Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 7133
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Aalberg, Asbjørn Lein
    et al.
    SINTEF Digital, Norway.
    Holen, Siri Mariane
    SINTEF Digital, Norway.
    Aamodt, Edvard
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety.
    Steen-Hansen, Anne Elise
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety. NTNU Norwegian University of Science and Technology, Norway.
    Preconditions for Learning from Fires in Norway: Structural, Cultural, Technological, Interactional and Relational Aspects2021In: Proceedings of the 31st European Safety and Reliability Conference, 2021, p. 1747-1754Conference paper (Refereed)
    Abstract [en]

    Learning from incidents is widely accepted as a core part of safety management. This is also true for fires – however few fires in Norway are investigated. Fires are interesting incidents conceptually due to their potential of devastating outcomes on material and human lives and because they happen across all sectors and industries, businesses, and homes. In Norway, several different actors play a role in investigating and learning from fires, from the fire rescue services to directorates and Non-Governmental Organisations. The present study seeks to understand the preconditions for learning from fires in Norway, with emphasis on the formal actors that play a role in preventing and mitigating fires. Methodologically, the study is based on qualitative interviews conducted with relevant actors from first responders, authorities, and other sectors. We found that there are structural, cultural, technological, and relational aspects that seem to influence learning from fires in Norway. The results were analyzed using thematic analysis and the Pentagon model framework. The findings are discussed in relation to theories from organisational learning and learning from incidents.

    Download full text (pdf)
    fulltext
  • 2.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Information Technology Governance: The Role of Organizational Culture and Structure2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information Technology Governance (ITG) is among the most important challenges for the managers today. IT is not anymore just a supportive tool but also a strategic driver for the businesses. In the dynamic and competitive world of today, it is crucial for organizations to know how to govern IT rather than just to use it. IT governance deals with specifying responsibilities and decision rights to encourage the desirable behaviour from IT and generate value from IT investments. IT governance can impact the overall performance of organizations, however there are still difficulties in understanding IT governance and the factors that may influence it.

    Organizational culture and structure are among the factors that have significant influence on many issues in an organization. According to previous research, organizational culture and structure need to be considered when implementing IT governance. However, there is a lack of research focusing on how organizational culture and structure can influence IT governance performance and implementation. Thus, the main research question addressed in this thesis is: How are organizational culture and structure related to IT governance? To address this question, this research has performed literature reviews and conducted case studies to investigate the role of organizational culture and structure on IT governance. As the first step, the previous literature was reviewed to find the gaps in the research on culture and IT governance. As the next step, four case studies were conducted to explore the influence of organizational culture and structure on IT governance. Two case studies have investigated the relation between organizational structure and IT governance implementation and performance in large organizations; and two other case studies investigated on how different types of organizational culture influence IT governance performance outcomes.

    The results of this research respond to the research question by specifying the role of culture in IT governance through a categorization of prior research both from research and practice perspectives; specifying the influence of different organizational culture types on IT governance performance outcomes in different organizations; and by specifying IT organizational structure relationship with IT governance performance outcomes and IT governance implementation.

    The research presented in this thesis provides both theoretical and empirical contributions to the IT governance research and practice.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 3.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiate thesis, comprehensive summary (Other academic)
    Download full text (pdf)
    fulltext
  • 4. Aasi, Parisa
    et al.
    Nikic, Jovana
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Melisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Cloud Computing on IT Governance in a Swedish Municipality2020In: Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, Proceedings / [ed] Marinos Themistocleous, Maria Papadaki, Muhammad Mustafa Kamal, Springer, 2020, p. 623-639Conference paper (Refereed)
    Abstract [en]

    Cloud computing is used to a greater extent in today’s organizations and enables organizations to obtain on-demand network access to IT services. When cloud computing is adopted in an organization, the IT governance becomes more challenging, because organizations need to address business and IT-related processes as well as managing risks and maintaining the relationship with cloud computing vendors. This research aims at finding how cloud computing service model specifically Software as a Service (SaaS) influence IT governance structures, processes and relational mechanisms in a public organization. For this purpose a case study was conducted in a Swedish municipality and the data was collected through interviews with IT managers and from internal documents of municipality and was analyzed using thematic analysis. The results of this study shows that SaaS influences the IT governance structure by improving roles and responsibilities definition and speeds up the decision-making processes. Moreover, the communication with the vendors is more efficient due to the use of SaaS.

  • 5.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: Proceedings of the 48th Annual Hawaii International Conference on System Sciences, IEEE, 2015, p. 4691-4699Conference paper (Refereed)
  • 6.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The impact of different organizational cultures on IT outsourcing relationship management2013In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, no 2, p. 50-66Article in journal (Refereed)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 7.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Facing The Digitalization Challenge: Why Organizational Culture Matters and How It Influences IT Governance Performance2017In: Information Systems Development: Advances in Methods, Tools and Management: Proceedings / [ed] N. Paspallis, M. Raspopoulos, C. Barry, M. Lang, H. Linger, C. Schneider, Association for Information Systems, 2017Conference paper (Refereed)
    Abstract [en]

    Today it is not possible for the companies to compete without having IT as a strategic driver. That is why IT governance becomes crucial for managers to bring the most value from IT to the business. Additionally organizational culture is an important factor and often blamed when IT governance projects fail. However little in-depth research investigated how the organizational culture changes can improve the IT governance performance. This research is a case study of the IT department of a large company attempting to improve the IT governance while facing the digitalization challenge. In this case the IT department has an organizational culture change journey seeking to improve the IT governance performance. The results indicate that the initial clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore, adhocracy is identified as preferred culture for improving IT governance for growth.

  • 8.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2014In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, no 1, article id 3Article in journal (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 9.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2018In: Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications, IGI Global, 2018, no 2018, p. 139-156Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 10.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2017In: Organizational Culture and Behavior: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017, no 2017, p. 1329-1346Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 11.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Culture on IT Governance: A Literature Review2014In: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, p. 4436-4445Conference paper (Refereed)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 12.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui; Ralph H. Sprague, Jr., IEEE Computer Society, 2016, p. 5157-5166Conference paper (Refereed)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 13.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Role of Culture in IT Governance2014In: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Conference paper (Refereed)
  • 14.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017In: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, no 0, p. 229-252Chapter in book (Refereed)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 15.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    How Does the Organizational Culture of Collaborative Networks Influence IT Governance Performance in a Large Organization?2018In: Proceedings of the 51st Annual Hawaii International Conference on System Sciences, 2018, p. 4941-4951Conference paper (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks desire different organizational culture types based on their priorities for IT governance outcomes. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost effective use of IT. An adhocracy culture is desired when prioritizing the effective use of IT for business growth. Finally a combination of market and hierarchy organizational culture is desired when seeking effective use of IT for business flexibility and cost cutting.

  • 16.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    What is the role of organizational culture in IT governance performance of collaborative virtual networks?2018In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 9, no 1, article id 2Article in journal (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks fit better with different organizational culture types based on their priorities for IT governance outcomes to maximize performance. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost-effective use of IT. An adhocracy culture fits better when prioritizing the effective use of IT for business growth. Finally, a combination of market and hierarchy organizational culture is desired and fits better when seeking effective use of IT for business flexibility and cost cutting.

  • 17.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2020In: Start-Ups and SMEs: Concepts, Methodologies, Tools, and Applications / [ed] Mehdi Khosrow-Pour, IGI Global, 2020, no 1, p. 1664-1687Chapter in book (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance’s five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 18.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2017In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 8, no 2, p. 42-61, article id 3Article, review/survey (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance's five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 19.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Atug, Sebastian
    Institutionen för data- och systemvetenskap, Stockholms universitet. Sverige.
    Cermeno, Lorenzo
    för data- och systemvetenskap, Stockholms universitet. Sverige.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Digital Transformation Success Through Aligning the Organizational Structure: Case Study of Swedish Public Organizations2022In: AMCIS 2022 Proceedings, Association for Information Systems (AIS) , 2022Conference paper (Refereed)
    Abstract [en]

    A Digital Transformation fundamentally involves the implementation of one or more digital tools, which is a process often burdened with challenges. It is estimated that approximately 66 to 84 percent of the taken Digital Transformation initiatives are unsuccessful, which can be attributed to organizational shortcomings, more specifically structural ones. While public organizations regularly do not achieve the same success as those in the private sector, it was of interest to investigate the Swedish ones. Where 86 percent of residents use the internet to interact with public authorities. Previous research has singled out the IT organization to be the appointed leader of Digital Transformations, further research on that relationship is limited. Therefore, this study examines how the IT organization, in an agile environment, can align its structure for a successful Digital Transformation. To answer the discovered research problem, the following research question has been formulated: “How should an IT organization’s structure be aligned in an agile environment in order to achieve a successful Digital Transformation?”. This is research in progress and will be continued by conducting case studies in four public organizations. Data will be collected through semi0structured interviews and analyzed thematically. Finally, a presentation of different aspect of organizational structure alignment through digital transformation based on these cases will be provided.

  • 20.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Gråhns, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Geijer, Robin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Aspects in Achieving a Successful Digital Transformation: Case of an ERP System Change2022In: Information Systems: 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8–9, 2021, Proceedings / [ed] Marinos Themistocleous; Maria Papadaki, Springer, 2022, p. 653-666Conference paper (Refereed)
    Abstract [en]

    Digital transformation has been an interesting concept from the organizational perspective for a long time. The benefits of a successful digital transformation can take your organization into the next step by providing an increased organizational growth, aid market reachability by penetrating new and exciting markets, or enable your business operations to function to a greater extent than before with higher efficiency and lower lead times. Digital transformation is however a complex and diverse concept that means to integrate new innovations by using digital technology into the organization with the need of making greater organizational changes to succeed. This research, has explored how different organizational aspects like structural, technological and cultural ones can impact the success of a digital transformation during an ERP system change. A case study has been conducted in a company to identify how the current structural, technological, and cultural aspects influence the current digital transformation in that the company. The data was collected through interviews with employees having managerial roles and from internal documents of company and was analyzed using thematic analysis. The results show an agile approach, a more decentralized structure and high readiness for change, along with a transparent communication between management and co-workers to be beneficial for a successfully digital transformation.

  • 21.
    Abbas, Haider
    et al.
    KTH, School of ICT, Electronic Systems.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    ICT/Materialfysik.
    Addressing Dynamic Issues in Information Security Management2011In: Information Management & Computer Security, ISSN 0968-5227, E-ISSN 1758-5805, Vol. 19, no 1, p. 5-24Article in journal (Refereed)
    Abstract [en]

    The paper addresses three main problems resulting from uncertainty in information security management: i)dynamically changing security requirements of an organization ii) externalities caused by a security system and iii)obsolete evaluation of security concerns. A framework based on options reasoning borrowed from corporate finance is proposed and adapted to evaluation of security architecture and decision-making for handling these issues at organizational level. The adaptation as methodology is demonstrated by a large case study validating its efficacy.

  • 22. Abbas, Haider
    et al.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010In: International Journal of computer Science and Information Security, ISSN 1947-5500, Vol. 8, no 3, p. 59-67Article in journal (Refereed)
    Abstract [en]

    Information technology evolves at a faster pace giving organizations a limited scope to comprehend and effectively react to steady flux nature of its progress. Consequently the rapid technological progression raises various concerns for the IT system of an organization i.e. existing hardware/software obsoleteness, uncertain system behavior, interoperability of various components/method, sudden changes in IT security requirements and expiration of security evaluations. These issues are continuous and critical in their nature that create uncertainty in IT infrastructure and threaten the IT security measures of an organization. In this research, Options theory is devised to address uncertainty issues in IT security management and the concepts have been developed/validated through real cases on SHS (Spridnings-och-Hämtningssystem) and ESAM (E-society) systems. AUMSIS (Automated Uncertainty Management System in Information Security) is the ultimate objective of this research which provides an automated system for uncertainty management in information security. The paper presents the architectural description of AUMSIS, its various components, information flow, storage and information processing details using options valuation techniques. It also presents heterogeneous information retrieval problems and their solution. The architecture is validated with examples from SHS system

  • 23.
    Abbasi, Abdul Ghafoor
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    CryptoNET: Generic Security Framework for Cloud Computing Environments2011Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that

    -               our system is guaranteed to be secure,

    -               it is verifiable to provide the complete set of security services,

    -               we prove that it always functions correctly, and

    -               we justify our claim that it can not be compromised without user neglect and/or consent.

     

    We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security.

    In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate.

    At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications.

    Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then

    -               its software modules are not vulnerable to malware and viruses,

    -               its data are not vulnerable to illegal reading and theft,

    -               all messages exchanged in a networking environment are strongly protected, and

    -               all other resources of an application are also strongly protected.

     

    Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use.

    Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems.

    By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications.

    Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected.

    Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently.

    We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system.

    Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions.

    Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure Application Servers to client components are Single-Sign-On protocol, secure communication, and user authorization. In our system application servers are installed in a domain but it can be installed in a cloud environment as services. Secure Application Servers are designed and implemented using the concept and implementation of the Generic Security Server. It provides extended security functions using our engine components. So by adopting this approach, the same sets of security services are available to each application server.

    Security Management Infrastructure Servers provide domain level and infrastructure level services to the components of the CryptoNET architecture. They are standard security servers, known as cloud security infrastructure, deployed as services in our domain level could environment.

    CryptoNET system is complete in terms of functions and security services that it provides. It is internally integrated, so that the same cryptographic engines are used by all applications. And finally, it is completely transparent to users – it applies its security services without expecting any special interventions by users. In this thesis, we developed and evaluated secure network applications of our CryptoNET system and applied Threat Model to their validation and analysis. We found that deductive scheme of using our generic security objects is effective for verification and testing of secure, protected and verifiable secure network applications.

    Based on all these theoretical research and practical development results, we believe that our CryptoNET system is completely and verifiably secure and, therefore, represents a significant contribution to the current state-of-the-art of computer network security.

    Download full text (pdf)
    FULLTEXT01
  • 24.
    Abbasi, Shirin
    et al.
    Islamic Azad University, Iran.
    Rahmani, Amir
    National Yunlin University of Science and Technology, Douliou, Taiwan.
    Balador, Ali
    RISE Research Institutes of Sweden, Digital Systems, Industrial Systems. Mälardalen University, Sweden.
    Sahafi, Amir
    Islamic Azad University, Iran.
    Internet of Vehicles: Architecture, services, and applications2021In: International Journal of Communication Systems, ISSN 1074-5351, E-ISSN 1099-1131, Vol. 34, no 10, article id e4793Article in journal (Refereed)
    Abstract [en]

    The connection between objects and information exchange has been possible in recent years, with the advent of the Internet of Things (IoT) in different industries. We can meet different requirements in each industry utilizing this feature. Intelligent transportation uses the Internet of Vehicles (IoV) as a solution for communication among vehicles. It improves traffic management applications and services to guarantee safety on roads. We categorize services, applications, and architectures and propose a taxonomy for IoV. Then, we study open issues and challenges for future works. We highlighted applications and services due to drivers' requirements and nonfunctional requirements, considering the qualitative characteristic. This paper summarizes the current state of the IoV in architectures, services, and applications. It can be a start view to provide the solutions for challenges in traffic management in cities. The present study is beneficial for smart city developments and management. According to this paper's result, the services and applications evaluate performance with 34% frequency, safety and data accuracy, and security with a 13% frequency in selected papers. These measurements are essential due to the IoV characteristics such as real-time operation, accident avoidance in applications, and complicated user data management. 

  • 25. Abd-Alrahman, Ahmed Mustafa
    et al.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Modelling Health Information during Catastrophic Events - A Disaster Management System for Sudan2017In: IST-Africa 2017: Conference Proceedings / [ed] Paul Cunningham, Miriam Cunningham, International Information Management Corporation Limited, 2017, p. 1-9Conference paper (Refereed)
    Abstract [en]

    There is an increasing trend of disastrous events during past decade with significant damage in terms of lives, infrastructure, economics and environment. Disastrous events are affecting communities worldwide and, apart for the actual and personal suffering involved, can fundamentally disrupt societal functions for many years. This is particularly the case in already vulnerable regions, which often require external assistance of various kinds. In order to reduce catastrophic effects of disasters, disaster mitigation measures and crisis reduction must be systematically planned and managed. This includes correct damage assessment, fast, efficient and prepared responses, adequate resource allocation and organisation of the relief processes. Obviously, the conditions and abilities to implement such measures are very different in various locations, where regions have particularly severe conditions. In this paper, we discuss crisis management in Sudan and highlight the need for national and regional disaster management processes and activities as well as general framework for the design of an efficient disaster management program in Sudan.

  • 26. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Comparing an e-Learning Reproductive Health Module with Traditional Lectures at a Medical School in Egypt2010In:  , 2010Conference paper (Other academic)
  • 27. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Exploring Knowledge, Attitudes and Behaviors of Medical Students Towards Using Computer Technology in Learning2010In:  , 2010Conference paper (Other academic)
  • 28.
    Abdel-Fattah, Dina
    et al.
    UiT – The Arctic University of Norway, Norway; University of Alaska Fairbanks, USA.
    Danielson, Mats
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Hock, Regine
    University of Alaska Fairbanks, USA; University of Oslo, Norway.
    Trainor, Sarah
    University of Alaska Fairbanks, USA.
    Application of a structured decision-making process in cryospheric hazard planning: Case study of Bering Glacier surges on local state planning in Alaska2024In: Journal of Multi-Criteria Decision Analysis, ISSN 1057-9214, E-ISSN 1099-1360, Vol. 31, no 1-2, article id e1825Article in journal (Refereed)
    Abstract [en]

    Surging glaciers are glaciers that experience rapidly accelerated glacier flow over a comparatively short period of time. Though relatively rare worldwide, Alaska is home to the largest number of surge-type glaciers globally. However, their impact on the broader socioecological system in the state is both poorly understood and under-researched, which poses a challenge in developing appropriate sustainability decisions in Alaska. We investigated how the surge patterns of the Bering Glacier in Alaska have potentially devastating effects on the local ecological biodiversity of its watershed via a structured decision-making analysis of the different possible consequences. Specifically, this analysis was conducted to explore the various outcomes of a Bering Glacier surge particularly if humans have an increased presence near the glacier due to the area potentially becoming a state park. This work explored the benefits of applying a risk and decision analytical framework in a cryosphere context, to better understand the socioeconomic impact of glacier surges. This is a novel approach in which a decision analysis tool was used to better understand an environmental sustainability challenge, offering an innovative method to support the achievement of the United Nations Sustainability Development Goals in Alaska. We therefore emphasise the need for integrated biophysical and socioeconomic analyses when it comes to understanding glacier hazards. Our research highlights the importance of understanding and researching biophysical changes as well as using a structured decision-making process for complicated hazard planning scenarios, exemplified via glaciated regions in Alaska, in order to create adaptation strategies that are sustainable and encompass the range of possible outcomes.

  • 29.
    Abelli, Björn
    University of Borås, School of Business and IT.
    Directing and Enacting the Information System2007In: Advances in Information Systems Development - New Methods and Practice for the Networked Society. / [ed] W Wojtkowski, W. G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US , 2007, p. 13-23Chapter in book (Other academic)
  • 30.
    Abelli, Björn
    Mälardalen University, School of Business.
    Directing and Enacting the Information System2007In: Advances in Information Systems Development: New Methods and Practice for the Networked Society, Volume 2, Issue PART 2, 2007, p. 13-23Conference paper (Refereed)
  • 31.
    Abelli, Björn
    Mälardalen University, School of Business.
    Enacting the e-Society2006In: Proceedings of the IADIS International Conference e-Society 2006, 2006, p. 285-298Conference paper (Refereed)
  • 32.
    Abelli, Björn
    University of Borås, School of Business and IT.
    On Stage! Playwriting, Directing and Enacting the Informing Processes2007Doctoral thesis, monograph (Other academic)
  • 33.
    Abelli, Björn
    et al.
    Mälardalen University, School of Business.
    Révay, Péter
    Mälardalen University, School of Business.
    To Be or Not To Be Computer Based2004In: Proceedings of microCAD 2004, 2004, p. 1-8Conference paper (Refereed)
  • 34. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Tweens konstruerar identitet online – flickors och pojkars erfarenheter av sociala medier2013In: Pedagogisk forskning i Sverige, ISSN 1401-6788, E-ISSN 2001-3345, Vol. 18, no 1-2Article in journal (Refereed)
  • 35. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Tweens negotiating identity online – Swedish girls' and boys' reflections on online experiences2013In: Journal of Youth Studies, ISSN 1367-6261, E-ISSN 1469-9680, Vol. 16, no 8, p. 951-969Article in journal (Refereed)
    Abstract [en]

    How do Swedish tweens (10–14 years old) understand and experience the writing of their online identities? How are such intertwined identity markers as gender and age expressed and negotiated? To find some answers to these questions, participants in this study were asked to write a story about the use of online web communities on pre-prepared paper roundels with buzzwords in the margins to inspire them. Content analysis of these texts using the constant comparative method showed that the main factors determining how online communities are understood and used are the cultural age and gender of the user. Both girls and boys chat online, but girls more often create blogs while boys more often play games. Gender was increasingly emphasised with age; but whereas boys aged 14 described themselves as sexually active and even users of pornography, girls of the same age described themselves as shocked and repelled by pornography and fearful of sexual threats. In this investigation an intersectionalist frame of reference is used to elucidate the intertwined power differentials and identity markers of the users' peer group situation.

  • 36. Abrahamsson, Emil
    et al.
    Forni, Timothy
    Skeppstedt, Maria
    Kvist, Maria
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Medical text simplification using synonym replacement: adapting assessment of word difficulty to a compounding language2014In: Proceedings of the 3rdWorkshop on Predicting andImproving Text Readability for Target Reader Populations(PITR) / [ed] Sandra Williams, Stroudsburg: Association for Computational Linguistics , 2014, p. 57-65Conference paper (Refereed)
  • 37.
    Abrahão, Silvia
    et al.
    Universitat Politècnica de València, ESP.
    Mendez, Daniel
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Message from the Artifact Evaluation Chairs of ICSE 20212021In: Proceedings - International Conference on Software Engineering, IEEE Computer Society , 2021Conference paper (Other academic)
  • 38. Abrams, M. B.
    et al.
    Bjaalie, J. G.
    Das, S.
    Egan, G. F.
    Ghosh, S. S.
    Goscinski, W. J.
    Grethe, J. S.
    Hellgren Kotaleski, Jeanette
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Computational Science and Technology (CST).
    Ho, E. T. W.
    Kennedy, D. N.
    Lanyon, L. J.
    Leergaard, T. B.
    Mayberg, H. S.
    Milanesi, L.
    Mouček, R.
    Poline, J. B.
    Roy, P. K.
    Strother, S. C.
    Tang, T. B.
    Tiesinga, P.
    Wachtler, T.
    Wójcik, D. K.
    Martone, M. E.
    A Standards Organization for Open and FAIR Neuroscience: the International Neuroinformatics Coordinating Facility2021In: Neuroinformatics, ISSN 1539-2791, E-ISSN 1559-0089Article in journal (Refereed)
    Abstract [en]

    There is great need for coordination around standards and best practices in neuroscience to support efforts to make neuroscience a data-centric discipline. Major brain initiatives launched around the world are poised to generate huge stores of neuroscience data. At the same time, neuroscience, like many domains in biomedicine, is confronting the issues of transparency, rigor, and reproducibility. Widely used, validated standards and best practices are key to addressing the challenges in both big and small data science, as they are essential for integrating diverse data and for developing a robust, effective, and sustainable infrastructure to support open and reproducible neuroscience. However, developing community standards and gaining their adoption is difficult. The current landscape is characterized both by a lack of robust, validated standards and a plethora of overlapping, underdeveloped, untested and underutilized standards and best practices. The International Neuroinformatics Coordinating Facility (INCF), an independent organization dedicated to promoting data sharing through the coordination of infrastructure and standards, has recently implemented a formal procedure for evaluating and endorsing community standards and best practices in support of the FAIR principles. By formally serving as a standards organization dedicated to open and FAIR neuroscience, INCF helps evaluate, promulgate, and coordinate standards and best practices across neuroscience. Here, we provide an overview of the process and discuss how neuroscience can benefit from having a dedicated standards body.

  • 39.
    Abu Khousa, Eman
    et al.
    UAE University, United Arab Emirates.
    Atif, Yacine
    UAE University, United Arab Emirates.
    Mohammad M., Masud
    UAE University, United Arab Emirates.
    A social learning analytics approach to cognitive apprenticeship2015In: Smart Learning Environments, ISSN 2196-7091, Vol. 2, no 14Article in journal (Refereed)
    Abstract [en]

    The need for graduates who are immediately prepared for employment has been widely advocated over the last decade to narrow the notorious gap between industry and higher education. Current instructional methods in formal higher education claim to deliver career-ready graduates, yet industry managers argue their imminent workforce needs are not completely met. From the candidates view, formal academic path is well defined through standard curricula, but their career path and supporting professional competencies are not confidently asserted. In this paper, we adopt a data analytics approach combined with contemporary social computing techniques to measure, instil, and track the development of professional competences of learners in higher education. We propose to augment higher-education systems with a virtual learning environment made-up of three major successive layers: (1) career readiness, to assert general professional dispositions, (2) career prediction to identify and nurture confidence in a targeted domain of employment, and (3) a career development process to raise the skills that are relevant to the predicted profession. We analyze self-declared career readiness data as well as standard individual learner profiles which include career interests and domain-related qualifications. Using these combinations of data sources, we categorize learners into Communities of Practice (CoPs), within which learners thrive collaboratively to build further their career readiness and assert their professional confidence. Towards these perspectives, we use a judicious clustering algorithm that utilizes a fuzzy-logic objective function which addresses issues pertaining to overlapping domains of career interests. Our proposed Fuzzy Pairwise-constraints K-Means (FCKM) algorithm is validated empirically using a two-dimensional synthetic dataset. The experimental results show improved performance of our clustering approach compared to baseline methods.

    Download full text (pdf)
    fulltext
  • 40.
    Acheampong, Faustina
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Vimarlund, Vivian
    Jönköping University, Jönköping International Business School, JIBS, Informatics. Jönköping University, Jönköping International Business School, JIBS, Centre for Information Technology and Information Systems (CenITIS).
    Business models for telemedicine services: A literature review2015In: Health Systems, ISSN 2047-6965, E-ISSN 2047-6973, Vol. 4, no 3, p. 189-203Article in journal (Refereed)
    Abstract [en]

    Telemedicine has been acknowledged to improve the quality of healthcare. However, many telemedicine services fail beyond the pilot phase. A literature review on business model components for telemedicine services was conducted. Based on specified inclusion criteria, 22 publications were included in the review. To facilitate the analysis of literature, a business model framework with value as its central focus was proposed. Improvement in quality, efficiency and accessibility of care were identified to be the outcomes of telemedicine, with patients and healthcare personnel being the main users of the services, which are delivered through home, institutional and community-based care. Patients, health providers, vendors, payers and government agencies are actors involved in the delivery of telemedicine services, which require investments in resources like videoconferencing technologies, home monitoring devices and other IT infrastructure. Subscriptions, reimbursements and pay-per-use revenue streams were identified as feasible for commercializing telemedicine services.

    Download full text (pdf)
    fulltext
  • 41.
    Acheampong, Faustina
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Vimarlund, Vivian
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Effects of a Home-based Monitoring Device on Innovation in Healthcare Delivery: A Pilot Study2013In: Information Systems and Technology for Organizations in a Networked Society / [ed] Tomayess Issa, Pedro Isaias and Piet Kommers, Hershey, PA, USA: IGI Global, 2013, p. 316-334Chapter in book (Refereed)
    Abstract [en]

    Information technology has been suggested to improve patient health outcomes and reduce the burden of care. In this study, we explored the effects of collaborative innovation between caregivers and patients on healthcare delivery as a consequence of the use of an IT-based device by patients with atrial fibrillation. Two cardiologists and two nurses were interviewed while questionnaires were mailed to 75 patients querying them about the use of a home-based ECG for remote monitoring. Findings indicated that the caregivers considered the device to enhance the quality of clinical decision-making. Patients found the device to be useful and felt more involved in their own care. However, the introduction of the device presented work overload for the caregivers. Thus, the facilitation of timely diagnostics and decision-making were not realized. IT is an enabler through which innovation in healthcare delivery can be realized, but it must be integrated into work practices to realize potential benefits.

  • 42.
    Achi, Abdelkader
    et al.
    Centre de Recherche en Informatique, Université Paris 1 Panthéon-Sorbonne, Paris, France.
    Salinesi, Camille
    Centre de Recherche en Informatique, Université Paris 1 Panthéon-Sorbonne, Paris, France.
    Viscusi, Gianluigi
    College of Management of Technology (CDM), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland.
    Information Systems for Innovation: A Comparative Analysis of Maturity Models’ Characteristics2016In: CAiSE 2016 International Workshops / [ed] John Krogstie, Haralambos Mouratidis, Jianwen Su, Cham: Springer International Publishing , 2016, Vol. 249, p. 78-90Conference paper (Other academic)
    Abstract [en]

    Nowadays, virtually all industries are impacted by the digitalization of business enabled by information and communication technologies. Consequently, it is a major challenge to any business to increase its ability to innovate through information systems. However the effort and the investments of companies are extremely varied, they do not have the same level of maturity with respect to their innovation strategy. While some highly mature use effective approaches, others still act as novices or use inadequate practices. The question raised in this paper is how to evaluate the level of maturity of an organization with respect to information systems based innovation. Also, the question concerns the identification of the salient features of ICT centred innovation maturity models. Taking these issues into account, the paper makes the following contributions: (i) a review of sixteen innovation maturity models collected from the research and the practitioners community, gathering facts about the models and about their effectiveness; (ii) a comparative analysis of these models.

  • 43.
    Adaba, Godfried Bakiyem
    et al.
    Birkbeck, University of London, , Department of Computer Science and Information Systems.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    E-trade Facilitation in Ghana: a Capability Approach Perspective2014In: The Electronic Journal of Information Systems in Developing Countries, E-ISSN 1681-4835, Vol. 63, no 5, p. 1-13Article in journal (Refereed)
  • 44. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    ICT-based trade facilitation and the MDGs: a case study of a public–private partnership in Ghana2014In: ICTs and the Millennium Development Goals: a United Nations Perspective, Springer, 2014, no 2013, p. 223-235Chapter in book (Other academic)
    Abstract [en]

    The strategic and innovative deployment and use of information and communication technologies (ICT) is important to development and the attainment of the millennium development goals (MDGs). Previous studies have suggested that ICT-based trade facilitation promotes development through better integration into global markets. Through an interpretive case study, this chapter explores an ICTbased initiative to connect members of the trading community in Ghana on an electronic data interchange (EDI) platform. More specifi cally, it explored the contributions of the initiative to effi cient trade facilitation and discusses the broader mplications for achieving the MDGs in Ghana. The research confi rms that the initiative has improved operational effi ciency at Ghana’s ports and borders. Furthermore, it has enabled effi cient and reliable collection of duties and taxes. The findings reinforce the view that government support and private sector expertise and funding are important factors in ICT-based e-government solutions in developing countries. The chapter contends that ICT-based trade facilitation can make a significant contribution to the attainment of the MDGs in Ghana.

  • 45. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    IT Governance Practices in a Public Organization in Ghana2014In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, E-ISSN 1947-8313, Vol. 5, no 2, p. 14-23Article in journal (Refereed)
    Abstract [en]

    The strategic importance of information technology (IT) in today's organizations and dependence on IT to support e-government strategies has increased the interest in IT Governance (ITG) in public sector organizations. From this perspective, this paper examines ITG practices in a public organization in Ghana (that has a responsibility to mobilize revenue for national development) in order to gain an insight into IT governance structures, processes and relational mechanisms and understand how this contributes to adding value through IT. The findings have revealed that this public organization has a centralized approach to IT governance, with inadequate board involvement concerning how IT investments can bring value and improve organizational performance. Furthermore, there are no IT steering and strategy committees to oversee IT governance as best practice requires.

  • 46.
    Adaba, Godfried Bakiyem
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    El Mekawy, Mohamed Sobih Aly
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Business-IT Alignment in Trade Facilitation: A Case Study2010In: Organizational, Business, and Technological Aspects of the Knowledge Society / [ed] Lytras, M.D.; Ordonez De Pablos, P.; Ziderman, A.; Roulstone, A.; Maurer, H.; Imber, J.B., Berlin Heidelberg: Springer-Verlag , 2010, Vol. 112, p. 146-Conference paper (Other academic)
    Abstract [en]

    In the information age, no organization can thrive without harnessing the power of IT. The effective deployment of IT to achieve business goals and gain competitive advantage requires the alignment of business and IT strategies of organizations. Using the Strategic Alignment Maturity model, this paper evaluates strategic alignment maturity of Customs Excise Preventive service, a frontline public organization charged with trade facilitation in Ghana. Strategic alignment maturity is at level 3; which implies the existence of an established process to leverage IT for efficiency and effectiveness. Efforts are required to strengthen alignment and fully harness the potential of IT to facilitate trade in Ghana.

  • 47.
    Adisa, Femi
    et al.
    Department of IT & Management, Copenhagen Business School, Frederiksberg, Denmark.
    Rose, Jeremy
    Department of Computer Science, Aalborg University, Aalborg, Denmark.
    The mediating role of absorptive capacity in knowledge transfer: ERP implementations in small and medium sized enterprises in sub-Saharan Africa2013In: International Journal of Enterprise Information Systems, ISSN 1548-1115, E-ISSN 1548-1123, Vol. 9, no 2, p. 1-19Article in journal (Refereed)
    Abstract [en]

    Knowledge transfer between consultants and organizational users influences the outcomes of an Enterprise Resource System (ERP) implementation. Configuration and implementation tasks are dependent on generating some level of shared understanding of both business practices and technology. These problems become acute in implementations in small and medium sized enterprises (SMEs). SMEs often operate with non-standard business processes, making an effective interchange of process knowledge between consultants and end-users crucial. Using a multiple case study method and content analysis, the authors investigate the mediating role of absorptive capacity in knowledge transfer in SMEs ERP implementations. They present exploratory case studies from 3 Nigerian companies with varying outcomes, and hypothesize that knowledge transfer is complicated by acute information asymmetry, absence of pre-existing related knowledge and consequent difficulties in developing a shared understanding, and by a tendency to operate with lone consultants and lone organizational representatives.

  • 48.
    Afzaal, Muhammad
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Zia, Aayesha
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Department of Informatics, Austria.
    Nouri, Jalal
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Informative Feedback and Explainable AI-Based Recommendations to Support Students' Self-regulation2024In: Technology, Knowledge and Learning, ISSN 2211-1662, E-ISSN 2211-1670, Vol. 29, no 1, p. 331-354Article in journal (Refereed)
    Abstract [en]

    Self-regulated learning is an essential skill that can help students plan, monitor, and reflect on their learning in order to achieve their learning goals. However, in situations where there is a lack of effective feedback and recommendations, it becomes challenging for students to self-regulate their learning. In this paper, we propose an explainable AI-based approach to provide automatic and intelligent feedback and recommendations that can support the self-regulation of students' learning in a data-driven manner, with the aim of improving their performance on their courses. Prior studies have predicted students' performance and have used these predicted outcomes as feedback, without explaining the reasons behind the predictions. Our proposed approach is based on an algorithm that explains the root causes behind a decline in student performance, and generates data-driven recommendations for taking appropriate actions. The proposed approach was implemented in the form of a dashboard to support self-regulation by students on a university course, and was evaluated to determine its effects on the students' academic performance. The results revealed that the dashboard significantly enhanced students' learning achievements and improved their self-regulated learning skills. Furthermore, it was found that the recommendations generated by the proposed approach positively affected students' performance and assisted them in self-regulation

  • 49.
    Agbo, Friday Joseph
    et al.
    School of Computing, University of Eastern Finland, P.O. Box 111, FIN-80101, Joensuu, Finland.
    Oyelere, Solomon Sunday
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Suhonen, Jarkko
    School of Computing, University of Eastern Finland, P.O. Box 111, FIN-80101, Joensuu, Finland.
    Laine, Teemu H.
    Department of Digital Media, Ajou University, 16499, Suwon, Republic of Korea.
    Co-design of mini games for learning computational thinking in an online environment2021In: Education and Information Technologies: Official Journal of the IFIP technical committee on Education, ISSN 1360-2357, E-ISSN 1573-7608, Vol. 26, no 5, p. 5815-5849Article in journal (Refereed)
    Abstract [en]

    Understanding the principles of computational thinking (CT), e.g., problem abstraction, decomposition, and recursion, is vital for computer science (CS) students. Unfortunately, these concepts can be difficult for novice students to understand. One way students can develop CT skills is to involve them in the design of an application to teach CT. This study focuses on co-designing mini games to support teaching and learning CT principles and concepts in an online environment. Online co-design (OCD) of mini games enhances students’ understanding of problem-solving through a rigorous process of designing contextual educational games to aid their own learning. Given the current COVID-19 pandemic, where face-to-face co-designing between researchers and stakeholders could be difficult, OCD is a suitable option. CS students in a Nigerian higher education institution were recruited to co-design mini games with researchers. Mixed research methods comprising qualitative and quantitative strategies were employed in this study. Findings show that the participants gained relevant knowledge, for example, how to (i) create game scenarios and game elements related to CT, (ii) connect contextual storyline to mini games, (iii) collaborate in a group to create contextual low-fidelity mini game prototypes, and (iv) peer review each other’s mini game concepts. In addition, students were motivated toward designing educational mini games in their future studies. This study also demonstrates how to conduct OCD with students, presents lesson learned, and provides recommendations based on the authors’ experience.

    Download full text (pdf)
    fulltext
  • 50.
    Agbo, Friday Joseph
    et al.
    School of Computing, University of Eastern Finland, Joensuu, Finland.
    Oyelere, Solomon Sunday
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Suhonen, Jarkko
    School of Computing, University of Eastern Finland, Joensuu, Finland.
    Tukiainen, Markku
    School of Computing, University of Eastern Finland, Joensuu, Finland.
    iThinkSmart: Immersive Virtual Reality Mini Games to Facilitate Students’ Computational Thinking Skills2021In: Koli Calling '21: 21st Koli Calling International Conference on Computing Education Research / [ed] Otto Seppälä; Andrew Petersen, Association for Computing Machinery , 2021, article id 33Conference paper (Refereed)
    Abstract [en]

    This paper presents iThinkSmart, an immersive virtual reality-based application to facilitate the learning of computational thinking (CT) concepts. The tool was developed to supplement the traditional teaching and learning of CT by integrating three virtual mini games, namely, River Crossing, Tower of Hanoi, and Mount Patti treasure hunt, to foster immersion, interaction, engagement, and personalization for an enhanced learning experience. iThinkSmart mini games can be played on a smartphone with a Goggle Cardboard and hand controller. This first prototype of the game accesses players' competency of CT and renders feedback based on learning progress.  

     

1234567 1 - 50 of 7133
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf