Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 7199
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    A. Molnar, Wolfgang
    et al.
    Public Research Centre Henri Tudor, , .
    A. Proper, HenderikPublic Research Centre Henri Tudor, , .Zdravkovic, JelenaStockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.Loucopoulos, PericleUniversity of Manchester, , .Pastor, OscarUniversitat Politècnica de València, , Centro de Investigación PROS.de Kinderen, SybrenUniversity of Luxembourg, , .
    CBI Workshops: TEE and CoBI: The 8th Workshop on Transformation & Engineering of Enterprises (TEE 2014) The 1st International Workshop on Capability-oriented Business Informatics (CoBI 2014) 2014Proceedings (redaktörskap) (Övrig (populärvetenskap, debatt, mm))
  • 2.
    Aasi, Parisa
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
  • 3.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Nunes, Ivan
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hodosi, Georg
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015Ingår i: Proceedings of the 48th Annual Hawaii International Conference on System Sciences (HICSS-48), IEEE Computer Society, 2015, 4691-4699 s.Konferensbidrag (Refereegranskat)
  • 4.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Nunes, Ivan
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hodosi, Georg
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The impact of different organizational cultures on IT outsourcing relationship management2013Ingår i: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, nr 2, 50-66 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 5.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Facing The Digitalization Challenge: Why Organizational Culture Matters and How It Influences IT Governance Performance2017Ingår i: Information Systems Development: Advances in Methods, Tools and Management: Proceedings / [ed] N. Paspallis, M. Raspopoulos, C. Barry, M. Lang, H. Linger, C. Schneider, Association for Information Systems, 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Today it is not possible for the companies to compete without having IT as a strategic driver. That is why IT governance becomes crucial for managers to bring the most value from IT to the business. Additionally organizational culture is an important factor and often blamed when IT governance projects fail. However little in-depth research investigated how the organizational culture changes can improve the IT governance performance. This research is a case study of the IT department of a large company attempting to improve the IT governance while facing the digitalization challenge. In this case the IT department has an organizational culture change journey seeking to improve the IT governance performance. The results indicate that the initial clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore, adhocracy is identified as preferred culture for improving IT governance for growth.

  • 6.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Culture Influence on IT Governance: What We Have Learned?2014Ingår i: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, 34-49 s.Artikel i tidskrift (Refereegranskat)
  • 7.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Influence of Culture on IT Governance: A Literature Review2014Ingår i: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, 4436-4445 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 8.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016Ingår i: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui, Ralph H. Sprague, Jr., IEEE Computer Society, 2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 9.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Han, Shengnan
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Role of Culture in IT Governance2014Ingår i: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Konferensbidrag (Refereegranskat)
  • 10.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017Ingår i: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, nr 0, 229-252 s.Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 11.
    Aasi, Parisa
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2017Ingår i: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 8, nr 2Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance's five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 12.
    Abbas, Asad
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Faiz, Ali
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Reasons for the failure of government IT projects in Pakistan: A Contemporary Study2013Självständigt arbete på avancerad nivå (masterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 13.
    Abbas, Asad
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Faiz, Ali
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Usefulness of Digital and Traditional Library in Higher Education2012Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 14.
    Abbas, Haider
    et al.
    KTH, School of ICT, Electronic Systems.
    Magnusson, Christer
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Yngström, Louise
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hemani, Ahmed
    ICT/Materialfysik.
    Addressing Dynamic Issues in Information Security Management2011Ingår i: Information Management & Computer Security, ISSN 0968-5227, Vol. 19, nr 1, 5-24 s.Artikel i tidskrift (Refereegranskat)
    Abstract [sv]

    Ett ramverk för behandling av osäkerhet inom ledningssystem för informationssäkerhet presenteras. Ramverket baseras på teorier från corporate finance. En fallstudie visar hur ramverket kan appliceras.

  • 15. Abbas, Haider
    et al.
    Magnusson, Christer
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Yngström, Louise
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Hemani, Ahmed
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010Ingår i: International Journal of computer Science and Information Security, ISSN 1947-5500, Vol. 8, nr 3, 59-67 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Information technology evolves at a faster pace giving organizations a limited scope to comprehend and effectively react to steady flux nature of its progress. Consequently the rapid technological progression raises various concerns for the IT system of an organization i.e. existing hardware/software obsoleteness, uncertain system behavior, interoperability of various components/method, sudden changes in IT security requirements and expiration of security evaluations. These issues are continuous and critical in their nature that create uncertainty in IT infrastructure and threaten the IT security measures of an organization. In this research, Options theory is devised to address uncertainty issues in IT security management and the concepts have been developed/validated through real cases on SHS (Spridnings-och-Hämtningssystem) and ESAM (E-society) systems. AUMSIS (Automated Uncertainty Management System in Information Security) is the ultimate objective of this research which provides an automated system for uncertainty management in information security. The paper presents the architectural description of AUMSIS, its various components, information flow, storage and information processing details using options valuation techniques. It also presents heterogeneous information retrieval problems and their solution. The architecture is validated with examples from SHS system

  • 16.
    Abbasi, Abdul Ghafoor
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    CryptoNET: Generic Security Framework for Cloud Computing Environments2011Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that

    -               our system is guaranteed to be secure,

    -               it is verifiable to provide the complete set of security services,

    -               we prove that it always functions correctly, and

    -               we justify our claim that it can not be compromised without user neglect and/or consent.

     

    We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security.

    In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate.

    At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications.

    Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then

    -               its software modules are not vulnerable to malware and viruses,

    -               its data are not vulnerable to illegal reading and theft,

    -               all messages exchanged in a networking environment are strongly protected, and

    -               all other resources of an application are also strongly protected.

     

    Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use.

    Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems.

    By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications.

    Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected.

    Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently.

    We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system.

    Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions.

    Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure Application Servers to client components are Single-Sign-On protocol, secure communication, and user authorization. In our system application servers are installed in a domain but it can be installed in a cloud environment as services. Secure Application Servers are designed and implemented using the concept and implementation of the Generic Security Server. It provides extended security functions using our engine components. So by adopting this approach, the same sets of security services are available to each application server.

    Security Management Infrastructure Servers provide domain level and infrastructure level services to the components of the CryptoNET architecture. They are standard security servers, known as cloud security infrastructure, deployed as services in our domain level could environment.

    CryptoNET system is complete in terms of functions and security services that it provides. It is internally integrated, so that the same cryptographic engines are used by all applications. And finally, it is completely transparent to users – it applies its security services without expecting any special interventions by users. In this thesis, we developed and evaluated secure network applications of our CryptoNET system and applied Threat Model to their validation and analysis. We found that deductive scheme of using our generic security objects is effective for verification and testing of secure, protected and verifiable secure network applications.

    Based on all these theoretical research and practical development results, we believe that our CryptoNET system is completely and verifiably secure and, therefore, represents a significant contribution to the current state-of-the-art of computer network security.

  • 17. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Comparing an e-Learning Reproductive Health Module with Traditional Lectures at a Medical School in Egypt2010Ingår i:  , 2010Konferensbidrag (Övrigt vetenskapligt)
  • 18. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Exploring Knowledge, Attitudes and Behaviors of Medical Students Towards Using Computer Technology in Learning2010Ingår i:  , 2010Konferensbidrag (Övrigt vetenskapligt)
  • 19.
    Abdulhomeed, Bashar
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Contemporary Research on e-democracy: A Literature Review2013Självständigt arbete på avancerad nivå (masterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 20.
    Abdullah Jan, Mirza
    et al.
    Linköpings universitet, Institutionen för systemteknik.
    Ahsan, Mahmododfateh
    Linköpings universitet, Institutionen för systemteknik.
    Multi-View Video Transmission over the Internet2010Självständigt arbete på avancerad nivå (masterexamen), 30 poäng / 45 hpStudentuppsats (Examensarbete)
    Abstract [en]

    3D television using multiple views rendering is receiving increasing interest. In this technology a number of video sequences are transmitted simultaneously and provides a larger view of the scene or stereoscopic viewing experience. With two views stereoscopic rendition is possible. Nowadays 3D displays are available that are capable of displaying several views simultaneously and the user is able to see different views by moving his head.

    The thesis work aims at implementing a demonstration system with a number of simultaneous views. The system will include two cameras, computers at both the transmitting and receiving end and a multi-view display. Besides setting up the hardware, the main task is to implement software so that the transmission can be done over an IP-network.

    This thesis report includes an overview and experiences of similar published systems, the implementation of real time video, its compression, encoding, and transmission over the internet with the help of socket programming and finally the multi-view display in 3D format.  This report also describes the design considerations more precisely regarding the video coding and network protocols.

  • 21.
    Abelli, Björn
    Högskolan i Borås, Institutionen Handels- och IT-högskolan.
    Directing and Enacting the Information System2007Ingår i: Advances in Information Systems Development - New Methods and Practice for the Networked Society. / [ed] W Wojtkowski, W. G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US , 2007, 13-23 s.Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 22.
    Abelli, Björn
    Mälardalens högskola, Ekonomihögskolan.
    Directing and Enacting the Information System2006Ingår i: Advances in Information Systems Development: New Methods and Practice for the Networked Society, Volume 2, Issue PART 2, 2006, 13-23 s.Konferensbidrag (Refereegranskat)
  • 23.
    Abelli, Björn
    Mälardalens högskola, Ekonomihögskolan.
    Enacting the e-Society2006Ingår i: Proceedings of the IADIS International Conference e-Society 2006, 2006, 285-298 s.Konferensbidrag (Refereegranskat)
  • 24.
    Abelli, Björn
    Högskolan i Borås, Institutionen Handels- och IT-högskolan.
    On Stage! Playwriting, Directing and Enacting the Informing Processes2007Doktorsavhandling, monografi (Övrigt vetenskapligt)
  • 25.
    Abelli, Björn
    et al.
    Mälardalens högskola, Ekonomihögskolan.
    Révay, Péter
    Mälardalens högskola, Ekonomihögskolan.
    To Be or Not To Be Computer Based2004Ingår i: Proceedings of microCAD 2004, 2004, 1-8 s.Konferensbidrag (Refereegranskat)
  • 26. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens konstruerar identitet online – flickors och pojkars erfarenheter av sociala medier2013Ingår i: Pedagogisk forskning i Sverige, ISSN 1401-6788, Vol. 18, nr 1-2Artikel i tidskrift (Refereegranskat)
  • 27. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Tweens negotiating identity online – Swedish girls' and boys' reflections on online experiences2013Ingår i: Journal of Youth Studies, ISSN 1367-6261, E-ISSN 1469-9680, Vol. 16, nr 8, 951-969 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    How do Swedish tweens (10–14 years old) understand and experience the writing of their online identities? How are such intertwined identity markers as gender and age expressed and negotiated? To find some answers to these questions, participants in this study were asked to write a story about the use of online web communities on pre-prepared paper roundels with buzzwords in the margins to inspire them. Content analysis of these texts using the constant comparative method showed that the main factors determining how online communities are understood and used are the cultural age and gender of the user. Both girls and boys chat online, but girls more often create blogs while boys more often play games. Gender was increasingly emphasised with age; but whereas boys aged 14 described themselves as sexually active and even users of pornography, girls of the same age described themselves as shocked and repelled by pornography and fearful of sexual threats. In this investigation an intersectionalist frame of reference is used to elucidate the intertwined power differentials and identity markers of the users' peer group situation.

  • 28. Abrahamsson, Emil
    et al.
    Forni, Timothy
    Skeppstedt, Maria
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Medical text simplification using synonym replacement: adapting assessment of word difficulty to a compounding language2014Ingår i: Proceedings of the 3rdWorkshop on Predicting andImproving Text Readability for Target Reader Populations(PITR) / [ed] Sandra Williams, Stroudsburg: Association for Computational Linguistics , 2014, 57-65 s.Konferensbidrag (Refereegranskat)
  • 29.
    Abrahamsson, Johan
    et al.
    Umeå universitet, Samhällsvetenskaplig fakultet, Informatik.
    Sjöberg, Robin
    Umeå universitet, Samhällsvetenskaplig fakultet, Informatik.
    E-tjänstutveckling ur ett medborgarperspektiv: Att skapa beslutsunderlag baserat på medborgarärendens lämplighet för olika kommunikationskanaler2009Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Citizens’ interaction with governments is an area with unique implications for channel management. Governments need to take the citizens perspective into further consideration in order to be successful in delivering high-quality e-services. This paper aims to determine if a categorization of citizen-initiated contacts from a citizen-centric perspective can be a valuable basis for decisions regarding e-service development. The study consisted of three steps. The first step was an examination of the existing related literature, which resulted in the uncovering of the most important aspects of citizens channel choice. The second step consisted of an elaboration of a classification based on perceived task characteristics and a subsequent matching of the categories to desirable channel characteristics. The third and final step consisted of an application of the proposed categorization on a content management system containing all citizen-initiated contacts in a Swedish municipality. The application indicated that the proposed categorization could possibly be used to guide investments in e-services towards a channel-appropriate direction.

  • 30.
    Abrahamsson, Jonas
    Högskolan i Skövde, Institutionen för datavetenskap.
    Metoder vid implementation av affärssystem: en studie om anpassning2001Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Dagens företag är i stort behov av information. Företag som har många avdelningar behöver möjligheter för att enkelt och smidigt kunna samordna information för hela företaget. Affärssystem erbjuder denna möjlighet genom en modulbaserad konstruktion som integrerar ett företags samtliga avdelningar i ett enda system. Problem kan dock uppstå då ett valt affärssystem inte passar företagets verksamhet. En kompromiss mellan system och verksamhet måste då försöka uppnås.

    Ett affärssystem implementeras ofta i samband med en metod, vilken ger detaljerade beskrivningar för hur implementeringen ska gå till. På vilka grunder väljer företagen att arbeta efter en specifik metod då system och verksamhet behöver anpassas till varandra?

    Detta arbete bygger på en undersökning som har utförts genom en survey där fem företag har medverkat. Resultatet av undersökningen visar ett antal metoder samt presenterar orsaker till varför dessa metoder används.

  • 31.
    Abrahamsson, Sofie
    et al.
    Södertörns högskola, Institutionen för kommunikation, medier och it.
    Eriksson, Emelie
    Södertörns högskola, Institutionen för kommunikation, medier och it.
    En utvärdering av synthesizern OP-1 utifrån ett användbarhetsperspektiv2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Denna rapport handlar om en användbarhetsutvärdering av synthesizern OP-1, utvecklad av företaget Teenage Engineering. Studien är kvalitativ och undersöker bara den omedelbara användarupplevelsen av produkten. Rapporten baseras på resultat från ett antal användbarhetstester, utförda på företaget i fråga. Användbarhetstesterna avser att undersöka hur en användare kan förstå hur OP-1:s kan användas och hur de kan förstår dess olika lägen och vidare på vilket sätt detta påverkar den initiala användarupplevelsen.

    Totalt nio av fjorton tillfrågade personer har ingått i användbarhetstesterna. Urvalsgruppen bestod av personer med tidigare, dock varierande mängd, erfarenhet av synthesizers. I den teoretiska referensramen förenas Jonas Löwgren och Erik Stoltermans brukskvalitetsteorier tillsammans med valda delar av Donald Normans ” Seven Stages of Actions as Design Aids”.

    Resultatet visar att användarna snabbt kommer igång med synthesizerns grundläggande funktioner. Samtliga användare tycker att OP-1 är estetiskt tilltalande, underhållande och uppskattar dess portabla format, med vilket de ser användningsområden i både resor och livesammanhang. Användarna anser också att de inte alltid måste förstå synthesizerns grafiska element, på display eller knappar, då detta tydliggörs efter användning av produkten. Användarna visar svårigheter med funktioner som pattern sequencer och viss redigering i tape. Vidare har de även ibland svårt att förstå i vilket mode som synthesizern befinner sig i.

    Samtliga användbarhetstester utfördes på en pre-betaversion av OP-1. Den slutgiltiga versionen av synthesizern har uppdaterats utefter resultaten från den här undersökningen.

     

  • 32.
    Abu Khousa, Eman
    et al.
    UAE University, United Arab Emirates.
    Atif, Yacine
    UAE University, United Arab Emirates.
    Mohammad M., Masud
    UAE University, United Arab Emirates.
    A social learning analytics approach to cognitive apprenticeship2015Ingår i: Smart Learning Environments, ISSN 2196-7091, Vol. 2, nr 14Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The need for graduates who are immediately prepared for employment has been widely advocated over the last decade to narrow the notorious gap between industry and higher education. Current instructional methods in formal higher education claim to deliver career-ready graduates, yet industry managers argue their imminent workforce needs are not completely met. From the candidates view, formal academic path is well defined through standard curricula, but their career path and supporting professional competencies are not confidently asserted. In this paper, we adopt a data analytics approach combined with contemporary social computing techniques to measure, instil, and track the development of professional competences of learners in higher education. We propose to augment higher-education systems with a virtual learning environment made-up of three major successive layers: (1) career readiness, to assert general professional dispositions, (2) career prediction to identify and nurture confidence in a targeted domain of employment, and (3) a career development process to raise the skills that are relevant to the predicted profession. We analyze self-declared career readiness data as well as standard individual learner profiles which include career interests and domain-related qualifications. Using these combinations of data sources, we categorize learners into Communities of Practice (CoPs), within which learners thrive collaboratively to build further their career readiness and assert their professional confidence. Towards these perspectives, we use a judicious clustering algorithm that utilizes a fuzzy-logic objective function which addresses issues pertaining to overlapping domains of career interests. Our proposed Fuzzy Pairwise-constraints K-Means (FCKM) algorithm is validated empirically using a two-dimensional synthetic dataset. The experimental results show improved performance of our clustering approach compared to baseline methods.

  • 33.
    Acheampong, Faustina
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Development of Web-based Health Care Services in Swedish County Councils: Strategies, Usage and Challenges2010Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    eHealth has been adopted by many countries across the globe in response to cut down cost and improve the quality of life. Sweden has been engaged in providing web-based health care services for its citizens for the past decade and county councils have the responsibility to develop them. The main aim of this thesis is to present answers to the following research questions:What strategies (formal and informal) guide the development of web-based health care services provided by the Swedish county councils?What barriers exist in relation to the development and usage of web-based health care services provided by the county councils from the viewpoint of their IT leaders?From the perspective of IT leaders in the county councils and in their capacity to develop, manage and monitor their organizations‘ website content, which web-based health care services are mostly accessed by users and what age group utilize the services most?The thesis is an exploratory research conducted through a survey based on a mail questionnaire that was posted to all 21 county councils in Sweden with 18 councils responding. The results show that all county councils have formally adopted the National eHealth Strategy to guide the development of web-based health care services and some have other informal strategies as well. Technological barriers, resistance to use the web-based services and changing business process to integrate ICTs have been identified by IT leaders as major challenges that impede the development of web-based health care services in Swedish county councils. Swedish citizens more frequently access prescription renewal and booking and cancellation of appointments than other available web-based health care services which depicts a trend towards the use of advanced interactive services than basic information seeking, and people in the ages of 46 to 55 have been identified as the frequent users of web-based health care services according to IT leaders from the county councils.

  • 34.
    Acheampong, Faustina
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Vimarlund, Vivian
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik. Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Centre for Information Technology and Information Systems (CenITIS).
    Business models for telemedicine services: A literature review2015Ingår i: Health Systems, ISSN 2047-6965, E-ISSN 2047-6973, Vol. 4, nr 3, 189-203 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Telemedicine has been acknowledged to improve the quality of healthcare. However, many telemedicine services fail beyond the pilot phase. A literature review on business model components for telemedicine services was conducted. Based on specified inclusion criteria, 22 publications were included in the review. To facilitate the analysis of literature, a business model framework with value as its central focus was proposed. Improvement in quality, efficiency and accessibility of care were identified to be the outcomes of telemedicine, with patients and healthcare personnel being the main users of the services, which are delivered through home, institutional and community-based care. Patients, health providers, vendors, payers and government agencies are actors involved in the delivery of telemedicine services, which require investments in resources like videoconferencing technologies, home monitoring devices and other IT infrastructure. Subscriptions, reimbursements and pay-per-use revenue streams were identified as feasible for commercializing telemedicine services.

  • 35.
    Acheampong, Faustina
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Vimarlund, Vivian
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Effects of a Home-based Monitoring Device on Innovation in Healthcare Delivery: A Pilot Study2013Ingår i: Information Systems and Technology for Organizations in a Networked Society / [ed] Tomayess Issa, Pedro Isaias and Piet Kommers, Hershey, PA, USA: IGI Global, 2013, 316-334 s.Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Information technology has been suggested to improve patient health outcomes and reduce the burden of care. In this study, we explored the effects of collaborative innovation between caregivers and patients on healthcare delivery as a consequence of the use of an IT-based device by patients with atrial fibrillation. Two cardiologists and two nurses were interviewed while questionnaires were mailed to 75 patients querying them about the use of a home-based ECG for remote monitoring. Findings indicated that the caregivers considered the device to enhance the quality of clinical decision-making. Patients found the device to be useful and felt more involved in their own care. However, the introduction of the device presented work overload for the caregivers. Thus, the facilitation of timely diagnostics and decision-making were not realized. IT is an enabler through which innovation in healthcare delivery can be realized, but it must be integrated into work practices to realize potential benefits.

  • 36.
    Ackfjärd, Rickard
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Karlsson, Mattias
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Förslag till ett nytt ramverk för utvärdering och utveckling av ARP-poisoning-skydd2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 37.
    Adaba, Godfried Bakiyem
    et al.
    Birkbeck, University of London, , Department of Computer Science and Information Systems.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    E-trade Facilitation in Ghana: a Capability Approach Perspective2014Ingår i: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, Vol. 63, nr 5, 1-13 s.Artikel i tidskrift (Refereegranskat)
  • 38. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    ICT-based trade facilitation and the MDGs: a case study of a public–private partnership in Ghana2014Ingår i: ICTs and the Millennium Development Goals: a United Nations Perspective, Springer, 2014, nr 2013, 223-235 s.Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    The strategic and innovative deployment and use of information and communication technologies (ICT) is important to development and the attainment of the millennium development goals (MDGs). Previous studies have suggested that ICT-based trade facilitation promotes development through better integration into global markets. Through an interpretive case study, this chapter explores an ICTbased initiative to connect members of the trading community in Ghana on an electronic data interchange (EDI) platform. More specifi cally, it explored the contributions of the initiative to effi cient trade facilitation and discusses the broader mplications for achieving the MDGs in Ghana. The research confi rms that the initiative has improved operational effi ciency at Ghana’s ports and borders. Furthermore, it has enabled effi cient and reliable collection of duties and taxes. The findings reinforce the view that government support and private sector expertise and funding are important factors in ICT-based e-government solutions in developing countries. The chapter contends that ICT-based trade facilitation can make a significant contribution to the attainment of the MDGs in Ghana.

  • 39. Adaba, Godfried Bakiyem
    et al.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    IT Governance Practices in a Public Organization in Ghana2014Ingår i: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, E-ISSN 1947-8313, Vol. 5, nr 2, 14-23 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The strategic importance of information technology (IT) in today's organizations and dependence on IT to support e-government strategies has increased the interest in IT Governance (ITG) in public sector organizations. From this perspective, this paper examines ITG practices in a public organization in Ghana (that has a responsibility to mobilize revenue for national development) in order to gain an insight into IT governance structures, processes and relational mechanisms and understand how this contributes to adding value through IT. The findings have revealed that this public organization has a centralized approach to IT governance, with inadequate board involvement concerning how IT investments can bring value and improve organizational performance. Furthermore, there are no IT steering and strategy committees to oversee IT governance as best practice requires.

  • 40.
    Adaba, Godfried Bakiyem
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rusu, Lazar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    El Mekawy, Mohamed Sobih Aly
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Business-IT Alignment in Trade Facilitation: A Case Study2010Ingår i: Organizational, Business, and Technological Aspects of the Knowledge Society / [ed] Lytras, M.D.; Ordonez De Pablos, P.; Ziderman, A.; Roulstone, A.; Maurer, H.; Imber, J.B., Berlin Heidelberg: Springer-Verlag , 2010, Vol. 112, 146- s.Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    In the information age, no organization can thrive without harnessing the power of IT. The effective deployment of IT to achieve business goals and gain competitive advantage requires the alignment of business and IT strategies of organizations. Using the Strategic Alignment Maturity model, this paper evaluates strategic alignment maturity of Customs Excise Preventive service, a frontline public organization charged with trade facilitation in Ghana. Strategic alignment maturity is at level 3; which implies the existence of an established process to leverage IT for efficiency and effectiveness. Efforts are required to strengthen alignment and fully harness the potential of IT to facilitate trade in Ghana.

  • 41.
    Adamou, Sofia
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Ntoka, Lamprini
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    The impact of Digital Technologies on Academic Libraries: a study in Greece2017Självständigt arbete på avancerad nivå (masterexamen), 80 poäng / 120 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Purpose: This study explores both library users’ and librarians’ experiences, benefits, and challenges depending on the implementation of digital technologies in academic libraries. The research has been taken place in two Greek academic libraries; In the Panteion University Library and in the Central Library of T.E.I. of Athens.Approach: Two research questions were developed for this research to be conducted and a sample size of 55 respondents (39 library users and 16 librarians) of the Panteion University Library and Central Library of T.E.I. of Athens, was evaluated.Findings: From the findings of the study, it was concluded that the general perception of both library users and librarians towards digital material and E-resources and services of the Panteion University Library and Central Library of T.E.I. of Athens, is satisfactory. Library users were satisfied with the convenience of digital material, the availability of E-resources provided by both academic libraries such as World Wide Web, WIFI, and online databases. They were not satisfied with library technology (i.e., computers) and library staff. Besides, results showed that services such as e-mail and Open Public Access Catalogue were used more often. Librarians were less satisfied with the digital library system, the limited personnel, and the financial funds for academic libraries in general.Implication: The results of this research have implications in the stakeholders of an academic library including the institutional management, the library administration, the librarians, the library users, the researchers, the community at large, and others.Value: This paper identifies critical issues related to the utilization of digital technologies and digital material; their benefits and challenges faced by librarians and library users as well as their effective operation from academic libraries in this information age.

  • 42.
    Adamsson, Tim
    Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Handelshögskolan.
    Kravrekommendation: En undersökning för kravrekommendationer för Nya Intranätets forum på Karlstad Universitet2014Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 43.
    Adisa, Femi
    et al.
    Department of IT & Management, Copenhagen Business School, Frederiksberg, Denmark.
    Rose, Jeremy
    Department of Computer Science, Aalborg University, Aalborg, Denmark.
    The mediating role of absorptive capacity in knowledge transfer: ERP implementations in small and medium sized enterprises in sub-Saharan Africa2013Ingår i: International Journal of Enterprise Information Systems, ISSN 1548-1115, Vol. 9, nr 2, 1-19 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Knowledge transfer between consultants and organizational users influences the outcomes of an Enterprise Resource System (ERP) implementation. Configuration and implementation tasks are dependent on generating some level of shared understanding of both business practices and technology. These problems become acute in implementations in small and medium sized enterprises (SMEs). SMEs often operate with non-standard business processes, making an effective interchange of process knowledge between consultants and end-users crucial. Using a multiple case study method and content analysis, the authors investigate the mediating role of absorptive capacity in knowledge transfer in SMEs ERP implementations. They present exploratory case studies from 3 Nigerian companies with varying outcomes, and hypothesize that knowledge transfer is complicated by acute information asymmetry, absence of pre-existing related knowledge and consequent difficulties in developing a shared understanding, and by a tendency to operate with lone consultants and lone organizational representatives.

  • 44.
    Adler, Robert
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Eriksson, Andreas
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Visuella Effekter Inom Genrespecifik Musikvideoproduktion2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Today almost every artist has a music video. With today’s technology it has become a lot easier for smaller companies or amateur filmers to produce and distribute their work. But how important is an artist’s music video and where do people find their music these days? Other questions we wanted to answer were if there is a typical way a music video looks like based on its genre. And is it possible to break these stereotypical ways of producing music videos and thereby create a higher level of enjoyment from the viewer? Our main idea of achieving this was by the use of visual effects in a genre, which in our opinion usually don’t showcase these types of effects. The genre we decided to work with was singer/songwriter, which we think is one genre that doesn’t typically use visual effects. To back up our opinions we studied a lot of music videos from different genres to really see what was typical for each of them. Furthermore we made a survey to find answers for our questions about people’s views on the importance of a well-made music video and where they watch and find them. After we had found some of our answers we produced a music video, one with, and one without visual effects. We then showed these to a number of people and asked them questions about their opinions. Based on our results from studying different music videos and the surveys we came up with a conclusion. And we can say that using visual effects in a genre were they typically aren’t used is possible and it can enhance a viewers enjoyment of the music video. Although we also found out that it should be done with moderation and in good relations with the specific genre.

  • 45.
    Adolfsson, Elin
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Sociala medier för att hantera kundkontakter2012Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    KONTEXT. I takt med att Internets framväxt och fler och fler människor ansluter sig till sociala medieplattformar som Facebook, uppkommer nya sätt att interagera och kommunicera mellan varandra. Samtidigt ökar antalet organisationer och företag, som i sin tur måste hitta nya vägar för att deras marknadsföring ska sticka ut och bli uppfattad. För att nå ut till målgruppen med budskap, måste organisationen vara där målgruppen är. Därför har Facebook blivit en ny del av företags marknadsföringsredskap. Denna studie är fokuserad på Malmö stadsbiblioteks användning av Facebook som ett kommunikationsverktyg i hanteringen av kundkontakter. MÅL. Syftet med denna magisteruppsats är att undersöka Malmö stadsbiblioteks användning av Facebook, med ett huvudsakligt fokus på undperception och kundens upplevelse av kommunikationen, för att utreda hur Malmö stadsbibliotek bör använda Facebook i marknadsföringssyfte. METOD. Denna studie är baserad på en empirisk undersökning innehållandes en innehållsanalys av Malmö stadsbiblioteks Facebooksida, och också en onlineenkät gjord på de som ”gillar” och följer Facebooksidan. RESULTAT. Resultatet av den empiriska studien visar att Malmö stadsbibliotek står inför en bred målgrupp där segmentering är nödvändigt för att skapa och sprida rätt budskap till den primära målgruppen. Malmö stadsbibliotek publicerar statusuppdateringar relativt jämnt fördelat på månadens dagar och det är möjligt att peka ut olika kategorier av uppdateringar med olika målgruppsresponser och upplevelser från följarna. Resultatet av studien presenteras som diagram och tabeller med beskrivningar för att förbättra illustrationen och därför öka förståelsen. SLUTSATS. Slutsatsen av denna magisteruppsats är att de flesta respondenterna är positiva inför Malmö stadsbiblioteks användning av Facebook. Baserat på diverse befintliga teorier är marknadsföring på sociala nätverk ett bra sätt att interagera, kommunicera och få feedback från kunder för att kunna bygga goda relationer med kunderna. Detta är någonting som är väldigt viktigt i nuläget när antalet företag och reklambruset är så högt som det är. Det finns ingen enkel väg till framgång, med enbart en korrekt väg. Det är beroende av varje specifik organisation och deras specifika primärmålgrupp.

  • 46.
    Adriansson, Eva
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Kommunal verksamhetsprocess efter införandet av en e-tjänst: Informationsflöde och informationshantering sett ur ett Lean-perspektiv2011Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Trots de svenska medborgarnas ökande krav på digital självservice via e-tjänster, går införande trögt hos kommunerna. En anledning är den relativt låga kunskap som finns i området. Främst vad gäller avancerade e-tjänster som förutom att öka medborgarnas tillgänglighet, insyn och delaktighet i sina offentliga ärenden, även ska minska den administrativa hanteringen för att istället låta mer av resurserna gå till kärnverksamheten. I den här kvalitativa fallstudien studerades hur en kommunal verksamhetsprocess utvecklas vid införandet av en e-tjänst. Hur slöseri kan identifieras i processen informationshantering och informationsflöde och hur dessa förändrats efter att e-tjänsten införts. Resultatet baserades på material från intervjuer och analyserades utifrån Leans kategorier av slöseri och teorin om Microsystem. Resultatet visade att slöseri som uppstår i informationshantering och informationsflöde mellan enheter eller microsystem kunde identifieras om alla microsystem kartlägger processen tillsammans. Mycket slöseri hade tagits bort i utvecklingsarbetet och lett till en smidigare och troligtvis mer effektiv process. Ett antagande men som även bekräftades av personalens upplevelser från testförsöken. Processutvecklingen tillsammans med e-tjänsten har säkerställt delar av processflödet där antalet informationsöverföringar blivit färre och på så sätt troligtvis även minskat risken för att missförstånd och felhantering ska uppstå av informationshanteringen.

  • 47.
    Afyounian, Ebrahim
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Information and Communication Technologies in Support of Remembering: A Postphenomenological Study2014Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This thesis aimed to study the everyday use of ICT-enabled memory aids in order to understand and to describe the technological mediations that are brought by them (i.e. how they shape/mediate experiences and actions of their users). To do this, a post-phenomenological approach was appropriated. Postphenomenology is a modified, hybrid phenomenology that tries to overcome the limitations of phenomenology. As for theoretical framework, ‘Technological Mediation’ was adopted to conduct the study. Technological Mediation as a theory provides concepts suitable for explorations of the phenomenon of human-technology relation.

    It was believed that this specific choice of approach and theoretical framework would provide a new way of exploring the use of concrete technologies in everyday life of human beings and the implications that this use might have on humans’ lives. The study was conducted in the city of Växjö, Sweden. Data was collected by conducting twelve face-to-face semi-structured interviews. Collected data was, then, analyzed by applying the concepts within the theoretical framework – Technological Mediation - to them.

    The results of this study provided a list of ICT-enabled devices and services that participants were using in their everyday life in order to support their memory such as: calendars, alarms, notes, bookmarks, etc. Furthermore, this study resulted in a detailed description of how these devices and services shaped/mediated the experiences and the actions of their users. 

  • 48.
    Aganovic, Deni
    et al.
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Åhrberg, Cecilia
    Linnéuniversitetet, Fakultetsnämnden för naturvetenskap och teknik, Institutionen för datavetenskap, fysik och matematik, DFM.
    Att fånga en oskuld: En undersökning kring ungdomars intresse för ekonomisk information online2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Att vid 18 års ålder tvingas ansvara för sina handlingar är för många ett stort steg, inte minst då en del av ansvaret är ekonomi. Ungdomarna vänder sig ofta till föräldrarna med frågor, men var ska de vända sig när föräldrarna inte har svaret? Bankerna har börjat söka sig lägre ner i åldrarna med sin marknadsföring för att fånga kunden innan denne blir myndig, men fortfarande är det många frågetecken kring informationen ungdomarna behöver.

    Uppdraget var att undersöka vad ungdomar behöver för information i en webbplats riktad mot ungdomar från banken. En undersökning genomfördes med en enkätundersökning med 100respondenter och tre olika fokusgrupper som genererade att ungdomarna känner att banker är alldeles för avlägsna. En minskad distans skulle medföra att ungdomarna lättare vänder sig till banken vid frågor kring sin ekonomi vilket i sin tur medför att deras intresse kring privatekonomiska frågor ökar.

    Designförslaget som presenteras fokuserar mycket på en funktion med textbaserad personlig service med co-browsingfunktioner som tillåter en bankman guida den unga kunden genom webbplatsen. Strävan är att ungdomarna ska känna en samhörighet till banken och lättare kan få alla typer av frågor besvarade då de var osäkra på vilken information de behöver. Om man inför en sådan tjänst bör användbarhetstest och utvärderingar på designförslaget genomföras för att kontrollera om distansen mellan bank och ungdom minskar.

  • 49.
    Agbamuche, Joy
    Mälardalens högskola, Akademin för hållbar samhälls- och teknikutveckling.
    How does the alignment of IT to business strategy affect the organisation of the IT function?2008Studentuppsats
    Abstract [en]

    Date: 2008-06-04

    Purpose: The primary goal of this research is to describe the IT function and examine how its alignment to an organisations strategy affects the way it is organised.

    Method: The chosen method was a purely theoretical examination with the use of the case study of Windham International as primary resource and secondary resources such as book and literature review used for the thesis.

    Research Questions: How does the alignment of IT to business strategy affect the organisation of the IT function?

    Conclusion: One of the findings was that a few researchers seem to suggest that the centralized mode of organising IT was symbolic of the past, while outsourcing and decentralization are the modern approach to organising IT. Wyndham International shows the opposite, after the introduction of the CIO in 2002, centralization was the chosen mode of organisation because that was what would best fit the new strategic approach of the organisation. Insourcing rather than outsourcing proved to be a winning formula.

  • 50.
    Aggestam, Lena
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    IT-supported Knowledge Repositories: Increasing their Usefulness by Supporting Knowledge Capture2008Doktorsavhandling, monografi (Övrigt vetenskapligt)
    Abstract [en]

    Organizations use various resources to achieve business objectives, and for financial gain. In modern business, knowledge is a critical resource, and organizations cannot afford not to manage it. Knowledge Management (KM) aims to support learning and to create value for the organization. Based on three levels of inquiry (why, what, how), work presented in this thesis includes a synthesized view of the existing body of knowledge concerning KM and hence a holistic characterization of KM. This characterization reveals a strong dependency between KM and Learning Organization (LO). Neither of them can be successful without the other. We show that a KM project resulting in an IT-supported knowledge repository is a suitable way to start when the intention is to initiate KM work. Thus, our research focuses on ITsupported knowledge repositories.

    Large numbers of KM projects fail, and organizations lack support for their KM undertakings. These are the main problems that our research addresses. In order for an IT-supported knowledge repository to be successful, it must be used. Thus, the content of the repository is critical for success. Our work reveals that the process of capturing new knowledge is critical if the knowledge repository is to include relevant and updated knowledge. With the purpose of supporting the capture process, this thesis provides a detailed characterization of the capture process as well as guidance aiming to facilitate the implementation of the capture process in such a way that knowledge is continuously captured, also after the KM implementation project is completed. We argue that the continuous capture of new knowledge which can potentially be stored in the knowledge repository will, in the long term perspective, have a positive influence on the usefulness of the repository. This will most likely increase the number of users of the repository and accordingly increase the number of successful KM projects.

    All the work presented in this thesis is the result of a qualitative research process comprising a literature review and an empirical study that were carried out in parallel. The empirical study is a case study inspired by action research, which involved participation in the project Efficient Knowledge Management and Learning in Knowledge Intensive Organizations (EKLär).

1234567 1 - 50 av 7199
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf