Endre søk
Begrens søket
1234567 51 - 100 of 3163
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 51.
    Al Sabbagh, Bilal
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kowalski, Stewart
    Norwegian University of Science and Technology, Norway.
    A Framework and Prototype for A Socio-Technical Security Information and Event Management System (ST-SIEM)2016Inngår i: 2016 European Intelligence and Security Informatics Conference: Proceedings / [ed] Joel Brynielsson, Fredrik Johansson, IEEE Computer Society, 2016, s. 192-195Konferansepaper (Fagfellevurdert)
    Abstract [en]

    In this short paper we present a socio-technical framework for integrating a security risk escalation maturity model into a security information and event management system. The objective of the framework is to develop the foundations for the next generation socio-technical security information and event management systems (ST-SIEMs) enabling socio-technical security operations centers (ST-SOCs). The primary benefit of the socio-technical framework is twofold: supporting organizations in overcoming the identified limitations in their security risk escalation maturity, and supporting SOCs in overcoming the limitations of their SIEMs. The risk escalation maturity level is quantified using metrics. These metrics are then used by SIEMs for cross correlating security events before they are disseminated to respective organizations. Typical SIEMs in use today calculate security events using generic risk factors not necessarily relevant for every organization. The proposed framework can enable security administrators to effectively and efficiently manage security warnings and to establish necessary countermeasures.

  • 52.
    Al Sabbagh, Bilal
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kowalski, Stewart
    Norwegian University of Science and Technology, Norway.
    Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response2017Inngår i: International Journal of Systems and Society, ISSN 2327-3984, Vol. 4, nr 2, artikkel-id 2Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations. ST-SIEM tackles this limitation by considering the socio-technical aspect of information systems security. This concept is achieved by correlating the technical metrics of security warnings (which are generic in nature, and the sources of which are sometimes unknown) with predefined social security metrics (used for modeling the security culture of constituent organizations). ST-SIEM, accordingly, adapts the risk factor of the triggered security warning based on each constituent organization security culture. Moreover, the artifact features several socio-technical taxonomies with an impact factor to support organizations in classifying, reporting, and escalating actionable security information. The overall project uses design science research as a framework to develop the artifact.

  • 53.
    Albonius, Jonas
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Hagbok, Monica
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för informatik och projektledning.
    Projektledning för kreativitet: En fallstudie om hur projektledare skapar förutsättningar för kreativitet i ett distansbaserat datorspelsutvecklingsprojekt2014Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Companies and projects often face the challenge of creating something new to increase their competitiveness. In this process of creating something new creativity is an important factor. By using a creative approach and utilizing creative processes new innovations emerges. An industry that has grown in recent years is the computer games industry. Competition is fierce and for the companies to succeed, the product need that extra something to make it stand out among all the produced games.

    The project manager's role in the creative process and the ability to be creative within a distance based company is not something highlighted by previous research. This formed the basis of our research question:

    How do project managers act to create conditions for creativity among employees in a remotely organized computer game company?

    To answer our question, we chose to make a descriptive case study. The project is based in the Nordic countries with employees worldwide. It is altogether a distance based project with no shared workspace. We interviewed the projects two project managers, and supplemented with a qualitative survey amongst the employees. The collected material was analyzed with a methodology inspired by Grounded Theory and previous research results.

    Three approaches of how the project managers act to promote creativity are evident in their stories. These approaches are trust, availability and tolerance. They form the basis of our model on how the project managers in this case act to promote employee creativity. Besides the three approaches, two concepts emerged as important tools for creativity in the project: motivation and communication. Our conclusion can be described as follows:

    Motivation provides the conditions for creative thinking. By building an organization where project leaders show trust in the ability of employees, and allows tolerance to be a watchword for collaboration, project managers work to improve employee motivation. This will create opportunities for creativity among the employees in this distance based project. Communication is essential for creative work in the project and virtual means of communication a way to increase availability.

  • 54.
    Alemu Argaw, Atelach
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Amharic-English information retrieval with pseudo relevance feedback2008Inngår i: Advances in multilingual and multimodal information retrieval: 8th Workshop of the Cross-Language Evaluation Forum, CLEF 2007, Budapest, Hungary, September 19-21, 2007 : revised selected papers / [ed] Carol Peters ... [et al.], Berlin ; New York: Springer, 2008, s. 119-126Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 2007. Two monolingual and eight bilingual runs were submitted. The bilingual experiments designed varied in terms of usage of long and short queries, presence of pseudo relevance feedback (PRF), and three approaches (maximal expansion, first-translation-given, manual) for word sense disambiguation. We used an Amharic-English machine readable dictionary (MRD) and an online Amharic-English dictionary in order to do the lookup translation of query terms. In utilizing both resources, matching query term bigrams were always given precedence over unigrams. Out of dictionary Amharic query terms were taken to be possible named entities in the language, and further filtering was attained through restricted fuzzy matching based on edit distance. The fuzzy matching was performed for each of these terms against automatically extracted English proper names. The Lemur toolkit for language modeling and information retrieval was used for indexing and retrieval. Although the experiments are too limited to draw conclusions from, the obtained results indicate that longer queries tend to perform similar to short ones, PRF improves performance considerably, and that queries tend to fare better when we use the first translation given in the MRD rather than using maximal expansion of terms by taking all the translations given in the MRD.

  • 55.
    Alexander, Lövnord
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Innovation networks in the public sector: A literature review on barriers and opportunities for innovation networks for public organizations2015Independent thesis Advanced level (degree of Master (Two Years)), 10 poäng / 15 hpOppgave
  • 56.
    Algoz, Sara
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media.
    Mussa, Amin
    Hur hjälper AI den svenska vården?: Sjuksköterskors uppfattning av AI inom vården2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Artificiell intelligens sprider sig allt mer och mer inom olika arbetsområden. I denna studie har en kvalitativ fallstudie gjorts som behandlar hur sjuksköterskors uppfattning av framtida användandet av AI inom vården kan se ut. Genom att intervjua tre sjuksköterskor, en e-hälsostrateg och en projektledare inom området analyseras även detta empiriska material med hjälp av TAM för att slutligen ta reda på hur sjuksköterskors attityder kring att använda AI i framtiden ser ut. Resultatet av studien visar att sjuksköterskors uppfattning och acceptans av AI inom vården är delad i två områden där ena är icke-beslutsfattande AI och andra, beslutsfattande AI. Resultatet visar alltså hur sjuksköterskors attityd är positiv när det kommer till icke-beslutsfattande AI och mer negativ vid beslutsfattande AI. Detta då sjuksköterskorna anser att den mänskliga kontakten försvinner vid beslutsfattande AI. Det vill säga vid användning av AI-baserade system som behåller patientkontakt och kan besluta om vilken slags vård patienten behöver. Istället menar respondenterna att maskin och människa går bäst hand i hand.

  • 57.
    Al-Haydar, Sattar
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Time concept and software production in a cross-cultural team: a structurational analysis2009Konferansepaper (Fagfellevurdert)
  • 58.
    Al-Haydar, Sattar
    et al.
    Örebro universitet, Institutionen för ekonomi, statistik och informatik.
    Karlsson, Fredrik
    Örebro universitet, Institutionen för ekonomi, statistik och informatik.
    Cultural aspects in global systems development: an analytical tool2007Konferansepaper (Fagfellevurdert)
  • 59.
    AL-Hilfi, Mohammed
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Olovsson, Emil
    Luleå tekniska universitet, Institutionen för system- och rymdteknik. Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Integration & Interoperabilitet vid utveckling av IT-system2017Independent thesis Basic level (degree of Bachelor), 180 hpOppgave
    Abstract [sv]

    Denna studie ska öka förståelse för hur systemutvecklare kan lösa komplexa problem inom organisationer genom att utveckla ett nytt informationsteknologi-system (IT-system) där fokus läggs på teknisk- och organisatorisk interoperabilitet vid integrationsprocessen. Författarna agerar som systemutvecklare via en fallstudie där det finns behov av ett nytt IT-system.

    I uppsatsen används ett abduktivt tillvägagångssätt där en instrumentell fallstudie används. Genomförandet av arbetet delas in i fyra olika faser:

    (1) Problemidentifiering inom verksamheten genom framställning av verksamhetsmodeller, insamling av data genom kvalitativa semistrukturerade intervjuer med intressenter och framtagning av teoretisk bas. Som teoretisk referensram i denna uppsats definieras Integration och Interoperabilitet (I & I), vad verksamhetsprocesser är, vad som skiljer teknisk- och organisatorisk interoperabilitet åt, hur verksamhetsmodeller skapas, agil mjukvaruutveckling och användbarhet av IT-system.

    (2) Utveckling, ingrepp och utvärdering. IT-systemet utvecklas genom en iterativ och inkrementell mjukvaruutvecklingsprocess där fokus ligger på att lösa problem som identifierats. I utvecklingsarbetet har krav och begränsningar identifierats för att skapa verksamhetsmodellen börläget. Det IT-system som utvecklas utgår från detta börläge där IT-systemet revideras utifrån brister som uppkommit från intervjuer med intressenter efter varje iteration. Första iterationen av IT-systemet lyckades inte uppfylla intressenternas krav och förväntningar. Det lyckades däremot senare iterationer av IT-systemet med, där det senare implementeras inom organisationen. När IT-systemet har implementerats utvärderas det av slutanvändarna för att identifiera om systemutvecklarna har lyckats lösa verksamhetsproblemen och för att kontrollera användbarheten hos IT-systemet.

    (3) I reflektion- och lärandefasen diskuteras och analyseras resultatet mot den teoretiska referensramen och tillvägagångssättet. Resultatet visar att systemutvecklarna lyckats identifiera de komplexa problemen inom organisationen och lyckats skapa ett nytt IT-system som uppfyller intressenters behov samtidigt som det löser de identifierade verksamhetsproblemen.

    (4) I sista fasen formalisering av lärdomar sammanställs generella koncept som går att använda i andra projekt. I denna uppsats identifieras åtta aspekter och principer en systemutvecklare kan använda sig av när de ska utveckla IT-system.

  • 60.
    Ali, Bako
    et al.
    Luleå tekniska universitet.
    Awad, Ali Ismail
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Faculty of Engineering, Al Azhar University.
    Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes2018Inngår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, nr 3, artikkel-id 817Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

     The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  • 61.
    Ali Hassen, Yasin
    Högskolan Väst, Institutionen för ekonomi och informatik, Avd för informatik.
    Role of ICT for the growth of small enterprises in Ethiopia2012Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Small enterprises strive to survive and grow in the business they are involved. They makeefforts to utilize different resources and technologies available to this end as long as it isaffordable and productive. Information Communication Technology or ICT and e-commerceare among those technologies that take the front line. This study asks the question ‘howmuch are Ethiopian small enterprises responsive to ICT and the internet and how much ofthe benefits have they utilized for their growth?’ It takes five small enterprises involved inimport and export business to perform case study research on the issue and examines theirutilization level of the technology. The findings show that small enterprises in the countryare on a very low level of utilizing ICT and e-commerce due to several reasons among whichare scarcity in infrastructure development and expertise in the area coupled with barriersfrom government policy and bank regulations.

  • 62.
    Ali, Hussein
    et al.
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Al-Habobi, Ahmed
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Svenska molnleverantörers perspektiv på säkerhetsrisker vid användning av molntjänster2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    På senare tid har införandet av så det kallade molnet och molntjänster bidragit till en märkbar utveckling inom IT-branschen. Det som utmärker molntjänster är främst möjligheten att ha tillgång till data från olika enheter oavsett geografisk lokalisering. Idag används molntjänster av flera användare runt om i hela världen. Dock finns det en hel del risker med dessa tjänster, som kan få förödande konsekvenser. I denna studie identifieras säkerhetsrisker som uppstår vid utnyttjande av molntjänster. Dessa säkerhetsrisker undersöks mer djupgående i syfte att minimera riskerna för att uppnå en ökad säkerhet vid bruk av molntjänster. Syftet besvarades genom att använda en vetenskaplig metod där insamlandet av kvalitativ data är i fokus. Den kvalitativa undersökningen baserades på data från intervjuer med respondenter från olika molnleverantörer i Sverige. Resultatet visar att graden av säkerhetsrisker, så som dataförlust och försök av dataintrång av exempelvis DDOS-attacker, är beroende av molnleverantör och typ av molntjänst. Detta innebär att antal risker i en molntjänst varierar beroende på vilken leverantör som erbjuder tjänsten. Det är i dagsläget näst intill omöjligt att utesluta de säkerhetsrisker molnet medför. Dock påvisar denna studie att potentialen för att minimera dessa säkerhetsrisker ligger i utformandet av avtalet mellan molnleverantör och kund och att båda parter identifierar och kommer överens om vilka säkerhetsrisker som är acceptabla för kunden.   

  • 63.
    Ali, Liaqut
    et al.
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Avdic, Anders
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik.
    A framework for ICT-based knowledge sharing in sustainable rural development: the case of Gilgit-Baltistan, Pakistan2015Inngår i: Electronic Journal of Knowledge Management, ISSN 1479-4411, E-ISSN 1479-4411, Vol. 13, nr 2, s. 103-116Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Some 50% of the people in the world live in rural areas, often under harsh conditions and in poverty. The need for knowledge of how to improve living conditions is well documented. In response to this need, new knowledge of how to improve living conditions in rural areas and elsewhere is continuously being developed by researchers and practitioners around the world. People in rural areas, in particular, would certainly benefit from being able to share relevant knowledge with each other, as well as with stakeholders (e.g. researchers) and other organizations (e.g. NGOs). Central to knowledge management is the idea of knowledge sharing. This study is based on the assumption that knowledge management can support sustainable development in rural and remote regions. It aims to present a framework for knowledge management in sustainable rural development, and an inventory of existing frameworks for that. The study is interpretive, with interviews as the primary source for the inventory of stakeholders, knowledge categories and Information and Communications Technology (ICT) infrastructure. For the inventory of frameworks, a literature study was carried out. The result is a categorization of the stakeholders who act as producers and beneficiaries of explicit and indigenous development knowledge. Stakeholders are local government, local population, academia, NGOs, civil society and donor agencies. Furthermore, the study presents a categorization of the development knowledge produced by the stakeholders together with specifications for the existing ICT infrastructure. Rural development categories found are research, funding, agriculture, ICT, gender, institutional development, local infrastructure development, and marketing & enterprise. Finally, a compiled framework is presented, and it is based on ten existing frameworks for rural development that were found in the literature study, and the empirical findings of the Gilgit-Baltistan case. Our proposed framework is divided in four levels where level one consists of the identified stakeholders, level two consists of rural development categories, level three of the knowledge management system and level four of sustainable rural development based on the levels below. In the proposed framework we claim that the sustainability of rural development can be achieved through a knowledge society in which knowledge of the rural development process is shared among all relevant stakeholders.

  • 64.
    Ali, Rashid
    et al.
    Department of Information and Communication Engineering Yeungnam University, Gyeongsangbuk-do, Republic of Korea.
    Ashgar, Summara
    Department of Information and Communication Engineering Yeungnam University, Gyeongsangbuk-do, Republic of Korea.
    Spante, Maria
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Kim, Sung Won
    Department of Information and Communication Engineering Yeungnam University, Gyeongsangbuk-do, Republic of Korea.
    Kim, Byung-Seo
    Department of Computer & Information Communication Engineering Hongik University, Sejong, Republic of Korea.
    Competence development at workplace: a work integrated informal learning (WIIL) approach2016Inngår i: Far East Journal of Electronics and Communications, ISSN 0973-7006, Vol. 2, s. 35-42Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Learning within the organization is not only linked to the formal training and education of the employees, but also to informal processes of sharing knowledge. The knowledge is often embedded in organizational activities, practices and norms, as well as in social ties among individuals in the organization. We analyzed employees' behavior and acceptance of online social networking as an information system (IS) of learning. The analysis is performed by a descriptive case survey within a telecom corporation in Pakistan. The purpose of our study is to bring an informal learning system at workplace. In this study we obtain quantitative data from 105 out of 180 targeted employees. The results show that a majority of the studied employees favor social networking to connect colleagues at different levels and more than half of the respondents share their knowledge and experiences using social sites. Nearly half of the respondents strongly agree that knowledge sharing is an important role of social sites within the organization and many are in favor of social media as an informal learning system. The results also show how the professionals use social networking sites to share their experiences and to build a virtual break in hierarchical levels of professions. This paper illustrates the benefits of social networking sites as an informal work integrated learning tool that also serves as an IS model for the organization.

  • 65.
    Ali, Rashid
    et al.
    Department of Information and Communication Engineering Yeungnam University, Gyeongsangbuk-do, Republic of Korea.
    Ashgar, Summara
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Spante, Maria
    Högskolan Väst, Institutionen för ekonomi och it, Avd för informatik.
    Kim, Sung Won
    Department of Information and Communication Engineering Yeungnam University, Gyeongsangbuk-do, Republic of Korea.
    Kim, Byung-Seo
    Department of Computer & Information Communication Engineering Hongik University, Sejong, Republic of Korea.
    Social Networking sites for Interdisciplinary Learning at Workplace: Work integrated informal Learning (WiiL)2016Inngår i: International Conference on Advanced Computing, Communication and Information Sciences (ICACCI-2016): Proceedings, Pushpa Publishing House , 2016, s. 9-9Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Work Integrated Learning (WIL) studies usually focuses on educational situations when professional organizations are actively involved in learning processes for students in higher education. However, after completing the institutional period entering the professional arena, the professional person is still actually a student at the workplace as s/he never stops learning. Learning within the organization is not only linked to the formal training and education of the employees, but also to informal processes of sharing knowledge. The knowledge is often embedded in organizational activities, practices and norms, as well as in social ties among individuals in the organization. Our analysis of employees' behavior and acceptance of online social networking as an information system (IS) of learning is performed by a descriptive case survey within a telecom corporation in Pakistan. Thepurpose of our study is to bring an informal learning system at workplace. In this study we quantitative data isobtained from 105 out of 180 targeted employees. The results show that a majority of the studied employees favors social networking to connect colleagues at different levels and more than half of the respondents share their knowledge and experiences using social sites. Nearly half of the respondents strongly agree that knowledge sharing is an important role of social sites within the organization and many are in favor of social media as an informal learning system. The results also show how the professionals use social networking sites to share their experiences and to build a virtual break in hierarchical levels of professions. This paper illustrates the benefits of social networking sites as an informal work integrated learning tool that also serves as an IS model for the organization.

  • 66. Al-Jumaili, Mustafa
    et al.
    Rauhala, Ville
    Jonsson, Katrin
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Ramin, Karim
    Parida, Aditya
    Aspects of Data Quality in eMaintenance: A case study of process industry in northern Europe2011Konferansepaper (Fagfellevurdert)
  • 67.
    Alklind Taylor, Anna-Sofia
    Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningscentrum för Informationsteknologi.
    The active instructor: Benefits and barriers to instructor-led serious gaming2015Inngår i: VS-Games 2015: 7th International Conference on Games and Virtual Worlds for Serious Applications, IEEE conference proceedings, 2015, s. 8-15Konferansepaper (Fagfellevurdert)
    Abstract [en]

    While there is a wealth of studies on the subject of serious games, the same cannot be said on the issue of teaching with games, especially in game-based learning settings with adult learners. Over the years, most research in this area has been focused on the ‘active substance(s)’ of games for learning, focusing mainly on characteristics of games, but often failing to take the whole context of game-based learning into consideration, such as the role(s) of the teacher. However, the past two or three years has seen a shift in focus from merely the game as an isolated artefact, to also include more discussions on how games can successfully be integrated into an educational setting, as well as challenges as pitfalls of which instructors need to be aware. This paper aims to outline the contemporary research on instructor-led serious gaming and its implications for the design of serious gaming environments.

  • 68.
    Allagiannis, Ioannis
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    EDI AND GREEK SMES. A MULTIPLE CASE STUDY IN THE CONTEXT OF TECHNOLOGY, ENVIRONMENT AND ORGANIZATION.2014Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
    Abstract [en]

    Electronic Data Interchange (EDI) holds the potential to improve contemporary business operations, which are redefined frequently based on the demands of global competition. There are numerous EDI systems, which an enterprise can choose to adopt in order to meet its needs and goals. International literature demonstrates a variation of views regarding the adoption of new technologies, which differ according the size of each organization along with internal and external impediments and determinants. The use of EDI worldwide has gained a positive acceptance by commercial companies, industries and service providers, followed by rapid adoption mainly in the processes of large organizations. Conversely, the predictions of previous years’ studies have not been materialized to the expected extent. In Greece in particular, there is low penetration and a reluctance to adopt EDI technologies by Small and Medium Enterprises (SMEs). This study is based on the theoretical framework of Technology, Organization and Environment (TOE). A qualitative multiple case study research design has been used, in order to provide further insights on the factors that affect the decision of Greek SMEs in adopting EDI technologies. The significance of the perceived direct and indirect benefits, the effects of the perceived financial cost and technical competence and the importance of industry and government pressure on corporate level, are analyzed and discussed. An empirical support of the low penetration of EDI in the Greek SMEs' community is also provided. This research contributes in the existing knowledge about EDI adoption decisions regarding Greek SMEs by providing a variation of views, further insights on how Greek SMEs behave and react during the current economic recession and a new cost factor that emerged within the analysis of multiple cases. Avenues for future research are recommended in order to expand this study's findings in the field of corporate IT innovation.

  • 69.
    Aller, Mikael
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Karlsson, Robert
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Agil testning i datalagringsprojekt2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Testing in data warehousing has traditionally been done in large chunks at the end of development projects. This has often led to costly bug fixes because fixing bugs that are found late in the development process is generally a very time consuming task. In some cases, there is not enough time to fix these bugs because of narrow project deadlines. This can have major consequences for organizations because business decisions often relies on their data warehouse to provide accurate statistics and data. This study examines a department of a major Swedish agency that recently adopted agile methods to overcome some of the shortcomings associated with traditional data warehouse development. The effects of agile methods on data warehouse testing are examined, as well as the challenges that are needed to overcome for them to be successful. We also touch upon consequences of poor test design and what implications incorrect data that are delivered from a data warehouse can have both internally and externally. In conclusion, the study have found that adopting agile methods have led to test activities being carried out more often, more efficiently and with better results than in the past. In addition, product owners have been continuously involved in the development process through frequent acceptance tests. For agile methods to be successful in data warehouse testing, we also concluded that they need the support of tools, system environments and attitudes both among developers and product owners.

  • 70.
    Almgren, Carl
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Persson, Cecilia
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Kunskapsdelning i praktiken: En fallstudie om vilken roll IT spelar för delning av kunskap i ett distribuerat systemutvecklingsteam2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    In a world of tough global competition, where the use of distributed working methods must be described as common, it’s crucial for organizations to have successful knowledge sharing between employees. The natural face-to-face communication is being replaced by various forms of IT-solutions, but it’s unclear what actual consequences that brings to knowledge sharing within organizations. Therefore, this paper research question is: What role does IT play for knowledge sharing in a distributed system development team? The theoretical data is collected from a literature study within the IS research. The empirical data is collected from observations and interviews at an IT consultancy. The results of the interviews and observations show how knowledge sharing occurs in the investigated practice and how it relates to IT. Our conclusion shows how IT does not replace communication face-to-face outright, but rather how IT generates new kinds of learning processes which changes the conditions for knowledge sharing. Furthermore, in the specific practice, the organization should develop conscious strategies around knowledge sharing which takes into account the interaction between IT, human actions and structural conditions. 

  • 71.
    Almgren, Cecilia
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media.
    Höjenberg, Klara
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media.
    Nulägesanalys av informationssäkerheten gällande molntjänster vid svenska universitet2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Allt fler verksamheter väljer att flytta delar av eller hela sin lagring till en molntjänst, en tjänst som tillhandahålls av en extern leverantör över Internet. Det medför en mängd fördelar som bl.a. minskade kostnader och ökad flexibilitet för användarna, men det finns också risker kopplat till att använda molntjänster. I uppsatsen presenteras en rikstäckande nulägesanalys över informationssäkerhetsläget kring användandet av molnlagringstjänster vid Sveriges 14 universitet. Arbetet genomförs som en fallstudie och granskning av universitetens styrdokument samt intervjuer med personal vid några utvalda universitet ligger till grund för analysen.

  • 72.
    Alnebo, Carl
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Informationssystem.
    Svensson, Christoffer
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Informationssystem.
    Beyond the hype: A study of non-user perspectives2017Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Today's rapid technological development in relation with social networks create efficient information flows in everyday life. It creates conditions for so-called "hypes" that are described as an exponentially growing trend of testing a new product. What factors lies behind a hype and how does it affect people that choose to refrain from new technology?

     

    The purpose of this paper is to study the so called non-users, with a case study that concerns the Pokémon GO game and its hype in the summer of 2016. This case study has the intention to highlight the positive and negative aspects of non-users and other thoughts about hype. The study also intends to investigate what the non-users can contribute in technological development and if it's possible to distinguish between users and non-users in today's society.

     

    The case study has been carried out on the basis of two group interviews; a group that abstained from playing and a group that played Pokémon GO during the hype. A number of issues are discussed and linked against a theoretical framework which also has been used in the analysis in this paper. Based on the results of the case study it appears that nostalgia was a major factor in the hype, many had prior knowledge of the concept and was triggered by it. Nostalgia was also a factor that lead people to refrain from the hype. The game did not meet up to everyone’s expectations regarding the functionality which existed earlier in Pokémon but not now.  It also emerged that the social environment affects both users and non-users in several ways. The investigation of the case study showed that non-users often had to wait for players due to different reasons. This could be while on walks with the player or that users could completely block roads. To be able completely separating non-users and users is complex as the real world is used as the platform of the game. Both previous studies and this paper demonstrates how important it can be to understand non-users. They have the opportunity to present an overall perspective of a product that users might condone. In summary, the future will become more complex in the area, especially with new technologies that make the real world a game field.

  • 73.
    Al-Saqaf, Walid
    Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap.
    Open data vital for a new Yemen: how open governments can build on the Arab Spring to deliver true freedom2012Annet (Annet (populærvitenskap, debatt, mm))
    Abstract [en]

    The author argues that in order for Yemen to develop, it is important that it develops an open government with the utilization of open data through online means. The argument is that transparency enhances accountability, which in turn improves governance. Information technology is seen as crucial in this process.

  • 74.
    Al-Saqaf, Walid
    Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap.
    The Internet as a Catalyst for Change in Yemen2013Annet (Annet (populærvitenskap, debatt, mm))
  • 75.
    Al-Serafi, Ayman
    et al.
    Teradata Corporation.
    Elragal, Ahmed
    Department of Business Informatics and Operations, German University in Cairo (GUC), Cairo.
    Visual trajectory pattern mining: An exploratory study in baggage handling systems2014Inngår i: Advances in data mining: Advances in data mining : applications and theoretical aspects : 14th Industrial Conference, ICDM 2014, St. Petersburg, Russia, July 16-20, 2014. Proceedings / [ed] Petra Perner, Cham: Encyclopedia of Global Archaeology/Springer Verlag, 2014, s. 159-173Konferansepaper (Fagfellevurdert)
    Abstract [en]

    There is currently a huge amount of data being collected about movements of objects. Such data is called spatiotemporal data and paths left by moving-objects are called trajectories. Recently, researchers have been targeting those trajectories for extracting interesting and useful knowledge by means of pattern analysis and data mining. But, it is difficult to analyse huge datasets of trajectories without summarizing them and visualizing them for the knowledge seeker and for the decision makers. Therefore, this research paper focuses on utilizing visual techniques and data mining analysis of trajectory patterns in order to help extract patterns and knowledge in an interactive approach. The research study proposes a research framework which integrates multiple data analysis and visualization techniques in a coherent architecture in support of interactive trajectory pattern visualization for the decision makers. An application case-study of the techniques is conducted on an airport's baggage movement data within the Baggage Handling System (BHS). The results indicate the feasibility of the approach and its methods in visually analysing trajectory patterns in an interactive approach which can support the decision maker. © 2014 Springer International Publishing Switzerland.

  • 76.
    Alsterberg, Matilda
    Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT.
    Mot en bättre upplevelse: Hur användarupplevelsen kan förbättras på webbplatsen hagabadet.se med fokus påinformationsarkitekturen.2016Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    User Experience plays a big part in web design. A bad UX can lead to users not finding what they´re looking for, or not understanding how to use the website. This study uses fou rmethods to examine User Experience on the website hagabadet.se. It starts of with a survey and a contextual inquiry to generate data that will show the main issues of the website. From the result of the two studies, two new method sare created to continue analysing the issues and to find a solution to them. The following methods are card sorting and CI with prototypes. These methods focus on analysing how the users want information to be structured. The result of the study show that the users need a better structure of information to find what they need, and that they are missing some important elements to be able to accomplish what they want on the website. New prototypes combined with examples are made to illustrate a development proposal that could improve the UX of the website.

  • 77.
    Amann, Franziska
    Karlstads universitet.
    Website usability and provision of information on the English version of Karlstad University website: In th perspective of current exchange students at Karlstad University2013Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 78.
    Amcoff Nyström, Christina
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Olsson, Hanna
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Asproth, Viveca
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Institutionen för informationsteknologi och medier.
    Assumptions for Distributed Concurrent Design and Decision Making2012Inngår i: Proceedings of International Design Conference, DESIGN / [ed] Marjanović D., Štorga M., Pavković N., Bojčetić N., Dubrovnik, Croatia, 2012, s. 543-550Konferansepaper (Fagfellevurdert)
  • 79.
    Amid, Shirin
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Informationssystem.
    Landgren, Sara
    Ur slutanvändarnas perspektiv: Införandet av ett hälsoinformationssystem2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
  • 80. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Corporate Social Responsibility disclosure via Twitter by top listed UK companies: A Data Science Approach2018Konferansepaper (Fagfellevurdert)
  • 81.
    Amin, Marian Hany
    et al.
    The German University in Cairo.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Financial Disclosure on Twitter by Top Listed UK Companies: A Data Science Approach2018Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Ongoing advancements in technology have changed dramatically the disclosure media that companies adopt. Such disclosure media have evolved from the traditional paper-based ones, to the internet as the new platform to disclose information via companies’ designated websites. However, currently the new media for disclosures are the social media. The aim of this paper is to investigate corporate social media accounts for financial disclosure, as well as, identify its determinants. The sample of the study is comprised of the tweets posted on the Twitter accounts belonging to the FTSE 350 constituents. Topic modeling is applied to identify financial disclosure tweets and logistic regression is run to identify the determinants of financial disclosure on Twitter. Results show that companies use Twitter to make corporate disclosures and some board characteristics are found to have a significant relationship with financial disclosure.

  • 82. Amin, Marian Hany
    et al.
    Mohamed, Ehab Kamel
    Elragal, Ahmed
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Twitter: An emerging media for corporate disclosure2018Konferansepaper (Fagfellevurdert)
  • 83.
    Amirjani, Mehrnaz
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Tailoring Large Interactive Public Displays For University Students2013Independent thesis Advanced level (degree of Master (Two Years)), 20 poäng / 30 hpOppgave
  • 84.
    Anderson, Karen
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för informationssystem och -teknologi.
    Research in the Archival Multiverse: book review2017Inngår i: Archives and Manuscripts, ISSN 0157-6895, E-ISSN 2164-6058, Vol. 45, nr 2, s. 169-170Artikkel, omtale (Annet vitenskapelig)
  • 85.
    Anderson, Karen
    et al.
    Mittuniversitetet, Fakulteten för naturvetenskap, teknik och medier, Avdelningen för arkiv- och datavetenskap.
    Oliver, G.
    School of Information Management, Victoria University of Wellington, PO Box 600Wellington, New Zealand .
    Yakel, E.
    School of Information, University of Michigan, 105 South State Street, 4323 North QuadAnn Arbor, MI, United States .
    In Memoriam: Terry Cook (1947–2014)2014Inngår i: Archival Science, ISSN 1389-0166, E-ISSN 1573-7500, Vol. 14, nr 3-4, s. 205-206Artikkel i tidsskrift (Annet vitenskapelig)
  • 86.
    Andersson, Adam
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Åhlenius, Melina
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Hur påverkas svensk systemförvaltning av GDPR?: En explorativ studie av tysk informationssäkerhetspraktik2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Today, personal data is used to generate added value for organizations. Consequently, misuse of private data is not surprising. The upcoming implementation of General Data Protection Regulation (GDPR) is an attempt to restrict the exploitation of private data. In contrast to the current privacy law, GDPR will be more adjusted to the conditions of the contemporary society. System maintenance is at the core of privacy issues since information is stored in the systems. Based on Germany’s already established strict privacy regulation mirrored in GDPR, Germany is used as a source of comparison for the purpose of this study. Through a qualitative approach of system maintenance and GDPR, we analyze different strategies to comprehend the complexity in information security regarding privacy data. Based on our study we present four distinct contributions; first, concrete suggestions to consider in order to successfully handle personal information; second, a recognition of an organizational perspective on information security; third, we provide empirical evidence of how the field of system maintenance has evolved over time; fourth, a methodological contribution on how to study upcoming effects. 

  • 87.
    Andersson, Adrian
    Luleå tekniska universitet, Institutionen för system- och rymdteknik.
    Designprinciper för digitala tjänster inom gruvindustrin2018Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [sv]

    Gruvindustrin befinner sig i en stor förändring allt eftersom digitaliseringen fortskrider. Digitaliseringen innebär att en mängd nya tekniker börjar implementeras i gruvor runt om i världen. En av dessa tekniker är att de anställda använder smartphones i arbetet. Detta medför dock problem då miljön inom gruvindustrin inte är optimal för de generella designprinciperna som finns att tillgå idag. Denna studie undersöker och utvecklar därför designprinciper som kan användas för mobila applikationer inom gruvindustrin. Studien har teori som behandlar generella designprinciper för mobila applikationer, mobila designmönster samt industri 4.0. Vidare har en kvalitativ studie genomförts i form av intervjuer med respondenter från både gruvindustrin men också personer med mångårig erfarenhet av utveckling av mobila applikationer till gruvindustrin. Kvalitativa studien genomfördes för att öka förståelsen kring kontexten som infinner sig inom gruvindustrin men också använda den expertis som finns inom området för att kunna utveckla relevanta designprinciper som kan vara till användning i praktiken. Den insamlade empirin jämfördes sedan mot teori och med hjälp av studiens analys kunde designprinciper som kan anses vara specifika för gruvindustrin identifieras. Slutsatserna visar att enkelhet är nyckeln till framgång och element såsom automatisk ifyllnad, enkel och snabb navigering, stora ikoner och användning av färger är några av de möjliga lösningar som föreslagits för att ta fram en användarvänlig applikation.   

  • 88.
    Andersson, Andersson
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Är digitala rum för alla?: En diskursanalys av sociala medier med fokus på bloggar2015Independent thesis Basic level (degree of Bachelor), 10 poäng / 15 hpOppgave
    Abstract [en]

    Web 2.0 opened up for a lot of opportunities, digital spaces became open for everyone to participate. But if groups of people get harassed and threatened in this spaces, how does that affect participation? Threats, hateful comments and harassment is a phenomenon that appears to be a common part of life online. Some groups of people may experience this more then others. To investigate this further a qualitative study was conducted using two different methods of internet research; observation and interview online. I wanted to study how cyber hate take the expression against female bloggers that write about feminism. The women that participated in this study have all been harassed and received threats online of various kinds. The blogs that were observed all write about subjects that question and criticize social structures and norms that many take for granted. This seems to spark hatred and threats against these female bloggers. The interviewed bloggers had different strategies for dealing with cyber hate they received. One example of this is that they all review the comments before posted on the blog. A problem that a majority of the bloggers expressed was that general public and the justice system did not take cyber hate seriously. Some people that threats and post hateful comments do that with their full name exposed.  The study indicates that anonymity didn’t play that big part, as first expected, in how people expresses themselves online. 

  • 89.
    Andersson, Anneli
    et al.
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Magnusson, Felix
    Umeå universitet, Samhällsvetenskapliga fakulteten, Institutionen för informatik.
    Understanding the design: A qualitative study of architecture and urban planning visualisation techniques in a public consultation setting2016Independent thesis Advanced level (degree of Master (One Year)), 10 poäng / 15 hpOppgave
    Abstract [en]

    Visualisation of proposed plans and designs can be done with a number of differenttechniques within the field of architecture and urban planning. But which visualisationtechnique is best suited when presenting a design proposal at a public consultation? Is therea breaking point where the user can form a general understanding of the proposed designdepending on the degree of fidelity? To seek answers to these questions a qualitative studywas conducted where five different visualisation techniques were tested on ten users toassess their understanding of a proposed design. Our findings show that there is not asingle best visualisation technique for public consultation. Based on our results thepreferred alternative would be a combination of several techniques. We could also see thatthe general understanding of a space increased until a certain degree, and after that adeeper more detail oriented understanding was achieved.

  • 90.
    Andersson, Annika
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Digital divides revisited: towards a model for analysis2004Inngår i: Electronic government: Proceedings of the third international conference, EGOV 2004, Zaragoza, Spain, August 30 - September 3, 2004 / [ed] Roland Traunmüller, Berlin: Springer , 2004, s. 289-292Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper presents a model for categories of divides, and how these categories are interrelated. The factors are found by a literature study from different countries attempting to measure various divides. The model is based on earlier research on the ‘divide’ and includes: physical access, autonomy of use, know-how and motivation. Depending on the type of digital divide and the local situation, rectifying efforts must address the most crucial factor, which could be any of the four. The paper also introduces the nature and amount of different proposed divides, and relations among factors.

  • 91.
    Andersson, Annika
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Learning to learn in e-Learning: constructive practices for development2010Doktoravhandling, med artikler (Annet vitenskapelig)
    Abstract [en]

    This thesis concerns technology use in distance educations and learning practices related to this use. The research was carried out over the period 2005 to 2009 in Bangladesh and Sri Lanka and has been reported in 6 published papers. The research is situated within the field of Information and Communication Technologies for Development (ICT4D) and within this field e-learning. Education is important for development and for many students in developing countries distance education is often the only option to get educated. The research question is if the use of Information and Communication Technology (ICT) in distance education can contribute to development, and if so, how?

    This question is explored through two case studies in Sri Lanka and Bangladesh. A variety of data collection methods have been used: interviews, questionnaires, participant observations and document review. The research approach is interpretative and findings are analyzed using Structuration Theory.

    Initial findings showed that a major challenge for students was the change of learning practices that distance education required. Findings also showed that new constructive learning practices emerged through the use of ICT. For development to take place the learning practices of students are important. Students used to learning practices based on uncritical memorization of facts will not easily take initiatives for change, whereas students used to constructive learning practices will.  Notwithstanding the fact that most students found this transition challenging, it was found that by introducing technology into long-established transmission structures, changes towards constructive learning practices occurred.

    A major contribution of this thesis is to increase the understanding of how ICT in distance education can facilitate constructive learning practices. By arguing that constructive learning practices are conducive to societal change this finding also has implications for development. The thesis also makes a theoretical contribution by extending Structuration Theory’s applicability in demonstrating its explanatory power in settings where researcher and informants are geographically and socially distant.

  • 92.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Grönlund, Åke
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Islam, M. Sirajul
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    From one-to-one to integration of multiple toolsInngår i: Research in Learning Technology, ISSN 2156-7069, E-ISSN 2156-7077Artikkel i tidsskrift (Fagfellevurdert)
  • 93.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Grönlund, Åke
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Wicander, Gudrun
    Karlstad universitet, Karlstad, Sweden.
    Development as Freedom: how the Capability Approach can be used in ICT4D Research and Practice2012Inngår i: Information Technology for Development, ISSN 0268-1102, E-ISSN 1554-0170, Vol. 18, nr 1, s. 1-4Artikkel i tidsskrift (Fagfellevurdert)
  • 94.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Grönlund, Åke
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Åström, Joachim
    Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap.
    “You can't make this a science!”: Analyzing decision support systems in political contexts2012Inngår i: Government Information Quarterly, ISSN 0740-624X, E-ISSN 1872-9517, Vol. 29, nr 4, s. 543-552Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This paper reports on problems and conflicts encountered when using decision support systems (DSS) in political contexts. Based on a literature study and two case studies we describe problems encountered in relation not only to the DSS itself, but also to the political decision process. The case studies have been carried out in two cities in Sweden that at different times but in similar situations have used DSS in order to reach a decision in complicated and contested matters. In both cases we have previously found that the method and IT tool used for decision analysis were appreciated by most participants, but the inherent rationality of the DSS was in conflict with how participants usually make decisions as well as with the political process. The assumption was that a strict and open method would make grounds for clear decisions, but the results of the decision process were none of the cases implemented. In one case the result of the decision analysis was that no clear decision was made. In the other case the lowest ranked alternative was implemented. Furthermore, in neither city the method was ever used again. We therefore ask: What are the challenges and limitations to using DSS in political contexts? Our study shows that challenges relate to selecting and using criteria; eliciting weights for criteria (high level of subjectivity); understanding all the amount of facts available in the system; time constraints; and lack of impact on the final decision. This study contributes to both research and practice by increasing the understanding of what challenges are experienced in DSS use, since the findings can be used as a framework of challenges that should be addressed, in design of systems as well as method for use. The study also contributes to understanding the role of politicians in decision-making and the consequences for the use of DSS. Further, the literature study showed that there are overall very few studies on the actual use of DSS in a political context, and we therefore conclude by encouraging more studies reporting actual use.

  • 95.
    Andersson, Annika
    et al.
    Örebro Universitet.
    Hatakka, Mathias
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik.
    Victim, Mother, or Untapped Resource? Discourse Analysis of the Construction of Women in ICT Policies2017Inngår i: Information Technologies & International Development, ISSN 1544-7529, Vol. 13, nr 2017, s. 72-86Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article analyzes the construction of women in national ICT policies in South and Southeast Asia. The aim is to unravel the role ascribed to women in these policies and how this affects suggested measures. The research is based on critical discourse analysis and shows that women are mainly constructed as victims, mothers, or an untapped resource. We argue that if women are speciªcally targeted in policies, careful attention should be given to how they are portrayed. Our analysis also shows that in most cases the suggested solutions on how to include women in the ICT society only deal with the symptoms of gender inequality rather than the structures that prevent equal opportunities. We conclude by discussing implications for research and practice.

  • 96.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Hatakka, Mathias
    Dalarna University, Borlänge, Sweden.
    Victim, mother, or untapped resource?: Discourse analysis of the construction of women in ICT policies2017Inngår i: Information Technologies and International Development, ISSN 1544-7529, E-ISSN 1544-7537, Vol. 13, s. 72-86Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    This article analyzes the construction of women in national ICT policies in South and Southeast Asia. The aim is to unravel the role ascribed to women in these policies and how this affects suggested measures. The research is based on critical discourse analysis and shows that women are mainly constructed as victims, mothers, or an untapped resource. We argue that if women are specifically targeted in policies, careful attention should be given to how they are portrayed. Our analysis also shows that in most cases the suggested solutions on how to include women in the ICT society only deal with the symptoms of gender inequality rather than the structures that prevent equal opportunities. We conclude by discussing implications for research and practice.

  • 97.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Hedström, Karin
    Örebro universitet, Handelshögskolan vid Örebro universitet.
    Karlsson, Fredrik
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Terminologi och begrepp inom informationssäkerhet: Hur man skapar en språkgemenskap2016Rapport (Annet (populærvitenskap, debatt, mm))
    Abstract [sv]

    Syftet med den här studien är att utvärdera svensk terminologi på informationssäkerhetsområdet med fokus på frågor om målgrupper och grundläggande termer. Baserat på en Delphi-studie, där experter från olika yrkeskategorier har fått definiera en uppsättning grundläggande begrepp, har vi utvärderat både experternas definitioner och processen med att ta fram definitionerna. Vi har identifierat flera problem med svensk terminologi på informationssäkerhetsområdet. För att stödja arbetet med att utveckla svensk terminologi för informationssäkerhet beskriver vi i rapporten förslag på hur arbetet kan bedrivas vidare. De problem vi har identifierat är bl.a. att begrepp som inte finns med i rådande styrdokument blir otydliga och svårtolkade för experter inom området och att det är problematiskt med två olika styrdokument (HB550 och SIS-TR50:2015) i användning med delvis olika definitioner av samma begrepp. Vi har även sett att olika yrkeskategorier ofta definierar begreppen utifrån sin specifika profession, vilket kan innebära att det finns ett behov av att säkerhetsbegrepp kontextualiseras utifrån yrkesroller. Processen med att arbeta med experter enligt Delphi-metoden gav ett bra underlag för att analysera och diskutera olika definitioner av centrala begrepp inom informationssäkerhetsområdet. Dessutom har experterna varit mycket engagerade i processen. Vi föreslår att framtida begreppsutredningar använder sig av denna metod eller varianter av den och att det är experterna, de som i sitt dagliga yrke handhar informationssäkerheten, som ska vara de som skapar definitionerna. Vi ser också ett stort behov av större, effektivare och mer samordnade former för framtida begreppsutredningar.

  • 98.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Karlsson, Fredrik
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Hedström, Karin
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Konfliktfylld kultur vid framtagande av informationssäkerhetsstandarder2017Inngår i: Informationssäkerhet och organisationskultur / [ed] Jonas Hallberg, Peter Johansson, Fredrik Karlsson, Frida Lundberg, Björn Lundgren, Marianne Törner, Lund: Studentlitteratur AB, 2017Kapittel i bok, del av antologi (Annet (populærvitenskap, debatt, mm))
  • 99.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Wiklund, Matilda
    Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap.
    Hatakka, Mathias
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik. Örebro universitet, Handelshögskolan vid Örebro universitet.
    Emerging Collaborative and Cooperative Practices in 1:1 Schools2016Inngår i: Technology, Pedagogy and Education, ISSN 1475-939X, E-ISSN 1747-5139, Vol. 25, nr 4, s. 413-430Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this paper we explore how laptops used in 1:1 classrooms affect cooperation and collaboration practices. Based on an observational time study we find that the most common activity in 1:1 classrooms is group work using the computer. We also found that despite what the concept 1:1 alludes about one student working with one computer, most laptop use takes on other forms such as two students working with one computer (1:2) or two students working together using two laptops (2:2). The findings reported in this paper about the various different collaboration arrangements have implications for both research and practice. Practice because teachers can arrange activities based on an awareness of the different student-laptop constellations that emerge when students are given a laptop. Research is likewise informed about the various group work constellations and can build on this knowledge for further analysis of the pros and cons with the different collaborative forms. 

  • 100.
    Andersson, Annika
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Wiklund, Matilda
    Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap.
    Hatakka, Mathias
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Emerging Collaborative and Cooperative Practices in 1:1 Schools2016Inngår i: Technology, Pedagogy and Education, ISSN 1475-939X, E-ISSN 1747-5139, Vol. 25, nr 4, s. 413-430Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    In this article, the authors explored how laptops used in 1:1 classrooms affect cooperation and collaboration practices. Based on an observational time study, the authors found that the most common activity in 1:1 classrooms is group work using the computer. They also found that, despite what the concept 1:1 alludes to about one student working with one computer, most laptop use takes on other forms such as two students working with one computer (1:2) or two students working together using two laptops (2:2). The findings reported in this article about the various different collaboration arrangements have implications for both research and practice. For practice, because teachers can arrange activities based on an awareness of the different student–laptop constellations that emerge when students are given a laptop. Research is likewise informed about the various group work constellations and can build on this knowledge for further analysis of the pros and cons with the different collaborative forms.

1234567 51 - 100 of 3163
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf