Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Patent situation analysis and development strategy recommendations in the field of optoelectronics
    • HELinlin , ZHANGQian, LIWenyu
    • Information and Communications Technology and Policy. 2019, 45(1): 1-6.
    • Abstract ( 154 )   
    • As a strategic emerging industry in China, optoelectronics industry plays an important role in promoting economic transformation and upgrading. Promoting the use of intellectual property in key areas of the optoelectronic industry, enhancing the protection awareness and operational capability of intellectual property of optoelectronic enterprises, further strengthening the status of innovation of enterprises, guiding and promoting the transformation and utilization of intellectual property achievements of enterprises, and enhancing industrial competitiveness is particularly important. By searching and analyzing the patent data information of various fields in the optoelectronic industry in the world, this paper compares the status of domestic and foreign enterprises in the field of optoelectronics in terms of intellectual property capabilities, and proposes further rationalization recommendations for development of the field of optoelectronics from both government and enterprises.
    • Related Articles | Related Articles | Metrics
    • Research on the trends of eMTC patents
    • YAN Kun, LI Li
    • Information and Communications Technology and Policy. 2019, 45(1): 11-13.
    • Abstract ( 92 )   
    • The number of patent applications for eMTC worldwide has grown rapidly in recent years, and the competition in this field is fierce. The Chinese market has draw the highest level of attention. The number of applications in China exceeds one quarter of the world’s, followed by the United States and Europe. Among the key technologies of eMTC, the number of patent applications in the field of access control is the largest. It is expected that the number of patent applications for eMTC will continue to grow rapidly in the next few years. In China and the United States, it is especially necessary to prevent the occurrence of patent infringement lawsuits. It is recommended that companies choose the most reasonable patent layout strategy according to their own characteristics.
    • Related Articles | Metrics
    • Research on index system of scientific achievement assessment
    • QINLe
    • Information and Communications Technology and Policy. 2019, 45(1): 14-17.
    • Abstract ( 148 )   
    • The assessment of scientific achievements plays an important role in the transfermation of scientific achievements and the construction of index system of scientific achievements is a pre- requirement for the third- party asscociated activities. Through studying laws and regulations, methodologies of assessment of scientific achievements, the construction of index system of scientific achievements and the optimization of evaluation process and expert selection system will promote the efficiency of the assessment of scientific achievements and guarantee the objectivity and neuturality of the evaluation results.
    • Related Articles | Related Articles | Metrics
    • Further governance of unsolicited calls by jointly management
    • YAO Xiangzhong, XIONGWeichu, WANG Ying, LUO Luojia
    • Information and Communications Technology and Policy. 2019, 45(1): 18-20.
    • Abstract ( 108 )   
    • With the development of information and communication technology, telephone is widely used in production and life. The problem of unsolicited calls has seriously affected the people’s feelings about the use of telephone, and has become a practical problem that needs to be solved by the whole society. This paper sorts out the key links and classifications of unsolicited calls, summarizes the situation of governance, analyses the difficulties, puts forward suggestions for governance, and guides a clear and bright information and communication environment.
    • Related Articles | Related Articles | Metrics
    • Practical exploration and thoughtsonthe national comprehensive service platform for defense unwanted calls
    • ZHANGDakun, ZHENGJinjin
    • Information and Communications Technology and Policy. 2019, 45(1): 21-24.
    • Abstract ( 124 )   
    • The special action to comprehensively rectify unwanted calls has opened up a new situation in the issue of social co- governance. Facing the identification and judgment difficulties in commercial marketing unwanted calls management, CAICT adopts the design idea of“combination of dredge and block”,learning from the“Do Not Call”mechanism to explore the establishment of National Comprehensive Service Platform for Defense Unwanted calls. The platform not only provides necessary defense for users, but also provides accurate business information for users who have real needs,which is also a practical exploration of unwanted callsmanagement.
    • Related Articles | Metrics
    • Thegreen shield personalized harassment phone call prevention service solution of Zhejiang Mobile
    • WANGChen, XUTong
    • Information and Communications Technology and Policy. 2019, 45(1): 25-28.
    • Abstract ( 132 )   
    • In order to respond to the national requirements for the remediation of harassment phone call and protect the user’s communication experience, Zhejiang Mobile innovatively proposed the Green Shield personalized harassment phone call prevention service solution, and conducted a pilot on the current network. The service combines the user’s willingness to communicate, the phone number tag information, and the call interception capability of communication network to achieve accurate identification and silent interception of the harassment phone call. It can also support the user’s personalized customization.Thisworkexplores a feasible technical solution for the Chinese operators to rectify the harassment phone call.
    • Related Articles | Related Articles | Metrics
    • Researchonharassing call detection framework using mobile operator data
    • LUXiaoni, CHUQiwu, ZHAOXi
    • Information and Communications Technology and Policy. 2019, 45(1): 36-39.
    • Abstract ( 136 )   
    • The increasing prevalence of harassing calls has seriously affected the normal life of people and social harmony. With the promulgation of the Special Action Plan for Comprehensive Rectification of Harassing Call, a nationwide action against harassing calls has been launched. This paper proposed a harassing call detection framework using mobile operator data. Typical features of harassing calls and profiles of called users are extracted. Outlier detection algorithm is used to mitigate the serious consequences of malicious call marking to a certain extent.And multi-source features are used to train the harassing call detection model, so as to effectively improve the detection efficiency.
    • Related Articles | Related Articles | Metrics
    • Overview of blockchain technology
    • YANGBaixue, QINGSude, ZHANGQi, WEIKai
    • Information and Communications Technology and Policy. 2019, 45(1): 40-45.
    • Abstract ( 172 )   
    • Blockchain technology is the integration and innovation of multiple technologies and it has also become a hot spot with the attention from various aspects. Due to the complexity of the technologies involved, the threshold of blockchain technology has been relatively high, which is not conducive to the spread and popularity of blockchain technology. This paper summarizes of the structure, consensus mechanism, certificate mechanism, P2P protocol and other technologies involved in the blockchain according to the mainstream open source blockchain projects, and analyzes the features of blockchain from a technical perspective. Besides,it aims to clarify the characteristics of blockchain technology, the logic of blockchain techno logy, and promote the practical of blockchain technology. The conclusion of this paper have reference value for the in-depth study of blockchain practitioners and blockchain technology.
    • Related Articles | Related Articles | Metrics
    • Blockchain technology security risk research
    • ZHANGQi, QINGSude, YANGBaixue, WEIKai, LIXin
    • Information and Communications Technology and Policy. 2019, 45(1): 47-50.
    • Abstract ( 141 )   
    • Blockchain technology and applications are still in the early stages of rapid development, and there are many types of security risks. From the security of blockchain ecosystems to smart contract security, consensus mechanism security and underlying infrastructure components, security issues are widely distributed and risky, and the overall impact on ecosystems, security audits, technology architecture, privacy data protection and infrastructure Development has presented a new challenge.
    • Related Articles | Related Articles | Metrics
    • Research and applicationof construction informationmanagementsystem in power enterprises
    • MAYanyan
    • Information and Communications Technology and Policy. 2019, 45(1): 72-75.
    • Abstract ( 74 )   
    • In the development of the electric power enterprise, will face many infrastructure projects, infrastructure projects management must through the information means to further improve the level of construction management, which requires construction integration infrastructure information management system, to serve the electric power enterprise, which the construction control system and the construction of management rules and regulations into the system. Through the managementplatform,the system process form and other informationmanagement.
    • Related Articles | Related Articles | Metrics