Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 4904
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    A. Molnar, Wolfgang
    et al.
    Public Research Centre Henri Tudor, , .
    A. Proper, HenderikPublic Research Centre Henri Tudor, , .Zdravkovic, JelenaStockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.Loucopoulos, PericleUniversity of Manchester, , .Pastor, OscarUniversitat Politècnica de València, , Centro de Investigación PROS.de Kinderen, SybrenUniversity of Luxembourg, , .
    CBI Workshops: TEE and CoBI: The 8th Workshop on Transformation & Engineering of Enterprises (TEE 2014) The 1st International Workshop on Capability-oriented Business Informatics (CoBI 2014) 2014Proceedings (redaktörskap) (Övrig (populärvetenskap, debatt, mm))
  • 2.
    Aasi, Parisa
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
  • 3.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Nunes, Ivan
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hodosi, Georg
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015Ingår i: Proceedings of the 48th Annual Hawaii International Conference on System Sciences (HICSS-48), IEEE Computer Society, 2015, 4691-4699 s.Konferensbidrag (Refereegranskat)
  • 4.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Nunes, Ivan
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hodosi, Georg
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The impact of different organizational cultures on IT outsourcing relationship management2013Ingår i: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, nr 2, 50-66 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 5.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Culture Influence on IT Governance: What We Have Learned?2014Ingår i: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, 34-49 s.Artikel i tidskrift (Refereegranskat)
  • 6.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Influence of Culture on IT Governance: A Literature Review2014Ingår i: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, 4436-4445 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 7.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016Ingår i: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui, Ralph H. Sprague, Jr., IEEE Computer Society, 2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 8.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Role of Culture in IT Governance2014Ingår i: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Konferensbidrag (Refereegranskat)
  • 9.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017Ingår i: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, nr 0, 229-252 s.Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 10.
    Abbas, Haider
    et al.
    KTH, School of ICT, Electronic Systems.
    Magnusson, Christer
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Yngström, Louise
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hemani, Ahmed
    ICT/Materialfysik.
    Addressing Dynamic Issues in Information Security Management2011Ingår i: Information Management & Computer Security, ISSN 0968-5227, Vol. 19, nr 1, 5-24 s.Artikel i tidskrift (Refereegranskat)
    Abstract [sv]

    Ett ramverk för behandling av osäkerhet inom ledningssystem för informationssäkerhet presenteras. Ramverket baseras på teorier från corporate finance. En fallstudie visar hur ramverket kan appliceras.

  • 11. Abbas, Haider
    et al.
    Magnusson, Christer
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Yngström, Louise
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hemani, Ahmed
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010Ingår i: International Journal of computer Science and Information Security, ISSN 1947-5500, Vol. 8, nr 3, 59-67 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Information technology evolves at a faster pace giving organizations a limited scope to comprehend and effectively react to steady flux nature of its progress. Consequently the rapid technological progression raises various concerns for the IT system of an organization i.e. existing hardware/software obsoleteness, uncertain system behavior, interoperability of various components/method, sudden changes in IT security requirements and expiration of security evaluations. These issues are continuous and critical in their nature that create uncertainty in IT infrastructure and threaten the IT security measures of an organization. In this research, Options theory is devised to address uncertainty issues in IT security management and the concepts have been developed/validated through real cases on SHS (Spridnings-och-Hämtningssystem) and ESAM (E-society) systems. AUMSIS (Automated Uncertainty Management System in Information Security) is the ultimate objective of this research which provides an automated system for uncertainty management in information security. The paper presents the architectural description of AUMSIS, its various components, information flow, storage and information processing details using options valuation techniques. It also presents heterogeneous information retrieval problems and their solution. The architecture is validated with examples from SHS system

  • 12.
    Abbasi, Abdul Ghafoor
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    CryptoNET: Generic Security Framework for Cloud Computing Environments2011Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that

    -               our system is guaranteed to be secure,

    -               it is verifiable to provide the complete set of security services,

    -               we prove that it always functions correctly, and

    -               we justify our claim that it can not be compromised without user neglect and/or consent.

     

    We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security.

    In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate.

    At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications.

    Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then

    -               its software modules are not vulnerable to malware and viruses,

    -               its data are not vulnerable to illegal reading and theft,

    -               all messages exchanged in a networking environment are strongly protected, and

    -               all other resources of an application are also strongly protected.

     

    Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use.

    Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems.

    By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications.

    Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected.

    Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently.

    We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system.

    Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions.

    Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure Application Servers to client components are Single-Sign-On protocol, secure communication, and user authorization. In our system application servers are installed in a domain but it can be installed in a cloud environment as services. Secure Application Servers are designed and implemented using the concept and implementation of the Generic Security Server. It provides extended security functions using our engine components. So by adopting this approach, the same sets of security services are available to each application server.

    Security Management Infrastructure Servers provide domain level and infrastructure level services to the components of the CryptoNET architecture. They are standard security servers, known as cloud security infrastructure, deployed as services in our domain level could environment.

    CryptoNET system is complete in terms of functions and security services that it provides. It is internally integrated, so that the same cryptographic engines are used by all applications. And finally, it is completely transparent to users – it applies its security services without expecting any special interventions by users. In this thesis, we developed and evaluated secure network applications of our CryptoNET system and applied Threat Model to their validation and analysis. We found that deductive scheme of using our generic security objects is effective for verification and testing of secure, protected and verifiable secure network applications.

    Based on all these theoretical research and practical development results, we believe that our CryptoNET system is completely and verifiably secure and, therefore, represents a significant contribution to the current state-of-the-art of computer network security.

  • 13. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Comparing an e-Learning Reproductive Health Module with Traditional Lectures at a Medical School in Egypt2010Ingår i:  , 2010Konferensbidrag (Övrigt vetenskapligt)
  • 14. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Exploring Knowledge, Attitudes and Behaviors of Medical Students Towards Using Computer Technology in Learning2010Ingår i:  , 2010Konferensbidrag (Övrigt vetenskapligt)
  • 15.
    Abelli, Björn
    Högskolan i Borås, Institutionen Handels- och IT-högskolan.
    Directing and Enacting the Information System2007Ingår i: Advances in Information Systems Development - New Methods and Practice for the Networked Society. / [ed] W Wojtkowski, W. G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US , 2007, 13-23 s.Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 16.
    Abelli, Björn
    Mälardalens högskola, Ekonomihögskolan.
    Directing and Enacting the Information System2006Ingår i: Advances in Information Systems Development: New Methods and Practice for the Networked Society, Volume 2, Issue PART 2, 2006, 13-23 s.Konferensbidrag (Refereegranskat)
  • 17.
    Abelli, Björn
    Mälardalens högskola, Ekonomihögskolan.
    Enacting the e-Society2006Ingår i: Proceedings of the IADIS International Conference e-Society 2006, 2006, 285-298 s.Konferensbidrag (Refereegranskat)
  • 18.
    Abelli, Björn
    Högskolan i Borås, Institutionen Handels- och IT-högskolan.
    On Stage! Playwriting, Directing and Enacting the Informing Processes2007Doktorsavhandling, monografi (Övrigt vetenskapligt)
  • 19.
    Abelli, Björn
    et al.
    Mälardalens högskola, Ekonomihögskolan.
    Révay, Péter
    Mälardalens högskola, Ekonomihögskolan.
    To Be or Not To Be Computer Based2004Ingår i: Proceedings of microCAD 2004, 2004, 1-8 s.Konferensbidrag (Refereegranskat)
  • 20. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens konstruerar identitet online – flickors och pojkars erfarenheter av sociala medier2013Ingår i: Pedagogisk forskning i Sverige, ISSN 1401-6788, Vol. 18, nr 1-2Artikel i tidskrift (Refereegranskat)
  • 21. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens negotiating identity online – Swedish girls' and boys' reflections on online experiences2013Ingår i: Journal of Youth Studies, ISSN 1367-6261, E-ISSN 1469-9680, Vol. 16, nr 8, 951-969 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    How do Swedish tweens (10–14 years old) understand and experience the writing of their online identities? How are such intertwined identity markers as gender and age expressed and negotiated? To find some answers to these questions, participants in this study were asked to write a story about the use of online web communities on pre-prepared paper roundels with buzzwords in the margins to inspire them. Content analysis of these texts using the constant comparative method showed that the main factors determining how online communities are understood and used are the cultural age and gender of the user. Both girls and boys chat online, but girls more often create blogs while boys more often play games. Gender was increasingly emphasised with age; but whereas boys aged 14 described themselves as sexually active and even users of pornography, girls of the same age described themselves as shocked and repelled by pornography and fearful of sexual threats. In this investigation an intersectionalist frame of reference is used to elucidate the intertwined power differentials and identity markers of the users' peer group situation.

  • 22. Abrahamsson, Emil
    et al.
    Forni, Timothy
    Skeppstedt, Maria
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Medical text simplification using synonym replacement: adapting assessment of word difficulty to a compounding language2014Ingår i: Proceedings of the 3rdWorkshop on Predicting andImproving Text Readability for Target Reader Populations(PITR) / [ed] Sandra Williams, Stroudsburg: Association for Computational Linguistics , 2014, 57-65 s.Konferensbidrag (Refereegranskat)
  • 23.
    Abu Khousa, Eman
    et al.
    UAE University, United Arab Emirates.
    Atif, Yacine
    UAE University, United Arab Emirates.
    Mohammad M., Masud
    UAE University, United Arab Emirates.
    A social learning analytics approach to cognitive apprenticeship2015Ingår i: Smart Learning Environments, ISSN 2196-7091, Vol. 2, nr 14Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The need for graduates who are immediately prepared for employment has been widely advocated over the last decade to narrow the notorious gap between industry and higher education. Current instructional methods in formal higher education claim to deliver career-ready graduates, yet industry managers argue their imminent workforce needs are not completely met. From the candidates view, formal academic path is well defined through standard curricula, but their career path and supporting professional competencies are not confidently asserted. In this paper, we adopt a data analytics approach combined with contemporary social computing techniques to measure, instil, and track the development of professional competences of learners in higher education. We propose to augment higher-education systems with a virtual learning environment made-up of three major successive layers: (1) career readiness, to assert general professional dispositions, (2) career prediction to identify and nurture confidence in a targeted domain of employment, and (3) a career development process to raise the skills that are relevant to the predicted profession. We analyze self-declared career readiness data as well as standard individual learner profiles which include career interests and domain-related qualifications. Using these combinations of data sources, we categorize learners into Communities of Practice (CoPs), within which learners thrive collaboratively to build further their career readiness and assert their professional confidence. Towards these perspectives, we use a judicious clustering algorithm that utilizes a fuzzy-logic objective function which addresses issues pertaining to overlapping domains of career interests. Our proposed Fuzzy Pairwise-constraints K-Means (FCKM) algorithm is validated empirically using a two-dimensional synthetic dataset. The experimental results show improved performance of our clustering approach compared to baseline methods.

  • 24.
    Acheampong, Faustina
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Vimarlund, Vivian
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik. Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Centre for Information Technology and Information Systems (CenITIS).
    Business models for telemedicine services: A literature review2015Ingår i: Health Systems, ISSN 2047-6965, E-ISSN 2047-6973, Vol. 4, nr 3, 189-203 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Telemedicine has been acknowledged to improve the quality of healthcare. However, many telemedicine services fail beyond the pilot phase. A literature review on business model components for telemedicine services was conducted. Based on specified inclusion criteria, 22 publications were included in the review. To facilitate the analysis of literature, a business model framework with value as its central focus was proposed. Improvement in quality, efficiency and accessibility of care were identified to be the outcomes of telemedicine, with patients and healthcare personnel being the main users of the services, which are delivered through home, institutional and community-based care. Patients, health providers, vendors, payers and government agencies are actors involved in the delivery of telemedicine services, which require investments in resources like videoconferencing technologies, home monitoring devices and other IT infrastructure. Subscriptions, reimbursements and pay-per-use revenue streams were identified as feasible for commercializing telemedicine services.

  • 25.
    Acheampong, Faustina
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Vimarlund, Vivian
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Effects of a Home-based Monitoring Device on Innovation in Healthcare Delivery: A Pilot Study2013Ingår i: Information Systems and Technology for Organizations in a Networked Society / [ed] Tomayess Issa, Pedro Isaias and Piet Kommers, Hershey, PA, USA: IGI Global, 2013, 316-334 s.Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Information technology has been suggested to improve patient health outcomes and reduce the burden of care. In this study, we explored the effects of collaborative innovation between caregivers and patients on healthcare delivery as a consequence of the use of an IT-based device by patients with atrial fibrillation. Two cardiologists and two nurses were interviewed while questionnaires were mailed to 75 patients querying them about the use of a home-based ECG for remote monitoring. Findings indicated that the caregivers considered the device to enhance the quality of clinical decision-making. Patients found the device to be useful and felt more involved in their own care. However, the introduction of the device presented work overload for the caregivers. Thus, the facilitation of timely diagnostics and decision-making were not realized. IT is an enabler through which innovation in healthcare delivery can be realized, but it must be integrated into work practices to realize potential benefits.

  • 26.
    Adaba, Godfried Bakiyem
    et al.
    Birkbeck, University of London, , Department of Computer Science and Information Systems.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    E-trade Facilitation in Ghana: a Capability Approach Perspective2014Ingår i: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, Vol. 63, nr 5, 1-13 s.Artikel i tidskrift (Refereegranskat)
  • 27. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    ICT-based trade facilitation and the MDGs: a case study of a public–private partnership in Ghana2014Ingår i: ICTs and the Millennium Development Goals: a United Nations Perspective, Springer, 2014, nr 2013, 223-235 s.Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    The strategic and innovative deployment and use of information and communication technologies (ICT) is important to development and the attainment of the millennium development goals (MDGs). Previous studies have suggested that ICT-based trade facilitation promotes development through better integration into global markets. Through an interpretive case study, this chapter explores an ICTbased initiative to connect members of the trading community in Ghana on an electronic data interchange (EDI) platform. More specifi cally, it explored the contributions of the initiative to effi cient trade facilitation and discusses the broader mplications for achieving the MDGs in Ghana. The research confi rms that the initiative has improved operational effi ciency at Ghana’s ports and borders. Furthermore, it has enabled effi cient and reliable collection of duties and taxes. The findings reinforce the view that government support and private sector expertise and funding are important factors in ICT-based e-government solutions in developing countries. The chapter contends that ICT-based trade facilitation can make a significant contribution to the attainment of the MDGs in Ghana.

  • 28. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    IT Governance Practices in a Public Organization in Ghana2014Ingår i: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, E-ISSN 1947-8313, Vol. 5, nr 2, 14-23 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The strategic importance of information technology (IT) in today's organizations and dependence on IT to support e-government strategies has increased the interest in IT Governance (ITG) in public sector organizations. From this perspective, this paper examines ITG practices in a public organization in Ghana (that has a responsibility to mobilize revenue for national development) in order to gain an insight into IT governance structures, processes and relational mechanisms and understand how this contributes to adding value through IT. The findings have revealed that this public organization has a centralized approach to IT governance, with inadequate board involvement concerning how IT investments can bring value and improve organizational performance. Furthermore, there are no IT steering and strategy committees to oversee IT governance as best practice requires.

  • 29.
    Adaba, Godfried Bakiyem
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    El Mekawy, Mohamed Sobih Aly
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Business-IT Alignment in Trade Facilitation: A Case Study2010Ingår i: Organizational, Business, and Technological Aspects of the Knowledge Society / [ed] Lytras, M.D.; Ordonez De Pablos, P.; Ziderman, A.; Roulstone, A.; Maurer, H.; Imber, J.B., Berlin Heidelberg: Springer-Verlag , 2010, Vol. 112, 146- s.Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    In the information age, no organization can thrive without harnessing the power of IT. The effective deployment of IT to achieve business goals and gain competitive advantage requires the alignment of business and IT strategies of organizations. Using the Strategic Alignment Maturity model, this paper evaluates strategic alignment maturity of Customs Excise Preventive service, a frontline public organization charged with trade facilitation in Ghana. Strategic alignment maturity is at level 3; which implies the existence of an established process to leverage IT for efficiency and effectiveness. Efforts are required to strengthen alignment and fully harness the potential of IT to facilitate trade in Ghana.

  • 30.
    Adisa, Femi
    et al.
    Department of IT & Management, Copenhagen Business School, Frederiksberg, Denmark.
    Rose, Jeremy
    Department of Computer Science, Aalborg University, Aalborg, Denmark.
    The mediating role of absorptive capacity in knowledge transfer: ERP implementations in small and medium sized enterprises in sub-Saharan Africa2013Ingår i: International Journal of Enterprise Information Systems, ISSN 1548-1115, Vol. 9, nr 2, 1-19 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Knowledge transfer between consultants and organizational users influences the outcomes of an Enterprise Resource System (ERP) implementation. Configuration and implementation tasks are dependent on generating some level of shared understanding of both business practices and technology. These problems become acute in implementations in small and medium sized enterprises (SMEs). SMEs often operate with non-standard business processes, making an effective interchange of process knowledge between consultants and end-users crucial. Using a multiple case study method and content analysis, the authors investigate the mediating role of absorptive capacity in knowledge transfer in SMEs ERP implementations. They present exploratory case studies from 3 Nigerian companies with varying outcomes, and hypothesize that knowledge transfer is complicated by acute information asymmetry, absence of pre-existing related knowledge and consequent difficulties in developing a shared understanding, and by a tendency to operate with lone consultants and lone organizational representatives.

  • 31.
    Aggestam, Lena
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    IT-supported Knowledge Repositories: Increasing their Usefulness by Supporting Knowledge Capture2008Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Organizations use various resources to achieve business objectives, and for financial gain. In modern business, knowledge is a critical resource, and organizations cannot afford not to manage it. Knowledge Management (KM) aims to support learning and to create value for the organization. Based on three levels of inquiry (why, what, how), work presented in this thesis includes a synthesized view of the existing body of knowledge concerning KM and hence a holistic characterization of KM. This characterization reveals a strong dependency between KM and Learning Organization (LO). Neither of them can be successful without the other. We show that a KM project resulting in an IT-supported knowledge repository is a suitable way to start when the intention is to initiate KM work. Thus, our research focuses on ITsupported knowledge repositories.

    Large numbers of KM projects fail, and organizations lack support for their KM undertakings. These are the main problems that our research addresses. In order for an IT-supported knowledge repository to be successful, it must be used. Thus, the content of the repository is critical for success. Our work reveals that the process of capturing new knowledge is critical if the knowledge repository is to include relevant and updated knowledge. With the purpose of supporting the capture process, this thesis provides a detailed characterization of the capture process as well as guidance aiming to facilitate the implementation of the capture process in such a way that knowledge is continuously captured, also after the KM implementation project is completed. We argue that the continuous capture of new knowledge which can potentially be stored in the knowledge repository will, in the long term perspective, have a positive influence on the usefulness of the repository. This will most likely increase the number of users of the repository and accordingly increase the number of successful KM projects.

    All the work presented in this thesis is the result of a qualitative research process comprising a literature review and an empirical study that were carried out in parallel. The empirical study is a case study inspired by action research, which involved participation in the project Efficient Knowledge Management and Learning in Knowledge Intensive Organizations (EKLär).

  • 32.
    Aghaee, Naghmeh
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Finding Potential Problems in the Thesis Process in Higher Education: Analysis of e-mails to develop a support system2015Ingår i: Education and Information Technologies: Official Journal of the IFIP technical committee on Education, ISSN 1360-2357, E-ISSN 1573-7608, Vol. 20, nr 1, 21-36 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Autonomous learning hype has created much speculation in educational systems regarding how to develop the learning process. Final project (thesis) in Bachelor’s and Master’s levels is a significant part of study for students in higher education. However, there are some problems, which lead students not managing to do or finish their thesis. As a part of a solution to these problems, the Department of Computer and Systems Sciences (DSV) at Stockholm University, Sweden, has established an information and communication platform, called SciPro. The system was initiated in 2011 to support students and supervisors during the thesis process courses. This study contributes by exploring problems that learners have faced during the final project courses and analyzing discussed issues in the emails, sent to the SciPro support group, ThesisSupport. A random sample of one hundred emails has been analyzed with the help of a content analysis tool, in order to develop the categories, which cover the discussed issues. The result of the study shows six exhaustive and mutually exclusive categories of problems: 1) Thesis initiation (26 %), 2) Info-mail (4.7 %), 3) Technical issues (17.1 %), 4) Exemption (18.7 %), 5) Supervision (17.1 %), 6) Final seminar (16.4 %). Consequently, based on the significance of the categories, two groups of strategic suggestions are developed: 1) developing communications and 2) developing instructions. These strategies intend to enhance support for the autonomous learning process for the thesis courses in higher education.

  • 33.
    Aghaee, Naghmeh
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hansson, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Drougge, Ulrika
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Learners’ Perceptions on the Structure and Usefulness of e-Resources for the Thesis Courses2014Ingår i: European Journal of Open and Distance Learning, ISSN 1027-5207, E-ISSN 1027-5207, Vol. 17, nr 1, 154-171 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Nowadays, utility of information and communication technology (ICT) in education is a way to facilitate interaction and accessing information for learning in higher education. However, finding a set of structured e-resources to facilitate learning within specific courses is still a big challenge in most of the institutions and universities. This includes the problems and challenges for the thesis courses in both undergraduate (Bachelor) and graduate (Master) level in Sweden. To overcome or reduce the problems and enhance quality of outcomes in the thesis courses, the department of Computer and Systems Sciences (DSV) at Stockholm University has developed a Learning Support System, SciPro (Scientific Process), to support thesis process. This study aims at investigating learners’ perspectives on usefulness of structured e-resources in order to reduce challenges for finding information related to the thesis steps in SciPro. This is done based on an open online survey, carried out in 2012-2013 of students’ perspectives at DSV. The study found the actual problems and hence suggested a model as a way forward to sort the useful e-resources to support reducing the problems in the thesis process.

  • 34.
    Aghaee, Naghmeh
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Jobe, William Byron
    Karunaratne, Thashmee
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Smedberg, Åsa
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hansson, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Interaction Gaps in PhD Education and ICT as a Way Forward: Results from a Study in Sweden2016Ingår i: The International Review of Research in Open and Distributed Learning, ISSN 1492-3831, Vol. 17, nr 3, 360-383 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Many research studies have highlighted the low completion rate and slow progress in PhD education. Universities strive to improve throughput and quality in their PhD education programs. In this study, the perceived problems of PhD education are investigated from PhD students' points of view, and how an Information and Communication Technology Support System (ICTSS) may alleviate these problems. Data were collected through an online open questionnaire sent to the PhD students at the Department of (the institution's name has been removed during the double-blind review) with a 59% response rate. The results revealed a number of problems in the PhD education and highlighted how online technology can support PhD education and facilitate interaction and communication, affect the PhD students' satisfaction, and have positive impacts on PhD students' stress. A system was prototyped, in order to facilitate different types of online interaction through accessing a set of online and structured resources and specific communication channels. Although the number of informants was not large, the result of the study provided some rudimentary ideas that refer to interaction problems and how an online ICTSS may facilitate PhD education by providing distance and collaborative learning, and PhD students' self-managed communication.

  • 35.
    Aghaee, Naghmeh
    et al.
    Stockholm University.
    Karunaratne, Thashmee
    Stockholm University.
    Smedberg, Åsa
    Stockholm University.
    Jobe, William
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Communication and Collaboration Gaps among PhD Students and ICT as a Way Forward: Results from a Study in Sweden2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    The low completion rate and slow progress in PhD education have been highlighted in many studies. However, the interaction problems and communication gaps that PhD students encounter make this attempt even more challenging. The aim of this study is to investigate the peer interaction problems and ICT based solutions from PhD students’ perspectives. The data collection method was an online questionnaire and in-depth interviews were used to follow up. The target group for the survey was the PhD students in Computer Science at Stockholm University. The total number of respondents for the survey was 53 PhD students and eleven randomly selected PhD students for the interviews. The results reflected a lack of peer interaction as an important issue in the perspective of the students. Based on this, the study showed several ICT solutions that have the potential to reduce the interaction problems and thereby improve PhD students’ collaborative learning and research quality.

  • 36.
    Aghaee, Naghmeh
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Karunaratne, Thashmee
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Smedberg, Åsa
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Jobe, William Byron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    ICT for Communication and Collaborative Learning among PhD peers: Results of the Needs and Desires from a PhD Survey2014Ingår i: DSV writers hut 2014: proceedings, August 21-22, Åkersberga, Sweden / [ed] Gustaf Juell-Skielse, Stockholm: Department of Computer and Systems Sciences, Stockholm University , 2014, 33-40 s.Konferensbidrag (Refereegranskat)
  • 37.
    Aghaee, Naghmeh
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Larsson, Ken
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Students’ Perspectives on Utility of Mobile Applications in Higher Education2013Ingår i: Trends in Mobile Web Information Systems: Revised Selected Papers / [ed] Maristella Matera, Gustavo Rossi, Springer Publishing Company, 2013, 44-56 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Use of Information and Communication Technologies (ICT) in pedagogy and learning in higher education supports the concept of Technology Enhanced Learning (TEL). Mobile devices and applications with educational purposes are part of using online ICT and facilitate autonomous learning in education. Using mobile applications for education has significantly improved in the last few years. However, there is still a gap, in which this concept is still not widely known and frequently experienced by learners. As a part of supporting TEL in higher education and filling this gap, the department of Computer and System Sciences at Stockholm University in Sweden is planning to develop a mobile application for the SciPro system. SciPro is the computer-mediated communication platform to support enhancement of thesis quality and facilitate autonomous learning in higher education, at both Bachelor and Master levels. This study aims to investigate and evaluate learners’ perspectives about utility of mobile applications in higher education and specifically to support SciPro functionalities. Almost 95% of the respondents use mobile applications for higher education and believe in the utility of mobile applications for supporting learning in higher education. This is while there are a few respondents (less than 5%), who do not fully share this opinion. More than 70% of the respondents think that a SciPro mobile application will add value to their thesis process. Even though it may not directly affect the speed and quality of the thesis, it will increase mobility, availability, and flexibility of accessing information and resources in SciPro.

  • 38.
    Aghaee, Naghmeh
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Larsson, Ulf
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hansson, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Improving the Thesis Process: Analysis of Scipro Support e-mails2012Manuskript (preprint) (Övrig (populärvetenskap, debatt, mm))
  • 39.
    Aghaee, Nam
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Karunaratne, Thashmee
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Smedberg, Åsa B.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Jobe, William
    Communication and Collaboration Gaps among PhD Students and ICT as a Way Forward: Results from a Study in Sweden2015Ingår i: E-Learn: 20 th annual World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2015, 2015Konferensbidrag (Refereegranskat)
  • 40. Agüero, Juan C.
    et al.
    Godoy, Boris I.
    Goodwin, Graham C.
    Wigren, Torbjörn
    Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Avdelningen för systemteknik. Uppsala universitet, Teknisk-naturvetenskapliga vetenskapsområdet, Matematisk-datavetenskapliga sektionen, Institutionen för informationsteknologi, Reglerteknik.
    Scenario-based EM identification for FIR systems having quantized output data2009Ingår i: Proc. 15th IFAC Symposium on System Identification, International Federation of Automatic Control , 2009, 66-71 s.Konferensbidrag (Refereegranskat)
  • 41.
    Ahlgren, Per
    et al.
    Stockholms universitet, Universitetsbiblioteket.
    Grönqvist, Leif
    Evaluation of retrieval effectiveness with incomplete relevance data: theoretical and experimental comparison of three measures2008Ingår i: Information Processing & Management, ISSN 0306-4573, Vol. 44, nr 1, 212-225 s.Artikel i tidskrift (Refereegranskat)
  • 42.
    Ahlin, Karin
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Aspekter på nyttometoder för teknikinformation ur ett livscykelperspektiv2012Rapport (Övrig (populärvetenskap, debatt, mm))
  • 43.
    Ahlin, Karin
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Värdeadderande aktiviteter i produktionsprocessen av TI och tillhörande effektivitetsmätningar2013Rapport (Refereegranskat)
  • 44.
    Ahlin, Karin
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Persson Slumpi, Thomas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    A Communication-model for Intangible Benefits of Digital Information2015Ingår i: 2015 Americas Conference on Information Systems, AMCIS 2015, 2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    The communication of the intangible benefits to different stakeholders is important at the development for organizational resource and could be described as a boundary-spanning activity. In this study we build on Ahlin’s model (2014) and illustrates categorization of intangible benefits of digital information by using Carlile’s (2002; 2004) efficient boundary objects, the syntactic, semantic and pragmatic. Qualitative empirical pictures from three cases are illustrated by questions, derived from the efficient boundary objects. The illustrations show that this is an accessible path forward and that the illustrations can be changed to further research with the goal for practical test the communication model.The communication of the intangible benefits to different stakeholders is important at the development for organizational resource and could be described as a boundary-spanning activity. In this study we build on Ahlin’s model (2014) and illustrates categorization of intangible benefits of digital information by using Carlile’s (2002; 2004) efficient boundary objects, the syntactic, semantic and pragmatic. Qualitative empirical pictures from three cases are illustrated by questions, derived from the efficient boundary objects. The illustrations show that this is an accessible path forward and that the illustrations can be changed to further research with the goal for practical test the communication model. 

  • 45.
    Ahlin, Karin
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Persson Slumpi, Thomas
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Öberg, Lena-Maria
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Nyttan med CM2013Ingår i: Configuration Management i teknikinformationens tjänst: en antologi / [ed] Margaretha Eriksson och Lena-Maria Öberg, Sundsvall: Mittuniversitetet , 2013Kapitel i bok, del av antologi (Övrig (populärvetenskap, debatt, mm))
  • 46.
    Ahlin, Karin
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Saariko, Ted
    Göteborgs Universitet.
    A semiotic perspective on semantics interoperability2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    While information technology enables us to access more material than ever before, we need to come to grips with the disagreeable fact that data is not information. Sharing data without safeguarding comprehension may lead to confusion at best and disaster at worst. The issue at hand is one of ensuring semantic interoperability between actors from disparate contexts. Research into this problem is plentiful, but typically focused around specific subject matters, limiting its appeal to a limited range of scholars and practitioners. Based upon a literary study, we identify two extreme approaches to managing semantic interoperability. These are denoted top-down and bottom-up. We illustrate real world instances of these approaches using the TFI-model based on a case study encompassing two organizations. Our theoretical model is found to be a viable lens through which to generalize and interpret issues pertaining to semantic interoperability between human actors. We therefore see a need for further research into human-based on semantic interoperability.

  • 47.
    Ahlin, Karin
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för data- och systemvetenskap.
    Åslund, Anna
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för kvalitetsteknik, maskinteknik och matematik.
    Utveckling och test av arbetsmetod för identifiering av nytta och värde i produktionsprocessen i framtagande av teknikinformation.2014Rapport (Övrigt vetenskapligt)
  • 48. Ahltorp, Magnus
    et al.
    Skeppstedt, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Dalianis, Hercules
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Using text prediction for facilitating input and improving readability of clinical text2013Ingår i: MedInfo 2013: Proceedings of the 14th World Congress on Medical and Health Informatics / [ed] Christoph Ulrich Lehmann, Elske Ammenwerth, Christian Nøhr, IOS Press, 2013, 1149-1149 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Text prediction has the potential for facilitating and speeding up the documentation work within health care, making it possible for health personnel to allocate less time to documentation and more time to patient care. It also offers a way to produce clinical text with fewer misspellings and abbreviations, increasing readability. We have explored how text prediction can be used for input of clinical text, and how the specific challenges of text prediction in this domain can be addressed. A text prediction prototype was constructed using data from a medical journal and from medical terminologies. This prototype achieved keystroke savings of 26% when evaluated on texts mimicking authentic clinical text. The results are encouraging, indicating that there are feasible methods for text prediction in the clinical domain.

  • 49. Ahltorp, Magnus
    et al.
    Skeppstedt, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kitajima, Shiho
    Rzepka, Rafal
    Araki, Kenji
    Medical vocabulary mining using distributional semantics on Japanese patient blogs2014Ingår i: Proceedings of the 6th International Symposium on Semantic Mining in Biomedicine, 2014, 57-62 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Random indexing has previously been successfully used for medical vocabulary expansion for Germanic languages. In this study, we used this approach to ex- tract medical terms from a Japanese pa- tient blog corpus. The corpus was seg- mented into semantic units by a semantic role labeller, and different pre-processing and parameter settings were then evalu- ated. The evaluation showed that simi- lar settings are suitable for Japanese as for previously explored Germanic languages, and that distributional semantics is equally useful for semi-automatic expansion of Japanese medical vocabularies as for med- ical vocabularies in Germanic languages.

  • 50. Ahmad, Fouad
    et al.
    Ibrahim, Maha
    El-Esnawy, N
    Fors, Uno
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    An e-Learning Faculty Development Course with Formative Assessment2010Ingår i: 16th Annual Sloan Consortium International Conference on Online Learning, 2010Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    An e-Learning faculty development course has been developed and taught in Egypt for the past five years. The course adopts Formative Assessment (FA) techniques to enhance participants' learning. The additional FA effort for collecting and analyzing data as well as adjusting teaching is worth investing to accommodate gaps in learning.

1234567 1 - 50 av 4904
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf