC managers at 358EC companies from October 1to October 31,2001.A total of 152questionnaires were returned and 15were unusable.Therefore,the final response rate wasT.K.Sung /Technological Forecasting &Social Change 73(2006)1161–11771166T.K.Sung/Technological Forecasting&Social Change73(2006)1161–11771167 38.27%(137questionnaires).Even though this response rate is not quite high compared to Korean sample,it surpasses Brown’s[64]suggested level of20%in social studies.Again demographic analysis was performed and analysis did not reveal any significance to suspect sample biases in Japan or USA.3.3.MeasuresFrom the first stage of data collection,16factors that consist of111items were identified.Table2 shows the16CSFs as well as a number of items and sample items for each CSF.There were between4 and8items for each factor.As discussed in Literature review,two performance measures of firm performance are employed: Tobin’s q as a market-based measures and ROA as an accounting measure.Each participating EC firm was asked to provide raw financial data and these data were checked with the official data from Korea Table2CSFs and sample itemsCSFs No.of items Sample itemsCustomer relationship6Is Web page customized for each customer? CUSTOMER How much sensitive to needs of customers? Privacy of information7Is there any illegal use of customer information? PRIV ACY Do you honor privacy rights?Low-cost operation7What is cost/revenue ratio?LOWCOST What is overhead cost ratio?Ease of use8How EASE to recognize menu?EASE Is web page sequence logical?EC strategy6Is there EC strategy?STRATEGY Is strategy integrated with IT strategy?Technical EC expertise6Do you have EC expert(s)in company? EXPERTISE Do you have necessary EC technology?Stability of systems8How often system is disconnected?STABILITY How constant system is working?Security of systems8Do you have enough protection from hacking? SECURITY How secure customer information?Plenty of information8Is there enough Information about goods/services? PLENTY Is information relevant?Variety of goods/services7Is there variety of goods/services?V ARIETY Do you carry top-brand goods/services?Speed of systems8How fast is retrieval time?SPEED Is speed fluctuates at peak and off times? Payment process6Is customer payment safe?PAYMENT Do you accept variety of payment?Services8Do you provide A/S?SERVICES Do you have technical service hot lines?Delivery of goods/services8How accurate your delivery to customers? DELIVERY Are Goods delivered are the same as on the screen? Low price of goods/services4Are your prices of goods/services are competitive? LOWPRICE Are Shipping and handling charges are reasonable? Evaluation of EC operations6Do you have metrics for EC?EV ALUATION Do you have metrics for web sites?Stock Exchange (KSE)and Korea Chamber of Commerce.If there were discrepancies between two sources of data,the authors contacted EC firms to provide explanations or correct data.Tobin’s q and ROA are derived from these verified data.The same procedure was applied in Japan and USA.The means of Tobin’s q and ROA of all three countries are in comparable to the average ratios reported in other studies [49].Summary statistics for all research variables are displayed in Table 3.The second column of the Table 3represents the mean score for each CSF,which was derived by averaging the scores of corresponding items for the particular CSF.Averaging the scores of the items to represent the score of CSF was well justified since all measures pass the reliability and validity test (described in the next section).3.4.Reliability and validityReliability refers to the stability of measures over a variety of conditions [63].The amount of error made by any measure is determined by Cronbach’s alpha test applied to inter-item scores and to the overall measures.The results of reliability test on CSFs measures are shown in Table 2.There is no absolute standard for interpreting Cronbach’s alpha.Brown [64]recommends the minimum value of 0.80for tests measuring attitudes or values.More generally,Nunally [63]argues that the satisfactory level of exploratory study is 0.7or above.Cronbach’s alphas (a )are on the far right column of Table 2and all variables suffice the Nunally’s standard and close to Brown’s recommendation.Therefore,reliability of measures is concluded to be satisfactory.To verify the content validity of measures,factor analysis was performed.As Table 4shows,all 16CSFs has high loadings (above 0.5000)on one of four components.Thus,the content validity of CSFsTable 3Descriptive statistics of research variables CSFsNo.of items Korea (n =196)Japan (n =148)USA (n =137)Mean S.D.Cronbach’s a Mean S.D.Cronbach’s a Mean S.D.Cronbach’s a CUSTOMER 6 3.546 1.0870.854 4.0800.7080.813 3.6330.7930.789PRIV ACY 7 3.1050.7350.787 3.0830.7400.788 3.6420.9610.819LOWCOST 7 3.1570.5260.832 3.1320.5340.822 3.1000.7020.835EASE8 3.5600.8300.812 3.448 1.0310.753 3.2040.8240.774STRATEGY 6 2.8700.7680.715 3.1950.7400.864 2.9340.7450.758EXPERTISE 6 3.1840.8390.763 3.2030.8440.822 2.9780.7850.823STABILITY 8 2.9310.9100.809 2.9750.9230.781 2.5000.7350.846SECURITY 8 2.7580.7780.775 2.7300.7960.776 3.4990.8340.831PLENTY 8 2.9470.7870.829 3.4930.8390.738 4.0620.6740.798V ARIETY 7 3.2450.8670.809 3.2180.8380.820 3.2410.7300.725SPEED 8 3.6170.8130.835 3.6190.8240.799 2.8360.7740.775PAYMENT 6 3.1890.7750.736 2.9590.7680.803 3.1660.5330.819SERVICES 8 2.4360.7390.787 2.4510.7540.755 2.9850.9230.843DELIVERY 8 4.0660.7080.758 2.8910.7460.717 3.3580.6310.789LOWPRICE 4 3.3810.6570.848 3.3570.6370.802 3.1730.8250.742EV ALUATION 6 2.8090.7560.723 2.8130.7710.793 2.7540.8070.767Tobin’s q N/A1.1230.255N/A1.0210.254N/A1.3230.257N/AROA20.0134.24713.9124.25615.0214.288T.K.Sung /Technological Forecasting &Social Change 73(2006)1161–11771168T.K.Sung/Technological Forecasting&Social Change73(2006)1161–11771169 Table4Factor analysis on research variablesCSFs Components1234 PLENTY0.68570.37980.18720.0646 PAYMENT0.70580.26260.04670.1747 V ARIETY0.70050.2498À0.19820.3077 LOWPRICE0.5543À0.17910.25290.3154 SERVICES0.6178À0.17790.3045À0.0273 DELIVERY0.50660.06870.30610.1837 SECURITYÀ0.02110.55450.01700.2278 STABILITY0.37100.69110.12710.0056 EV ALUATION0.37990.52810.38730.0195 EXPERTISE0.15950.64910.1617À0.0301 SPEED0.10290.66280.09780.1614 CUSTOMER0.17560.03640.7062À0.1190 STRATEGY0.36790.24500.63360.0802 PRIV ACY0.01620.17330.13450.8091 LOWCOST0.03060.22370.38630.6904 EASE0.22540.2686À0.00230.6523 Variance Explained 2.9009 2.3109 1.8274 1.7618 measures is generally supported.The factor analysis was performed for the validity purpose only.So the meaning of each component is not discussed.Subsequent analyses were performed on individual CSF, not component since major concern is how each individual CSF affects the success of EC.To further examine the predicative validity of CSFs measures,correlation analysis of CSFs on two performance measures was performed(Table5).In the case of Tobin’s q,correlation coefficients of all16 CSFs in Korea,15in Japan,and13in USA are statistically significant at the alpha level of0.05.In terms of ROA,correlation coefficients of15CSFs in Korea,13in Japan,and13in USA are statistically significant at the alpha level of0.01.This correlation analysis indicates that CSFs have considerable association with performance measures.Therefore,the CSFs measures are considered to be predicatively valid.4.Results and discussionsKorean respondents rate DELIVERY(of goods/services)1as the most critical success factor,fol-lowed by SPEED(of systems),EASE(of use),CUSTOMER(orientation),and LOWCOST(operation). On the other hand,SERVICES is evaluated as the least critical factor,followed by SECURITY(of systems),EV ALUATION(of EC operations),(EC)STRATEGY,and STABILITY(of systems)(refer to Table6).Japanese respondents perceive CUSTOMER(orientation)as the most critical success factor,followed by SPEED(of systems),PLENTY(of information),EASE(of use),and LOWPRICE(of Goods/ Services).SERVICES is rated as the least critical factor,followed by SECURITY(of systems), EV ALUATION(of EC operations),DELIVERY(of goods/services),and PAYMENT(Process).1For the detailed discussion of each CSF,please refer to Table2.In contrast to Korean and Japanese respondents,USA respondents evaluate PLENTY (of information)as the most critical success factor,followed by PRIV ACY (of information),CUSTOMER (orientation),SECURITY (of systems),and DELIVERY (of goods/services).STABILITY (of systems)is rated as the least critical factor,followed by EV ALUATION (of EC operations),SPEED (of systems),(EC)STRATEGY ,and (technical EC)EXPERTISE.Korean,Japanese,and USA respondents all rate CUSTOMER (orientation)as very important and EASE (of Use)and V ARIETY (of Goods/Services)as well.Interestingly,Korean and Japanese respondents evaluate SPEED (of systems)as very critical while USA respondents rate otherwise.SECURITY (of systems)is rated very highly by USA respondents,but very low by Korean and Japanese respondents.To further investigate whether there are statistically significant differences in recognizing CSFs among Korean,Japanese,and USA respondents,ANOV A (ANalysis Of V Ariance)was performed (refer to Table 7).ANOV A analysis indicates that respondents rate CSFs quite differently among three countries except PLENTY (of information),V ARIETY (of Goods/Services),EV ALUATION (of EC operations),LOWCOST (operation),(EC)STRATEGY ,and CUSTOMER (Orientation).Korean and Japanese respondents evaluate STABILITY (of systems)and SPEED (of systems)significantly higher than USA respondents.On the other hand,USA respondents rate PRIV ACY (of information),SECURITY (of systems),PLENTY (of information),and SERVICES significantly higher than Korean and Japanese respondents.The above analysis shows that Korean and Japanese EC managers are more concerned about smooth and efficient operations while USA EC managers are more interested in ethical and legal issues of EC.This may be contributing to the fact that Korean and Japanese EC market is in the beginning stage and will face these ethical and legal issues in the near future.Also these gaps in evaluating CSFs may stem from differences in cultural background of the two nations.Koreans and Japanese are well known forTable 5Correlation analysis on critical success factors CSFsTobin’s q ROA Korea Japan USA Korea Japan USA PLENTY 0.5010***0.2951***0.09200.5231***0.2746***0.0661PAYMENT 0.4223***0.4971***0.2740***0.3922***0.5245***0.3192***V ARIETY 0.3998***0.3733***0.3988***0.3979***0.3317***0.3620***LOWPRICE 0.2182***0.1639**0.4296***0.1842***0.11360.3604***SERVICES 0.1800***0.1474**0.5138***0.2009***0.1421*0.5134***DELIVERY 0.1549**0.2597***0.1566*0.1361*0.3466***0.0958SECURITY 0.3826***0.3217***0.3420***0.4340***0.3660***0.3236***STABILITY 0.4719***0.4744***0.1756**0.4889***0.4767***0.1517*EV ALUATION 0.4035***0.4236***0.3507***0.3640***0.3592***0.3859***EXPERTISE 0.4785***0.4333***0.4997***0.4569***0.4337***0.5255***SPEED 0.4192***0.3162***0.4113***0.4156***0.3162***0.3499***PRIV ACY 0.3261***0.2914***0.1554*0.3034***0.2821***0.2344***LOWCOST 0.2861***0.2494***0.3019***0.3372***0.2986***0.2863***EASE0.3142***0.1827**0.4992***0.3265***0.2321***0.5014***CUSTOMER 0.1741**0.10480.3802***0.2511***0.06670.3592***STRATEGY0.3218***0.3835***0.3049***0.3986***0.3757***0.3626****,**,and ***denote coefficients are statistically significant at a level of 0.10,0.05,and 0.01,respectively.T.K.Sung /Technological Forecasting &Social Change 73(2006)1161–11771170。
企业异质性_高管过度自信与企业创新绩效_易靖韬
○ 易靖韬 张修平 王化成
摘要 本文选用科技部数据库中全 部 A 股上市公司作
研 究 发 现 , 有关高 管 过 度自信 的 大多 数 研 究 往 往 认
为研究样本,探讨高管过度自信对企业创新绩效的影响。 为过 度自信这一心理偏差会导致不利于股 东价 值( 企业
为了融合各种不同的解释本文根据lee等的研究选取企业规模和企业负债这两种异质性视角来考察当企业规模和企业负债不同时高管过度自信与企业创新绩效关系的变化认为企业规模和企业负债共同塑造过度自信的高管进行投资决策时的企业情境二者可能确立了高管过度自信与企业创新绩效之间关系变动的边界即高管决策的企业情境的不同会导致过度自信对创新结果的不同影响
始 研 究 过 度自 信这一 特 征在 企 业 管 理 者中的 表 现 。 一 些
关 于文 献中的 不同 研 究 结 论, 本 文 认 为高 管 过 度自
研究表明,过度自信的管理者会选择更高的负债水平和 信与企业创新绩效的关系有可能条件依赖于企业异质性
更多的股权融资,[7] 进行更多的投资。[8]
的情境。当高管决策的企业情境不同时,高管进行创新
本文的研究贡献主要体现在两个方面 :其一,与已 有 对 高 管 过 度自 信与 企 业 创 新 绩 效 关 系 的 研 究不同 ,[18 ,19 ] 本 文 通 过导入 企 业 异质 性 分 析 框 架 拓 展了过 去 的 传 统 分 析 范 式( 线 性 思 维), 补充 和丰富了决 策行为的 情 境 约 束 这一 新 的 研 究 视 角 , 突 破 了 现 有 研 究 基 于 企 业同 质 性 假 设 的 局 限 性 , 通 过 企 业 异质 的 情 境 约 束 可以 融 合不同 的研究解释。该研究从企业规模与企业负债两个异质维 度 进 行 拓 展 , 阐 明了在 不同 企 业 环 境 下, 过 度自 信 的 高 管对于创新绩效的影响具有差异性的表现。其二,由于 中国企业的专利数据较难获取,国内尚且没有利用专利 数据作为创新产出变量来研究二者的关系的文献,本文
当代研究生英语 第七单元 B课文翻译
价格的利润生物公司正在吞噬可改变动物DNA序列的所有专利。
这是对阻碍医学研究发展的一种冲击。
木匠认为他们的贸易工具是理所当然的。
他们买木材和锤子后,他们可以使用木材和锤子去制作任何他们所选择的东西。
多年之后来自木材厂和工具储藏室的人并没有任何进展,也没有索要利润份额。
对于那些打造明日药物的科学家们来说,这种独立性是一种罕见的奢侈品。
发展或是发现这些生物技术贸易中的工具和稀有材料的公司,对那些其他也用这些工具和材料的人进行了严格的监控。
这些工具包括关键基因的DNA序列,人类、动物植物和一些病毒的基因的部分片段,例如,HIV,克隆细胞,酶,删除基因和用于快速扫描DNA样品的DNA 芯片。
为了将他们这些关键的资源得到手,医学研究人员进场不得不签署协议,这些协议可以制约他们如何使用这些资源或是保证发现这些的公司可以得到最终结果中的部分利益。
许多学者称这抑制了了解和治愈疾病的进程。
这些建议使Harold得到了警示,Harold是华盛顿附近的美国国家卫生研究院的院长,在同年早期,他建立了一个工作小组去调查此事。
由于他的提早的调查,下个月出就能发布初步的报告。
来自安阿伯密歇根大学的法律教授,该工作组的主席Rebecea Eisenberg说,她们的工作组已经听到了好多研究者的抱怨,在它们中有一份由美国联合大学技术管理组提交的重量级的卷宗。
为了帮助收集证据,NIH建立了一个网站,在这个网站上研究者们可以匿名举报一些案件,这些案件他们相信他们的工作已经被这些限制性许可证严重阻碍了。
迫使研究人员在出版之前需要将他们的手稿展示给公司的这一保密条款和协议是投诉中最常见的原因之一。
另一个问题是一些公司坚持保有自动许可证的权利,该许可证是有关利用他们物质所生产的任何未来将被发现的产品,并且这些赋予他们对任何利用他们的工具所赚取的利润的支配权利的条款也有保有的权利。
Eisenberg说:“如果你不得不签署了许多这样的条款的话,那真的是一个大麻烦”。
美国股市奇特的九月效应
美国股市奇特的九月效应As they turn the calendar to September, investors have good reason to be wary.日子行进到九月,投资者有必要警惕起来了。
The docket is full of news that could disrupt the Standard & Poor's 500's roughly 7% climb since June. On Friday, the Labor Department releases the latest jobs figures. On Sept. 12, a German court rules on the constitutionality of a critical rescue fund for the euro zone. And the Federal Reserve is expected soon to make clear whether there will be a third round of 'quantitative easing.'从日程表上的重要事件来看,标准普尔500指数自六月以来大约7%的升幅随时可能玩完。
8月31日,美国劳工部(Labor Department)公布了最新的就业数据。
9月12日,德国某法院将就欧元区一个关键的救助基金计划是否符合宪法规定作出裁决。
此外,美联储(Federal Reserve)估计很快也将就是否推出第三轮"量化宽松"政策作出明确表态。
But of special interest to historians is the calendar itself. Put simply, Sept. 1 marks the start of a historically miserable month for stocks. 但在史学家的眼里,日程表本身最有意思。
学术英语(管理) Unit 2 课文翻译
《业务营销化》1 问街上一般的人什么是营销时,他们会告诉你那大概就是“卖东西的”。
这从根本上说是正确的,但营销不是简单的销售行为,而是怎样做成的销售。
我们都被全天候不间断营销所围绕,而我们每一个人都已经以我们自己的方式成了一名营销人。
2 专家是怎么定义营销的呢?根据美国市场营销协会,市场营销是一种组织职能,是为组织自身及利益相关者(stakeholders n. 利益相关者;股东)而创造、传播、传递客户价值,管理客户关系的一系列过程。
3 根据世界市场营销协会对营销的定义,“核心的经营理念是指导通过交换来识别和满足个人和组织需要的过程,从而为各方创造出众的价值。
”4最后,英国特许营销学会说,“营销是有利地识别,预测,和满足顾客需求的管理过程”。
5 如果我们只是看这三个定义的共性,我们可以看出,营销本质上(in essence)是:a)发现和给顾客他们所想要的和需要的东西,b)通过做这些来获利。
4Ps或5Ps营销策略6 密歇根州立大学(Michigan State University)的杰罗姆·麦卡锡(Jerome McCarthy)教授在20世纪50年代写了一本书并且定义了4Ps营销策略,包括产品、渠道、价格和促销。
这本书为这个星球上最古老的专业提供了一个清晰的结构,而这个结构成为市场营销的定义。
7 为了更好地理解营销,你应该有你自己对术语的定义。
例如,我认为营销是对产品的价格、分配、促销以及人员进行控制,满足顾客以获得利益。
控制是个充满感情的词语,尤其在我们谈及控制人的时候。
无论怎样,控制是很重要的,因为作为一名营销人员,我要控制市场营销的每一个工具并且操纵它们来使市场的影响力达到最大化。
8 作为一名营销经理,我控制一个产品的形象、味道和触感。
我控制我的产品应该要价多少。
我在促销工具中操纵工具,希望吸引(enticing)消费者购买我的产品。
下面便是被麦卡锡强调的4Ps营销策略。
此外,我们加入了第五个P:人。
4502452_外刊
实现单一世界货币是很遥远的理想,要使金融市场更为安全,应该朝着储备货币多元化方向发展。
金融危机之后,如何加强双边、多边合作,减少金融市场风险,是中、日、韩三国面临的共同课题。
当大家互相持有各自债券的时候,对各自的经济风险也更加关心,在宏观政策方面可以更好地进行协调与合作。
亚洲地区经贸合作当中,都希望出现区域债券市场,这也是区域经贸合作中的一个重要议题,但可惜多年来相对停滞。
通过相互持有对方国家债券,也是推动区域金融市场、债券市场发展的重要步骤。
经济学家樊纲国家现在已经有一个组合的方案抑制通胀,假定政策管理效应能够到位,今年把通货膨胀的形势控制在5%以内,目前GDP 就是一个可承受的水平。
因为可承受、不可承受是与收入增长相联系。
相比第一季度12.5%的收入增长,GDP 与通胀都是可承受的。
她认为中国经济的平均水平可以承受6%的通胀。
如果没有适当的通胀,经济也没有办法增长。
银河证券首席经济学家左晓蕾世界两大资产泡沫今年要爆发,第一是黄金,第二是中国房地产,因此中国的投资者不要再盲目追涨资产,炒股也不要碰地产股等五类股票。
今年是中国经济最危险的一年。
如果以10年为一个周期,1990年到2000年这段时期里,资产和美元对冲,因为资产是美元定价的,所以美元上涨,资产在下跌。
经济学最重要的规律是卖掉高位资产,去买低位资产,但是我们国家没有及时购置资产。
现在资产价格暴涨,中国面临的困难要比想象中大得多,盲目追涨资产只能是加大困境。
经济学家国世平Frontier Information:赵迪文章称,官方的救灾进度缓慢,一些灾民决心自救,尽早恢复赖以谋生的行当。
战后的釜石逐渐变得繁荣。
家具厂、海鲜加工厂、谷物加工和渔业、成排的餐馆和单间就餐的酒肆,所有这些构成了一个国际性港口城市的要素,它还受到巨大的防浪大堤的保护。
据《吉尼斯世界记录大全》称,全球的海啸专家认为,釜石市拥有世上最好的海港保护设施。
这座深达63米(207英尺),长约2公里(6430英尺)的防浪大堤是世上最大的人造物。
学术英语社科unit3 A翻译
1、失去一份工作可能是最痛楚的经济事件在一个人的生活。
大多数人们依托自己的劳动收入来维持他们的生活标准,许多人会从他们的工作取得的不仅是收入,还有自己的成绩感。
一个失去工作意味着此刻要定一个更低的生活标准,焦虑以后,并丧失自尊心。
这并非奇怪,因此,政治家竞选办公室常常谈论他们所提出的政策将帮忙制造就业机遇。
2、尽管必然程度的失业是不可幸免的,在一个复杂的经济与成千上万的企业和以百万计的工人,失业量的转变大致随着时刻的推移和席卷整个国家。
当一国维持其尽可能充分就业的工人,它实现了更高水平的国内生产总值会比留下了很多工人闲置更好。
3、失业问题一样分为两类,长期的问题和短时间的问题。
经济的自然失业率一般是指充分就业状态下的失业率。
周期性失业是指今年年失业率围绕其自然率的波动,它是紧密相关的经济活动的短时间起伏。
4、判定失业问题有何等严峻时,其中一个问题确实是要考虑是不是失业一般是一个短时间或长期的条件。
若是失业是短时间的,人们可能会得出结论,它不是一个大问题。
工人可能需要几个礼拜的工作之间找到最适合他们的口味和技术的开口。
但是,若是失业是长期的,人们可能会得出结论,这是一个严峻的问题。
许多个月的失业工人更易蒙受经济和心理上的困难。
5、经济引发一些失业的缘故之一是寻觅工作。
求职是工人与适合的职位相匹配的进程。
若是所有工人和所有工作一样,使所有工人,一样适用于所有作业,求职就可不能是一个问题。
下岗职工会专门快找到新的工作,超级适合他们。
可是,事实上,工人有不同的方式和技术,职位有不同的属性,在经济生活中众多的企业和家庭关于应聘者和职位空缺的信息缓慢传播。
6、摩擦性失业往往是在不同企业之间的劳动力需求转变的结果。
当消费者决定,他们更喜爱富士通而不是宏碁,富士通增加就业职位,宏碁就辞退工人。
前宏碁的工人必需寻觅新的就业机遇,而富士通必需决定招聘新工人开辟了各类作业。
这种转变的结果是一段时刻的失业。
7、一样,由于不同地域的国家生产不同的商品,在一个地区就业增加,在另一个减少。
cybersecurity 网络安全
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America’s digital infrastructure.In May 2009, the President accepted the recommendations of the resulting Cyberspace Policy Review, including the selection of an Executive Branch Cybersecurity Coordinator who will have regular access to the President. The Executive Branch was also directed to work closely with all key players in U.S. cyberse-curity, including state and local governments and the private sector, to ensure an organized and unified response to future cyber incidents; strengthen public/private partnerships to find technology solutions that ensure U.S. security and prosperity; invest in the cutting-edge research and development necessary for the innovation and discovery to meet the digital challenges of our time; and begin a campaign to promote cybersecurity awareness and digital literacy from our boardrooms to our classrooms and begin to build the digital workforce of the 21st century. Finally, the President directed that these activities be conducted in a way that is consistent with ensuring the privacy rights and civil liberties guaranteed in the Constitution and cherished by all Americans.The activities under way to implement the recommendations of the Cyberspace Policy Review build on the Comprehensive National Cybersecurity Initiative (CNCI) launched by President George W. Bush in National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/ HSPD-23) in January 2008. President Obama determined that the CNCI and its associated activities should evolve to become key elements of a broader, updated national U.S. cybersecurity strategy. These CNCI initiatives will play a key role in supporting the achievement of many of the key recommendations of President Obama’s Cyberspace Policy Review.The CNCI consists of a number of mutually reinforcing initiatives with the following major goals designed to help secure the United States in cyberspace:••To•establish•a•front•line•of•defense•against•today’s•immediate•threats•by creating or enhancing shared situational awareness of network vulnerabilities, threats, and events within the Federal Government—and ultimately with state, local, and tribal governments and private sector partners—and the ability to act quickly to reduce our current vulnerabilities and prevent intrusions.••To•defend•against•the•full•spectrum•of•threats•by enhancing U.S. counterintelligence capabili-ties and increasing the security of the supply chain for key information technologies.••To•strengthen•the•future•cybersecurity•environment•by expanding cyber education; coordi-nating and redirecting research and development efforts across the Federal Government; and working to define and develop strategies to deter hostile or malicious activity in cyberspace. In building the plans for the CNCI, it was quickly realized that these goals could not be achieved without also strengthening certain key strategic foundational capabilities within the Government. Therefore, the CNCI includes funding within the federal law enforcement, intelligence, and defense communities to enhance such key functions as criminal investigation; intelligence collection, processing, and analysis; and information assurance critical to enabling national cybersecurity efforts.The CNCI was developed with great care and attention to privacy and civil liberties concerns in close consultation with privacy experts across the government. Protecting civil liberties and privacy rights remain fundamental objectives in the implementation of the CNCI.In accord with President Obama’s declared intent to make transparency a touchstone of his presidency, the Cyberspace Policy Review identified enhanced information sharing as a key component of effective cybersecurity. To improve public understanding of Federal efforts, the Cybersecurity Coordinator has directed the release of the following summary description of the CNCI. CNCI•Initiative•DetailsInitiative•#1.•Manage•the•Federal•Enterprise•Network•as•a•single•network•enterprise•with•Trusted•Internet•Connections.•The Trusted Internet Connections (TIC) initiative, headed by the Office of Management and Budget and the Department of Homeland Security, covers the consolidation of the Federal Government’s external access points (including those to the Internet). This consolidation will result in a common security solution which includes: facilitating the reduction of external access points, establishing baseline security capabilities; and, validating agency adherence to those security capabilities. Agencies participate in the TIC initiative either as TIC Access Providers (a limited number of agencies that operate their own capabilities) or by contracting with commercial Managed Trusted IP Service (MTIPS) providers through the GSA-managed NETWORX contract vehicle.Initiative•#2.•Deploy•an•intrusion•detection•system•of•sensors•across•the•Federal•enterprise.•Intrusion Detection Systems using passive sensors form a vital part of U.S. Government network defenses by identifying when unauthorized users attempt to gain access to those networks. DHS is deploying, as part of its EINSTEIN 2 activities, signature-based sensors capable of inspecting Internet traffic entering Federal systems for unauthorized accesses and malicious content. The EINSTEIN 2 capability enables analysis of network flow information to identify potential malicious activity while conducting automatic full packet inspection of traffic entering or exiting U.S. Government networks for malicious activity using signature-based intrusion detection technology. Associated with this investment in technology is a parallel investment in manpower with the expertise required to accomplish DHS’s expanded network security mission. EINSTEIN 2 is capable of alerting US-CERT in real time to the presence of malicious or potentially harmful activity in federal network traffic and provides correlation and visualization of the derived data. Due to the capabilities within EINSTEIN 2, US-CERT analysts have a greatly improved understanding of the network environment and an increased ability to address the weaknesses and vulnerabilities in Federal network security. As a result, US-CERT has greater situational awareness and canT h eComp reh ensivenaT i onalCyberseCuri T yi ni T iaT ivemore effectively develop and more readily share security relevant information with network defenders across the U.S. Government, as well as with security professionals in the private sector and the American public. The Department of Homeland Security’s Privacy Office has conducted and published a Privacy Impact Assessment for the EINSTEIN 2 program.Initiative•#3.•Pursue•deployment•of•intrusion•prevention•systems•across•the•Federal•enterprise.•This Initiative represents the next evolution of protection for civilian Departments and Agencies of the Federal Executive Branch. This approach, called EINSTEIN 3, will draw on commercial technology and specialized government technology to conduct real-time full packet inspection and threat-based decision-making on network traffic entering or leaving these Executive Branch networks. The goal of EINSTEIN 3 is to identify and characterize malicious network traffic to enhance cybersecurity analysis, situational awareness and security response. It will have the ability to automatically detect and respond appropriately to cyber threats before harm is done, providing an intrusion prevention system supporting dynamic defense. EINSTEIN 3 will assist DHS US-CERT in defending, protecting and reducing vulner-abilities on Federal Executive Branch networks and systems. The EINSTEIN 3 system will also support enhanced information sharing by US-CERT with Federal Departments and Agencies by giving DHS the ability to automate alerting of detected network intrusion attempts and, when deemed necessary by DHS, to send alerts that do not contain the content of communications to the National Security Agency (NSA) so that DHS efforts may be supported by NSA exercising its lawfully authorized missions. This initiative makes substantial and long-term investments to increase national intelligence capabilities to discover critical information about foreign cyber threats and use this insight to inform EINSTEIN 3 systems in real time. DHS will be able to adapt threat signatures determined by NSA in the course of its foreign intelligence and DoD information assurance missions for use in the EINSTEIN 3 system in support of DHS’s federal system security mission. Information sharing on cyber intrusions will be conducted in accordance with the laws and oversight for activities related to homeland security, intelligence, and defense in order to protect the privacy and rights of U.S. citizens.DHS is currently conducting a exercise to pilot the EINSTEIN 3 capabilities described in this initiative based on technology developed by NSA and to solidify processes for managing and protecting informa-tion gleaned from observed cyber intrusions against civilian Executive Branch systems. Government civil liberties and privacy officials are working closely with DHS and US-CERT to build appropriate and necessary privacy protections into the design and operational deployment of EINSTEIN 3. Initiative•#4:•Coordinate•and•redirect•research•and•development•(R&D)•efforts.•No single individual or organization is aware of all of the cyber-related R&D activities being funded by the Government. This initiative is developing strategies and structures for coordinating all cyber R&D sponsored or conducted by the U.S. government, both classified and unclassified, and to redirect that R&D where needed. This Initiative is critical to eliminate redundancies in federally funded cybersecurity research, and to identify research gaps, prioritize R&D efforts, and ensure the taxpayers are getting full value for their money as we shape our strategic investments.Initiative•#5.•Connect•current•cyber•ops•centers•to•enhance•situational•awareness. There is a pressing need to ensure that government information security offices and strategic operations centers share data regarding malicious activities against federal systems, consistent with privacy protectionsfor personally identifiable and other protected information and as legally appropriate, in order to have a better understanding of the entire threat to government systems and to take maximum advantage of each organization’s unique capabilities to produce the best overall national cyber defense possible. This initiative provides the key means necessary to enable and support shared situational awareness and collaboration across six centers that are responsible for carrying out U.S. cyber activities. This effort focuses on key aspects necessary to enable practical mission bridging across the elements of U.S. cyber activities: foundational capabilities and investments such as upgraded infrastructure, increased bandwidth, and integrated operational capabilities; enhanced collaboration, including common tech-nology, tools, and procedures; and enhanced shared situational awareness through shared analytic and collaborative technologies.The National Cybersecurity Center (NCSC) within the Department of Homeland Security will play a key role in securing U.S. Government networks and systems under this initiative by coordinating and integrating information from the six centers to provide cross-domain situational awareness, analyzing and reporting on the state of U.S. networks and systems, and fostering interagency collaboration and coordination.Initiative•#6.•Develop•and•implement•a•government-wide•cyber•counterintelligence•(CI)•plan.•A government-wide cyber counterintelligence plan is necessary to coordinate activities across all Federal Agencies to detect, deter, and mitigate the foreign-sponsored cyber intelligence threat to U.S. and private sector information systems. To accomplish these goals, the plan establishes and expands cyber CI education and awareness programs and workforce development to integrate CI into all cyber opera-tions and analysis, increase employee awareness of the cyber CI threat, and increase counterintelligence collaboration across the government. The Cyber CI Plan is aligned with the National Counterintelligence Strategy of the United States of America (2007) and supports the other programmatic elements of the CNCI. Initiative•#7.•Increase•the•security•of•our•classified•networks.•Classified networks house the Federal Government’s most sensitive information and enable crucial war-fighting, diplomatic, counterterrorism, law enforcement, intelligence, and homeland security operations. Successful penetration or disruption of these networks could cause exceptionally grave damage to our national security. We need to exercise due diligence in ensuring the integrity of these networks and the data they contain. Initiative•#8.•Expand•cyber•education. While billions of dollars are being spent on new technologies to secure the U.S. Government in cyberspace, it is the people with the right knowledge, skills, and abilities to implement those technologies who will determine success. However there are not enough cybersecurity experts within the Federal Government or private sector to implement the CNCI, nor is there an adequately established Federal cybersecurity career field. Existing cybersecurity training and personnel development programs, while good, are limited in focus and lack unity of effort. In order to effectively ensure our continued technical advantage and future cybersecurity, we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees. It will take a national strategy, similar to the effort to upgrade science and mathematics education in the 1950’s, to meet this challenge.Initiative•#9.•Define•and•develop•enduring•“leap-ahead”•technology,•strategies,•and•programs.•One goal of the CNCI is to develop technologies that provide increases in cybersecurity by orders of magnitude above current systems and which can be deployed within 5 to 10 years. This initiative seeksT h eComp reh ensivenaT i onalCyberseCuri T yi ni T iaT iveto develop strategies and programs to enhance the component of the government R&D portfolio that pursues high-risk/high-payoff solutions to critical cybersecurity problems. The Federal Government has begun to outline Grand Challenges for the research community to help solve these difficult problems that require ‘out of the box’ thinking. In dealing with the private sector, the government is identifying and communicating common needs that should drive mutual investment in key research areas. Initiative•#10.•Define•and•develop•enduring•deterrence•strategies•and•programs.•Our Nation’s senior policymakers must think through the long-range strategic options available to the United States in a world that depends on assuring the use of cyberspace. To date, the U.S. Government has been implementing traditional approaches to the cybersecurity problem—and these measures have not achieved the level of security needed. This Initiative is aimed at building an approach to cyber defense strategy that deters interference and attack in cyberspace by improving warning capabilities, articulat-ing roles for private sector and international partners, and developing appropriate responses for both state and non-state actors.Initiative•#11.•Develop•a•multi-pronged•approach•for•global•supply•chain•risk•management. Globalization of the commercial information and communications technology marketplace provides increased opportunities for those intent on harming the United States by penetrating the supply chain to gain unauthorized access to data, alter data, or interrupt communications. Risks stemming from both the domestic and globalized supply chain must be managed in a strategic and comprehensive way over the entire lifecycle of products, systems and services. Managing this risk will require a greater awareness of the threats, vulnerabilities, and consequences associated with acquisition decisions; the development and employment of tools and resources to technically and operationally mitigate risk across the lifecycle of products (from design through retirement); the development of new acquisition policies and practices that reflect the complex global marketplace; and partnership with industry to develop and adopt supply chain and risk management standards and best practices. This initiative will enhance Federal Government skills, policies, and processes to provide departments and agencies with a robust toolset to better manage and mitigate supply chain risk at levels commensurate with the criticality of, and risks to, their systems and networks.Initiative•#12.•Define•the•Federal•role•for•extending•cybersecurity•into•critical•infrastructure•domains.•The U.S. Government depends on a variety of privately owned and operated critical infra-structures to carry out the public’s business. In turn, these critical infrastructures rely on the efficient operation of information systems and networks that are vulnerable to malicious cyber threats. This Initiative builds on the existing and ongoing partnership between the Federal Government and the public and private sector owners and operators of Critical Infrastructure and Key Resources (CIKR). The Department of Homeland Security and its private-sector partners have developed a plan of shared action with an aggressive series of milestones and activities. It includes both short-term and long-term recommendations, specifically incorporating and leveraging previous accomplishments and activities that are already underway. It addresses security and information assurance efforts across the cyber infrastructure to increase resiliency and operational capabilities throughout the CIKR sectors. It includes a focus on public-private sharing of information regarding cyber threats and incidents in both govern-ment and CIKR.。
Unit5A 工商管理英语 第二版 课文翻译参考 雷涯邻主编 高等教育出版社
市场营销:概论在过去的一百多年中,市场营销作为一项商业职能,其职责和概念有了长足的发展。
最初,市场营销活动仅仅关注如何完成商业交换,即让顾客去买东西。
通常一些较大的商业力量经常自己完成销售活动。
在美国,在这些商业力量的影响下,销售过程的发展可以分为几个时期。
Perreault和McCarthy 总结为以下五个时期(1)简单贸易时期(2)产品时期(3)销售时期(4)市场营销部门时期(5)市场营销公司时期。
为了了解现代市场营销在美国商业中如何发挥作用,回顾每个时期的销售行为是很有帮助的。
在讨论其发展过程后,将可以依据它在美国商业行为中的运做而提出一个现代市场营销的定义。
在简单贸易时期,通常“制造商”是专门生产一种或几种产品的乡村家庭。
这些产品通常是农作物或牲畜,但是他们可以是使用简单的手工工具来完成的技艺。
剩余的产品就卖给或以实物交换给当地的中间商,这些中间商又寻找更远的顾客来出售他们收集来的产品。
这个时期在西方社会持续了几百年。
此外,这个时期的中间人的活动范围都比较大。
举个例子,文艺复兴时期的意大利特别是威尼斯商人,从印度、中国和东南亚进口商品。
这些商人是这个简单贸易时期运作最成功的商人。
当19世纪末,工业革命在欧洲兴起的时候,美国开始发展起来,这时产品时期也取代了简单的贸易时期。
产品时期最明显的特征就是机器使用率的提高和新的组织技术的发展,这些大大促进了产品数量的增加。
因此有很多商品都能以较低的价格提供给更多的顾客,从而也大大刺激了需求的增长。
所以,很多公司把更多的精力放在提高生产技术上。
生产效率很高的公司很少关注产品的销售,因为这个时期需求远远大于供给。
如果公司生产一件产品,通常就有现成的买主在等待着。
到了19世纪30年代,很多生产商已经大大地提高了产量,使得西方国家很多行业的生产能力超过了潜在顾客的需求,这就导致了销售时代的来临。
销售时代的特征是相信顾客不愿购买产品,部分原因是因为如此众多的公司为了获得客户的关注而展开竞争。
外刊阅读练习:生物学和金融界的不稳定性
最牛英语口语培训模式:躺在家里练口语,全程外教一对一,三个月畅谈无阻!洛基英语,免费体验全部在线一对一课程:/ielts/xd.html(报名网址)Biology and financial instability生物学和金融界的不稳定性The molecules of mayhem混乱的分子The Hour Between Dog and Wolf: Risk-Taking, Gut Feelings and the Biology of Boom and Bust. By John Coates.狗和狼之间的那一刻:冒险、直觉和繁荣与萧条的生物学。
由约翰·科茨。
The financial crisis was caused by many things: greedy bankers, a glut of Chinese savings,shoddy regulation, an obsession with home ownership—take your pick. John Coates, once a trader on Wall Street and now a neuroscientist at Cambridge University, presents yet another culprit: biology, or, more precisely, the physiology of risk-taking. Financial traders, he says, are influenced by what is going on in their bodies as well as in the markets. Two steroid hormones—testosterone and cortisol—come out in force during the excesses of bull and bear markets.导致金融危机的因素有好几个:贪婪的银行家、中国的大笔储蓄、具误导性的监管制度、对拥屋的痴迷——任你挑选。
双语阅读被捆住手脚的美国经济
被捆住手脚的美国经济America is too tethered to take offConcern is growing that the US is falling back into recession. Consumers are scared. The housing market is crippled, with prices still falling. Last week saw more disappointing figures on jobs and manufacturing. Friday’s closely watched payroll numbers were worse than expected. Analysts had predicted 175,000 new private sector jobs, which would have been low; there were 83,000. The unemployment rate rose to 9.1 per cent.人们对美国正重新陷入衰退的担忧正在加剧。
消费者们战战兢兢。
房地产市场受到重创,房价仍在不断下跌。
上上周发布了更多令人失望的就业与制造业数据。
上上周五受到密切关注的非农就业数字,比预期的要糟糕。
分析师此前预测,私营部门就业人数增长17.5万(这个数字本来就已经够低的了);实际增长却仅为8.3万。
失业率则攀升至9.1%。
Within weeks, federal borrowing will collide with the statutory debt ceiling, raising the possibility of default; talks to prevent this are getting nowhere. The Federal Reserve’s second programme of quantitative easing, or QE2, is at an end. Higher commodity prices have caused a blip in inflation. All these factors should have lowered the price of US government debt, pushing long-term interest rates higher. But such is the concern about the flagging recovery that 10-year rates fell to less than 3 per cent last week, lower than they have been all year.过不了几周,联邦债务就将触及法定债务上限,从而加大违约的可能性;阻止出现这一结果的谈判迄今毫无进展。
考研阅读逐句译2002年第4篇
唐静考研阅读逐句翻译2002年第4篇第1句The Supreme Court’s decisions on physician-assisted suicide carry important implications for how medicine seeks to relieve dying patients of pain and suffering.词汇:supreme //adj. 最高的,至高无上的;最重要的,最大的court //n. 法庭,法院;宫廷,朝廷;球场physician //n. 医生,内科医生implication //n. 含义,暗含relieve //v. 减轻,解除结构:The Supreme Court’s decisions on physician-assisted suicide (主语)//carry important implications (谓语动词和宾语)//for how medicine seeks to relieve dying patients of pain and suffering (for介词后面跟了一个how宾语从句,整个for介词短语充当状语).译文:最高法院关于医生帮助病人自杀这一问题的裁决,对于医学界寻求如何减轻病危者的痛苦与折磨,具有重要的意义。
翻译思路:翻译思路的展开有人总说,“觉得自己英语看懂了,可就是觉得中文怪怪的,为什么呢?”这里有两个问题:1.觉得自己英语看懂了——要确信是真的看懂了,对英语主干和修饰的关系很清晰。
2.如果“真的看懂了”,“可是中文怪怪的”——问题就出在中文表达的时候,逻辑整理或者顺序安排不够清楚;还有可能是对某一个英语词的中文表达不到位。
怎么办呢?我试图通过这个句子来帮大家展开一下翻译思路。
The Supreme Court’s decisions on physician-assisted suicide决定最高法院的决定最高法院的裁决(法院的决定,就是裁决,这里是一种中文表达方式的替换)最高法院关于医生帮助自杀的裁决最高法院关于医生帮助病人自杀这一问题的裁决(医生帮助自杀,有点怪怪的,逻辑不清,补充说明白)carry important implications具有了重要的意义(注意carry implication for的搭配)for how medicine seeks to relieve dying patients of pain and suffering对于医药如何寻求减轻正在死亡的病人的痛苦和折磨对于医学界寻求如何减轻病危者的痛苦与折磨(医药如何减轻,怪怪的;正在死亡的病人,逻辑不对;通通替换)唐静考研阅读逐句翻译2002年第4篇第2句Although it ruled that there is no constitutional right to physician-assisted suicide, the Court in effect supported the medical principle of “double effect”, a centuries-old moral principle holding that an action having two effects—a good one that is intended and a harmful one that is foreseen—is permissible if the actor intends only the good effect.词汇:rule //v. 统治,管理;控制;裁定constitutional //adj. 宪法的,符合宪法的;(某人)体质的,体格的in effect // 实际上principle //n. 原则,原理;准则,规范permissible //adj. 容许的结构:参见翻译思路译文:尽管裁决规定,宪法没有赋予医生帮助病人自杀的权利,但最高法院实际上还是认可“双重效应”的医疗原则。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
The Federation of Critical Infrastructure Information via Publish-Subscribe Enabled Multisensor Data FusionTim BassSilk Roadbass@Abstract - The art and science of multisensor data fusion is the emerging foundation for the development of next generation network-centric decision support systems, including critical infrastructure protection. These challenging technical objectives require the cooperative signal processing of a federation of critical infrastructures. Publish-subscribe architectures provide process-to-process messaging infrastructures that enable a communications framework for the distribution and delivery of information between sensor fusion processes. In this paper we discuss high level service-oriented architectural issues for critical infrastructure multisensor data fusion including event notification services, wide-area network topology, and the publish-subscribe subscription language.Keywords: multisensor data fusion, publish-subscribe, event notification service, intrusion detection, critical infrastructure, homeland defense and cooperative federation1 IntroductionIn [1,2] we suggested that the art and science of multisensor data fusion is directly applicable to detection theory in cyberspace situational awareness, network management and network intrusion detection systems. Recent political events have increased the visibility of the computational challenges in the design, analysis and survivability of critical infrastructures such as computer and communication networks, electric power grids, and similar distributed computing systems. Correlating the health and real-time security of interconnected distributed systems are also socially challenging because event notifications and other information objects must be shared across political, organizational and administrative boundaries.In this paper we continue the development of the models presented in [1,2] by examining how a subscription-based data processing architecture might be applied to address many of the challenges associated with cooperative distributive processing between federated information sources. The key concepts of this architecture are loosely coupled service-oriented information fusion processes administered by a federation of organizational services including:§federated sensor, processing, assessment and storage.§publication, subscription and other fusion services.§attribute-based data and information publishing.§subscription-based data and information availability.Applying these characteristics to cyberspace data fusion models [2] forms a federation of distributed services that publish, and subscribe to, relevant information and data sets. This architecture appears to provide a scaleable foundation for developing new fusion and decision support applications with minimal impact to established information systems and services. In addition, the architectural model is well suited for federated interdomain information sharing.Homeland defense critical infrastructures such as computer and communication networks, electric power grids, intelligence networks, immigration systems, air traffic control and transportation systems are controlled and administered by numerous autonomous organizations.A subscription-based information infrastructure enables cooperative multisensor, service-oriented fusion in a federated processing model. The next section discusses the subscription-based service-oriented architectural model in the context of sharing and fusing federated information.2 Publish-Subscribe ArchitectureThe architectural approach suggested for homeland defense and critical infrastructure protection in this paper is a service-oriented multisensor fusion model enabled by a publish-subscribe event notification communications network. Figure 1 illustrates the relationships between federated sensors, event notification, storage and fusion services. The key concepts are twofold: (a) the processing abstraction is a federated system processing architecture and (b) information moves between systems based on publish-subscribe communication models.Distributed services in the architecture performs local or regional data and information processing. Each service may be a subscriber and/or a publisher. Sensor systems may receive sensor information (S i) from many sources including, but not limited to, subscription services.We expand this concept in Figure 2, illustrating multisensor data fusion data and object refinement process relationships [3] in context to receiving input from subscription-based services. The object database publishes objects to information sharing or event notification services. Subscribers to these information objects include situation refinement, threat assessment and situation knowledge-base fusion services [3]. Figure 3 continues the extension of these concepts to publish-subscribe services between multisensor fusion object bases (O b) and associated fusion services. The interested reader is kindly referred to the referenced literature [1-3] for a more detailed background discussion of the cyberspace multisensor data fusion model.In addition to fusion services, complimentary service-oriented architectures for data mining and knowledge management may be logically constructed from the same publish-subscribe infrastructure. The communications component in all of these conceptual models is an event notification capability that is politically, economically, and technically scaleable.2.1 Critical Infrastructure Event FederationA properly designed publish-subscribe architecture is a scaleable distributed computing model that shows considerable promise to enable the federation of fusion processing in a service-oriented, complex environment. This distributed computing architecture could enable scaleable collaborative information processing between critical infrastructures as a federation of administrative domains. The suggested approach is complimentary to emerging U.S. homeland defense situation assessment and command and control activities.Homeland defense requires a federation of numerous organizations including FEMA, over forty federation agencies, state and local authorities, the CIA, NSA, DIA and other intelligence agencies, Department of Defense and other organizations. The cross-organizational correlation of threats, attack profiling and course-of-action dissemination requires the federation of autonomous event-driven decision support systems. A July 2001 Defense Department briefing articulated three critical capabilities for homeland defense information fusion and command and control activities [4]:§assured connectivity,§attribution (situational awareness), and§crisis coordination.The operational capabilities have identified the publish-subscribe communications model as one core competency required for future homeland defense. According to numerous experts, this capability would enable autonomous decision support systems to access and track threats across multiple fronts, providing high confidence and timely alerts.Fig. 3. Fusion Situation/Threat SubsystemFig. 2. Publish-Subscribe Data/Object Subsystem2.2Example Publish-Subscribe Models Many publish-subscribe architectures are based on an event-driven communications model. Members of the information federation who wish to participate in the event notification architecture may join the publish-subscribe network. The remainder of this section summarizes a few representative system architectures.The InfoBus Repeater [5] is an interesting architecture where members register with the publish-subscribe service as information producers, consumers or both, depending on the service or role of the federated member. When a producer generates an event the producer notifies the publish-subscribe bus, that in turn, notifies appropriate event consumers. One of the interesting characteristics of the InfoBus architecture is that subscribers (consumers) may trigger events in publishers (producers).Another interesting architecture that uses publish-subscribe concepts is Rio [6]. Rio claims to provide the basis to federate a loose coupling of event producers that advertise event attributes. This architecture allows consumers of event information to discover unknown event publishers. This capability is well suited for a service-oriented multisensor data fusion architecture that has many federates and the requirement to adapt to change rapidly.SIENA [7] is a research-oriented publish-subscribe architecture that provides a wide-area event notification service in a scaleable and flexible Internet framework. Examples of other publish-subscribe research projects worthy of review are Gryphon [8] and Elvin [9]. The Java Messaging Service (JMS) [10] is noteworthy; however the current JMS specification does not articulate a complete event notification service or publish-subscribe infrastructure. There are many other examples in the literature of publish-subscribe communications models being used for federated information processing and event notification services. Publish-subscribe architectures will enable numerous next generation distributed network applications in the immediate future.2.3 Security ConsiderationsScaleable engineering solutions are achievable when processing components are minimally coupled in an architectural model that adheres to complexity management principles. It logically follows that multisensor fusion models are scaleable when security services are loosely coupled with the underlying publish-subscribe infrastructure. This implies that a subset of confidentiality, integrity and non-repudiation services for multisensor fusion architecture should be provided by security infrastructure services such as virtual private networks or end-to-end cryptographic systems germane to the application.Furthermore, designers of infrastructure services must consider security services for publish-subscribe architectures in the context of a qualitative risk management model. Interested readers are referred to [11] for an applicable discussion on defense-in-depth risk management topics. In the next section we review publish-subscribe architectures in the technical context of the event notification service and wide-area networking. 3Event Notification ServiceThe asynchronous, heterogeneous loose coupling that characterizes software applications in wide-area networks points to event interaction as the abstraction for multisensor fusion systems design. An emerging building block for these services is an infrastructure service known as an event notification service [7]. An event notification service accessible from organizations in the network federation is required to support cooperative information fusion processing.An event notification service is typically implemented as a network of servers that provide service access points to client processes. Client sensor and fusion processes use the service access points to advertise information about events and to publish event notifications (per notification type previously advertised). The access points are also used by interested parties to subscribe to notifications of interest [7]. This type of interaction permits selection, filtering and pattern matching subscriptions that are keyenablers in distributed multisensor data fusion models. The event notification service implements two important actions; notification selection and notification delivery. The service must be configured as a distributed system that exploits the benefits of locality or community. In the most general form an event notification service is a network of servers as shown in Figure 4. The clients in the event notification service are either objects of interest that generate events or interested parties who are event Fig. 4. Distributed Event Notification Servicenotification consumers. Network clients in the federation may be both event producers and consumers.Conceptually the service corresponds to a wide-area network of routers with pattern matching engines transposed on top of an underlying communications facility such as the Internet [7]. In context of the architecture suggested in this paper, sensors correspond to objects of interest in the event notification model.Multisensor data fusion architectural processes such as data refinement, object refinement, object and situation bases, situation refinement and threat assessment act as both objects of interest and interested parties.Following well established wide-area network design principles, it is logical to place at least one critical infrastructure event notification server within each administrative domain in the federation. This motivates a discussion of the topology of a network of servers, with issues generally centered on three design issues [7]:§ interconnection topology,§ routing algorithm, and §processing strategy.Similar design issues have been extensively studied for many years in many different networking scenarios. For example, there are generally three classes of interconnection topologies; (a) a hierarchical organization,(b) a generalized graph of peers, and (c) hybrid clusters of both topologies. Cargzaniga et al do an fine job of discussing these issues relative to a generalized event notification service including a priori knowledge of locality, the event notification model, notification semantics, attributes, filters, patterns and timing.Interested readers are strongly encouraged to review [7]for an excellent comprehensive discussion in this area.The event notification service model is, in essence, `the glue` that binds together a distributed network of federated critical infrastructure sensor processes in space and time. Euster, P. et al [12] summarized the space-time relationship between different communication models,presented in Table 1.Time Space Request/ReplyCoupled Coupled Asynchronous Send Decoupled Coupled Shared Memory Coupled Decoupled Publish/SubscribeDecoupledDecoupledTime decoupling implies that the objects of interest and interested parties in the event notification model (Figure 4) do not need to be up and available at the same time.Likewise, space decoupling implies that the clients of theevent notification service are not required to have a priori knowledge of each other.As stated, the event notification service model appears to be well suited for emerging critical infrastructure fusion applications. In the next section we turn our attention to server network topologies and protocols. These discussions will be helpful to readers working on large distributed enterprise and/or localized architectures.4Server Topologies & ProtocolsIn the previous section we discussed the generalized event notification service and how servers might communicate in a wide-area network topology to cooperatively distribute event selection and delivery tasks to interested parties in the federation. The underlying network service must be arranged in a distributed network topology that makes use of a server-to-server communications protocol.This implies an underlying communications protocol between servers such as TCP/IP (and the Internet). The actual messaging protocol between the servers may be a wide range of network application protocols that are not the focus of this paper.In this section we summarize applicable prior work [7] by examining three basic architectures: (a) hierarchical client/server, (b) acyclic peer-to-peer and (c) general peer-to-peer. In addition, we briefly discuss a few hybrid network topologies. The degenerate case of a centralized architecture having a single server is not discussed because it is generally not scaleable to large distributed applications [7].The hierarchical architecture of Figure 5 is a logical extension of a centralized architecture. One obvious problem with this architecture is the fact that the processing capability of the servers at the top of the hierarchy tends to limit the performance and scaleability of the system. Another problem is that each server in the network is a critical node for servers lower in theTab. 1. Summary of Communications Models Fig. 5. Hierarchical Client/Server Architecturehierarchy [7]. Therefore, this topology does not appear to have the necessary reliability for the general case of a critical infrastructure event notification service. However, hierarchical topologies in hybrid architectures are useful for event processing in localized fusion communities.The acyclic peer-to-peer architecture provides symmetric bi-directional flow of event subscriptions, advertisements and notifications. However, as in the hierarchical architecture, the acyclic peer-to-peer architecture (Figure 6) does not have the optimal redundancy to guarantee highly robust event notification delivery. The solution [7] is to adopt a generalized peer-to-peer architecture,illustrated in Figure 7.An advantage of the general peer-to-peer architecture is that it offers more flexibility and reliability over the other architectures, including path redundancy. However, a disadvantage is that complex routing algorithms must be used that avoid cycles and choose the best path. Routing in the Internet uses similar forwarding algorithms; therefore, designers of highly reliable and scaleable event notification services should carefully consider the benefits and disadvantages of peer-to-peer networking.Networking is an organic process and the history of routing protocol developing in the Internet teaches us that the issues that determine the routing topologies tend to be dominated by political, acceptable usage and governance issues [13]. On the other hand, networks under a single administrative control may easily take advantage of the benefits of robust peer-to-peer architectures with less concern about complex routing trade-offs.In practice, federated architectures of many autonomous systems tend to be acyclic and directive because of political and other administrative policies. The social-economic influences on interconnected wide-area networks tend to give rise to large federated hybrid general/acyclic architectures, illustrated in Figure 8. Complexities and challenges in developing policies for sharing information between numerous critical infrastructure domains tend to favor a hybrid architectural approach composed of local and regional (community of interest) networking and acyclic or directed acyclicgateways between large federated organizations.Political and cultural influences on homeland defense and critical infrastructure domains will drive networks toward hybrid architectures composed of hierarchical, acyclic and peer-to-peer topologies. These cooperative models for information sharing follow the federation of autonomous networks that characterize the Internet today. The primary difference is a higher abstraction at the information and event layer compared to the data packet and network address level in the TCP/IP model.Due to size constraints of this paper, the brief summary of topology in this section was constructed to introduce the key concepts, not to be complete or conclusive. In the next section we direct the readers attention to another important design issue unique to this level of abstraction, the publish-subscribe subscription language.5Subscription LanguageIn summary, publish-subscribe is a communications architecture where information flow is directed by the interest of the consumers of information rather than by specific addresses determined by the sender. Carzaniga, Rosenblum and Wolf summarized four event notification subscription languages in [7,14] which we briefly review in this section:§channel-based subscriptions,§subject-based subscriptions,§context-based subscriptions, and§context-based subscriptions with patterns.The concept of the subscription channel is similar to tuning in to a television or radio channel. The channel could broadcast information that is not of interest to all potential channel subscribers. It is not unreasonable to envision that interested parties might subscribe andFig. 6. Acyclic Peer-to-Peer ArchitectureFig. 7. General Peer-to-Peer Server Architectureunsubscribe to various channels depending on their changing information requirements. The channel-based architecture is the least complex of the subscription languages above. In this architecture, subscription services are based on interested parties listening to, or subscribing to, a single channel. Event notifications posted to the channel are delivered by the event service to all the interested parties that listen to that channel [14]. Subscribing to web-based streaming media is a form of channel subscription. Another example of a channel subscription is a when subscribers listen for activity on a particular queue.Event-driven subject-based subscription is one of the current commercial trends in publish-subscribe networking. The primary difference between channel-based and subject-based subscription languages is that subject-based subscriptions are more expressive [14]. Event notification is generally based on the topic or subject. Attributes other than subject are not used; however, pattern matching within the subject attribute may be supported. For example, if the event notification service was capable of subject-based subscriptions, all interested parties subscribing to {electric.generation.*} would receive the notification (Table 2). Subject-based subscriptions extend the basic concept of channel-based subscriptions by offering a more flexible addressing mechanism. A subject-based subscription language is currently used in state-of-the-art commercial publish-subscribe offerings, for example, the TIBCO/Rendezvoussuite of products [15].It is generally accepted that the success of subject-based networking will drive industry toward context-based subscriptions. Context-based subscription extends the capability of event notification with more expressive subscription filters compared to subject-based or channel-based architectures. Information is forwarded in a context-based architecture with software algorithms that match message context to context-subscribers.Event notification in a context-based network is performed on a set of typed attributes and each individual attribute has a type, a name and a value [7]. Event notification delivery is then based on a structural value derived from the attributes. The forwarding algorithm provides the motivation for context-based routing protocols that permit nodes to exchange context-subscriber information and formulate information routing tables. Turning again to Table 2, a context-based subscriber would could refine their subscription to receive only {electric.generation.*} messages from the Canefield Generating Station.The most advanced and expressive of all of these subscription languages is the context-based subscription language with pattern matching. For example, from our example message of Table 2, context-based subscriptions with expressive patterns could be used to permit interested parties to subscribe only to messages where {electric.generation.output} in the Southern District dropped greater than 20 percent. The interested reader is referred to [7,14] for additional discussions on the expressiveness of subscription languages in event notification architectures.6ConclusionsCritical infrastructure monitoring and protection requires the federation of a vast amount of internetworked resources. A service-oriented multisensor data fusion architectural model with publish-subscribe event notification services appears to provide the distributed computing infrastructure required for critical infrastructure protection. The underlying infrastructure is strikingly similar to the cooperative federation of autonomous wide-area and local-area networks in the global Internet today.Channel, subject and context-based subscription languages also appear to have important roles in the future design of event notification services. Furthermore, federated multisensor data fusion concepts, enabled by a service-oriented messaging infrastructure, appear to be a leading architectural model for enabling critical infrastructure protection and emerging homeland defense initiatives.Fig. 8. General/Acyclic Hybrid ArchitectureEmerging Web Services (WS) for peer-to-peer information sharing is an interesting technology that we did not have space to discuss in this paper. Current WS architectures tends to resemble the traditional point-to-point request-reply networking model. Web-based request-reply architectures also appear to be less computationally complex than evolving publish-subscribe event notification systems. Having stated that, the publish-subscribe model is significantly more mature and robust than WS at this point in time. Significant evaluation is required as myriad competing Web Services implementations mature.Perhaps the most pragmatic conclusion is the necessity for critical infrastructure sensor fusion architects to carefully examine their requirements and to consider the utility of federated service-oriented architectures. Critical infrastructure protection and homeland defense requires the federation of information from many global autonomous infrastructures. Publish-subscribe services provide an interesting and promising way to federate event information from loosely coupled networking domains.AcknowledgmentsThis work was motivated by numerous excellent discussions on federated enterprise architecture with Mr. John M. Gilligan, a member of the Senior Executive Service, and the Air Force Chief Information Officer, Washington, D.C., and Major General Dale W. Meyerrose, Director of Command Control Systems, Headquarters U.S. Space Command, and Director of Communications and Information, Headquarters Air Force Space Command, Peterson Air Force Base, Colorado. The author would like to thank Mr. Ed Waltz for his pioneering work in the field of multisensor data fusion, the SIENA team at the University of Colorado Boulder for their comprehensive research in publish-subscribe event notification services and the men and women of the United States Air Force for day to day inspiration and motivation.The author would also like to thank Mr. Bob Wilson of the MITRE Corporation for the very rewarding professional collaboration in support of the USAF, Office of the CIO. A special acknowledgment and word of appreciation to Dr. Alex Wolf and Dr. Antonio Carzaniga of the University of Colorado Boulder for permission to reproduce Figures 4 – 8. This work was partially sponsored by Silk Road purchase order DSD-01-302-6801.33, Project HAF/CIO.References[1] Bass, T., “Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems,”1999 IRIS National Symposium on Sensor and Data Fusion, The Johns Hopkins University Applied Physics Laboratory, 24-27 May 1999.[2] Bass, T., “Intrusion Detection Systems & Multisensor Data Fusion,” Communications of the ACM, Vol. 43, No. 4, April 2000, pp. 99-105.[3] Waltz, E. and Llinas, J., “Multisensor Data Fusion,”1990, Artech House, Boston, MA.[4]Eddington, D. Mr. and Malone, M. Maj., “Homeland Defense Command & Control (HLD C2) FY02 ACTD Proposal,” July 2001.[5]Uramoto, N., and Maruyama, H., “InfoBus Repeater:A Secure and Distributed Publish/Subscribe Middleware,” Proceedings, 1999 International Workshops on Parallel Processing, Sept. 21-24, 1999, pp. 260-265.[6]“Rio Architecture Overview,” Sun Microsystems, Version 1.0, 2001.[7]Carzaniga, A., Rosenblum, D., and Wolf, A., “Design and Evaluation of a Wide Area Event Notification Service,” ACM Transactions on Computer Systems, Vol. 19, No. 3, August 2001, pp. 332-383.[8]Banavar, G. et al, “An Efficient Multicast Protocol for Content-Based Publish-Subscribe Systems,” The 19th IEEE International Conference on Distributed Computing Systems (ICDSC ’99), May 1999, pp. 262-272.[9]Segall, B., and Arnold, D., “Elvin Has Left the Building: A Publish/Subscribe Notification Service with Quenching,” Proceedings of AUUG97, Sept. 3-5, 1997, pp. 243-255.[10]Sun Microsystems Inc., “Java Messaging Service,” Mountain View, CA, 1999.[11]Bass, T. and Robichaux, R., Defense-In-Depth Revisited: Qualitative Risk Analysis Methodology for Complex Network-Centric Operations, IEEE MILCOM 2001, October 28-31, 2001.[12]Euster, P. et al, “Distributed Asynchronous Collections: Abstractions for Publish/Subscribe Interaction,” ECOOP 2000, LNCS 1850, 2000, pp. 252-276.[13]Bass, T.,“Internet Exterior Routing Protocol Development: Problems, Issues, and Misconceptions,”IEEE Network Magazine, July/Aug 1997, pp. 50-55.。