Ändra sökning
Avgränsa sökresultatet
138139140141142143144 7001 - 7050 av 7793
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 7001.
    Taru, Juliet
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Användbarhet och handlingsbarhet på e-bokhandel: En studie av studenters åsikter2013Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 7002.
    Tavakoli, Samira
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Motivations for and Problems in the Continued Use of Organizational E-learning System: A Case of Telecommunication Company in Iran2016Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    E-learning in organizations is gaining more attention as it can be a step forward in the competitive market. Businesses are more in need of skilful employees and at the same time employee turnover can have costs. Although the organizations are offering elearning systems, these systems are not being used as much as they should be. This research concerns continued use of e-learning system in the organizations. The purpose of the study is to understand the motivations for and problems in the continued use oforganizational e-learning. The case under study is a Telecommunication Company in Iran which is investing noticeably on the organizational e-learning. For this purpose, a qualitative research method was adopted and semi-structured interviews with 8 users of an organizational e-learning system were conducted to collect the data. The Data were analyzed and interpreted using codes and categories, based on the research questions and related literature. The result indicated some details about the motivations and barriers in the continued use of organizational e-learning system and it has implication for the Company under the study and other organizations which use or intend to use e-learningsystems.

  • 7003.
    Tavanti, Monica
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informationsvetenskap.
    On the Relative Utility of 3D Interfaces2004Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    Three-dimensional (3D) interfaces are made with the ambition to reinvent traditional two-dimensional (2D) displays into intuitive 3D environments that allow natural interactions and guarantee users’ satisfaction. However, reality is far from the expectations and 3D interfaces remain experimental. The results of empirical studies comparing 2D and 3D interfaces are incoherent and do not indisputably endorse the development of 3D applications. The reason behind this incoherency is that empirical comparisons often discard several factors that go beyond the specific style of the interface itself although they play a major role in human performance. Specifically: perceptual factors, factors related to semantics, contextual factors.

    The identification of these factors was carried out through a set of empirical studies tackling two applications domains: information management (namely, the retrieval of data and on spatial memory tasks) and Air Traffic Control. Concerning the first domain, the results suggest that 3D interfaces can support spatial memory if the 3D interface is provided with a spatial structure that has also a semantic function. Also, the specific content of the objects disseminated in the 3D structure seem to affect performance. It is argued that when there is a strategic coupling of the semantics of the spatial structure with the meanings of the objects, 3D interfaces could enhance spatial memory. Concerning the second domain, the results indicate that 3D interfaces could support controllers’ tasks only for a limited set of activities. These do not include standard monitoring tasks where the presence of 3D would actually cause detriment to the performance due to perceptual biases. Finally, it is claimed that the idea of familiarity with an interface style can affect the way people interact with it and, despite the fuzziness of the concept, familiarity may represent a real challenge in users’ acceptance of 3D interfaces.

  • 7004.
    Tawfique, Khaled
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Vejseli, Arlind
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Decision to migrate to the Cloud: A focus on security from the consumer perspective2018Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Cloud computing is an emerging model in which applications, data, computing resources and operating platforms are provided to clients as a service. It represents a unique way to architect and remotely manage computing resources with minimal management effort or service provider interaction. As it become widely used and being relayed on, security and the risks surrounding it became more in focus to ensure the data protection. The purpose of the study is to focus on the security risks of confidentiality, integrity and availability, and how the cloud consumer perceives cloud security based on those risks. For this purpose, a qualitative research method was adopted and semi-structured interviews with 6 users with experience within the cloud were conducted to collect the data. The data were analysed and explained using codes and categories, based on the research questions and related literature. A roadmap was developed consist of four elements which can support in the migration decision. Those elements are: Trust, Compliance, Proactive and Continuous assessment.

  • 7005.
    Taxén, Gustav
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Participatory Design in Museums: Visitor-Oriented Perspectives on Exhibition Design2005Doktorsavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    This thesis is about the design of technology for museum exhibitions. More specifically, it explores different ways in which visitors can contribute to museum exhibition design and how technology can support learning-related activities within museum exhibitions.

    Most contemporary museums collect, preserve, and provide access to important cultural and historical artefacts with the explicit intention of educating and informing the general public about those artefacts. For many exhibition designers, the audience's encounter with the exhibition is of primary concern, and technology is often seen as a means for providing visitors with new experiences and opportunities for learning. However, it appears to be only very recently that researchers have begun to show an interest in how modern technology is actually being used by visitors and many museums are struggling in their efforts to incorporate new technologies in their established exhibition design practices.

    Thus, on the one hand, many museums are seeking more visitor-focused ways of carrying out design (with the help of, for example, different forms of evaluation or feedback). On the other hand, many museums seem to have limited experience with designing technology in a user-oriented fashion. Consequently, human-computer interaction, with its long tradition of involving users in design, is in a position to provide museums with new ways for audiences to contribute to exhibitions with their knowledge, experience, opinions, and desires. The papers in this thesis explore this topic through a number of case studies where visitors have been invited to contribute to the design and evaluation of exhibitions. The analysis of the results suggests that visitors can provide relevant contributions in all of the main phases of museum exhibition production.

    This thesis also addresses the issue of how technology can support learning-related activities in museums. It appears that many museums base their notion of learning on epistemologies which suggest that activities such as interpretation, communication, and collaboration are fundamental to most museum learning processes. Consequently, the papers in this thesis explore a number of different techniques for supporting and orchestrating such social activities. The result is a set of design approaches that has the ability to encourage collaboration and dialogue between co-present visitors and allow visitors to create dynamic and evolving contexts for existing exhibits.

    In summary, the contributions of this thesis explore museum exhibition design from two different, yet interrelated perspectives. From the first perspective, visitors' desires, wishes, experiences, and knowledge are seen as important contributions to museum exhibition design. From the second perspective, different social activities and relationships between visitors in museums become the focus of the design activities. Together, these two perspectives outline an approach to museum exhibition design where visitors are of primary concern, both with respect to the content presented in exhibitions and with respect to the way exhibitions orchestrate and support different forms of social interaction.

  • 7006.
    Taxén, Gustav
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Teaching computer graphics constructively2004Ingår i: Computers & graphics, ISSN 0097-8493, E-ISSN 1873-7684, Vol. 28, nr 3, s. 393-399Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    During the last few decades, constructivist-oriented teaching methods have gained increasing support within primary education. This paper provides a short overview of two such constructivist epistemologies and describes a preliminary attempt to apply them in university-level graphics education. While the outcome of the attempt is difficult to evaluate, the reaction from the students raises some interesting issues concerning problem solving and efficiency in general.

  • 7007.
    Taxén, Gustav
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Frécon, Emmanuel
    The extended museum visit: documenting and exhibiting post-visit experiences2005Ingår i: Museums and the Web 2005: Proceedings, 13-16 April 2005, Vancouver, Canada. / [ed] J. Trant and D. Bearman, Toronto: Archives & Museum Informatics , 2005Konferensbidrag (Refereegranskat)
    Abstract [en]

    During the last couple of decades, a growing body of research has provided insights into the complex processes of learning that take place in museums. Interestingly, museum-related learning is not limited to the actual visit: what takes place before and afterwards has a profound effect on the learning outcome. The study presented in this paper focuses on the post-visit aspects of the learning process.

    Previous research shows that visitors make connections between their experiences in the museum and experiences that happen after the visit. Sometimes these connections can occur weeks or months (or even years) after the visit, depending on when the visitor happens upon a situation that allows the connection to be made.

    Documenting these events is obviously quite difficult. Even though it is possible to re-establish contact with visitors after a few weeks or months (e.g., through telephone or e-mail), the information obtained is not in situ. The goal of the present study is to attempt to acquire and analyze more data from these in situ situations, and to re-present the data in an exhibition. To this end, we have designed a system that allows visitors to send images and text messages to a central server through e-mail, SMS or MMS. The data from the server can then be visualized as a weblog (blog) or in some other suitable form.

    We collaborated with the Museum of Science and Technology in Stockholm, Sweden. A large part of the Museum's Science Centre is devoted to five mechanical principles: the screw, the plane slope, the lever, the wheel and the wedge. We have designed an exhibit that utilizes our system to present messages (images and text) from visitors on the subject of the five principles in the science centre itself. It is also possible to access the messages through a public Web page.

    From the Museum's perspective, our exhibit not only provides new opportunities for documenting post-visit learning processes, but also has the potential to provide new forms of evaluation data that might be difficult to obtain through other means. Furthermore, it allows Museum visitors to extend the original scope of the mechanical principles exhibition by allowing them to provide their own content (and reflections upon the existing content),  a re-occurring theme in many recent technology-based exhibits.

    The paper provides a description of our system, the exhibit we have built, how the exhibit is managed, and how it has worked in practice.

     

  • 7008.
    Taysun, Necirvan
    et al.
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik.
    Vennberg, Tony
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik.
    Öppen källkod GIS-ramverk för mobil fältinmätning offline: Analys av lämpliga GIS-ramverk för skogsindustrin2018Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    I dagsläget saknas ett effektivt sätt att ute i fält kunna mäta in sträckor och tillhörande kartobjekt vid planering av nybyggnation av vägar. Skogsbolagen önskar att kunna göra detta med en mobil enhet med eller utan internetuppkoppling med hjälp av ett geografiskt informationssystems-ramverk med öppen källkod. Därför har vi utfört en fallstudie. Det vi behövde ha svar på var vilka krav som ställts på en sådan lösning. Dessa krav fördes fram genom en intervju med en person hos vår samarbetspartner som hade haft kontakt med ett skogsbolag.

    Vi identifierade åtta ramverk varav fem återstod efter sållningen. Sållningen utfördes genom att avfärda ramverk som ej uppfyllde de huvudkrav framförda genom intervjun. Dessa fem ramverk analyserades genom att ta fram för- och nackdelar baserat på hur väl dessa ramverk uppfyllde de jämförelsekriterier vi tagit fram. Jämförelsekriterierna baserades på kraven vi fick fram genom intervjun, samt ytterligare kriterier som ansågs vara viktiga vid arbete med öppna källkods-lösningar. Som t.ex. kvalitén på ramverkets dokumentation, när ramverket senast uppdaterades, kostnad mm.

    Det ramverk som vi slutligen kunde rekommendera var “Mapbox”. Detta ramverk hade inte den högsta kravtäckningen av de kraven framförda genom intervjun. Dock beslutade vi att det var det lämpligaste valet då sett till de övriga kriterierna gällande öppna källkods-lösningar så hade Mapbox bäst förutsättningar.

  • 7009.
    Tchape, Philippe
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Wilcox, Colin
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Social Media and the impact of business hierarchy on knowledge sharing within an organization: Case of SoftX.2016Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In a rapidly growing global economy businesses must effectively manage their assets to remain competitive and promote company growth. Many companies are only now beginning to realize that employee knowledge is a valuable asset to their business and also needs to be managed. Organizations are exploring different ways to improve the sharing of knowledge within a business and how to keep employee’s with key knowledge within the business. This study investigates social media and the impact of business hierarchy on knowledge sharing within an organization. The use of social media, in our particular case, wikis, within an organization is investigated as part of the broader term Enterprise 2.0. This study is based on the theoretical understanding of wikis as tools that enable internalization, externalization and objectification of knowledge. This study investigates what may be the contributing factors that affect an employee’s use of a centralized wiki for knowledge sharing.

    This study focuses on the employees of a British software development and training company, SoftX, and used a mixed method research strategy based on the use of online surveys and face-to-face interviews. We used an online tool, SurveyMonkey, to register and correlate responses to our survey. In total, 99 responses were received and semi-structured, face-to-face interviews were conducted with five employees.   Correlations were used in establishing foundation for the analysis of the variables. Finally, the causality between the assumed factors affecting the use of the SoftX wiki is tested using multiple linear regression analysis.

    Several important factors presented themselves as a result of our study at SoftX which could explain the apparent lack of use of their wiki as a means of knowledge sharing within the business. The analysis demonstrates that the use of the SoftX's wiki by employees was influenced by organizational, personal and technological factors. 

  • 7010.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    A computational paradigm of science and its discontents2015Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    A number of theoretical and technical innovations in the 1930s and 1940s led to a new era of computing, and computing started to develop as an independent academic discipline. Some pioneers of computing emphasized the theoretical elements of science, advocating a mathematical view of computing as a discipline. Others distanced computing from natural sciences and championed for academic legitimacy of sciences of the artificial. At the time when experimental computer science debates emerged, many meta-studies compared research in computing with natural sciences and engineering, condemning computing as methodologically deficient. But in the new century, the success of computing in many scientific applications made computing, in the minds of many, a "paradigm" for other sciences: Computing can learn from nature, or it might be the best tool for studying natural phenomena, or it might actually be what nature does. This talk describes the journey of computing from a nascent young field struggling for legitimacy to the views that computing might not be only "a" science but "the" science.

  • 7011.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    A Computational Paradigm of Science and its Discontents2015Ingår i: 11th European Computer Science Summit, 2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    A number of theoretical and technical innovations in the 1930s and 1940s led to a new era of computing, and computing started to develop as an independent academic discipline. Some pioneers of computing emphasized the theoretical elements of science, advocating a mathematical view of computing as a discipline. Others distanced computing from natural sciences and championed for academic legitimacy of sciences of the artificial. At the time when experimental computer science debates emerged, many meta-studies compared research in computing with natural sciences and engineering, condemning computing as methodologically deficient. But in the new century, the success of computing in many scientific applications made computing, in the minds of many, a "paradigm" for other sciences: Computing can learn from nature, or it might be the best tool for studying natural phenomena, or it might actually be what nature does. This talk describes the journey of computing from a nascent young field struggling for legitimacy to the views that computing might not be only "a" science but "the" science.

  • 7012.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Competing Claims to Computing as a Discipline2015Ingår i: 15th Congress of Logic, Methodology and Philosophy of Science CLMPS 2015: Book of Abstracts, Helsinki: University of Helsinki , 2015Konferensbidrag (Refereegranskat)
  • 7013.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Competing Claims to Computing as a Discipline (Invited talk)2015Ingår i: 15th Congress of Logic, Methodology and Philosophy of Science, University of Helsinki , 2015Konferensbidrag (Refereegranskat)
  • 7014.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Keynote talk: competing viewpoints on experimentation in computing2012Övrigt (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    A keynote talk given at European Computer Science Summit 2012, Workshop on the Role and Relevance of Experimentation in Informatics

  • 7015.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Methodology Education in Computing: Towards a Congruent Design Approach2013Ingår i: Proceeding of the 44th ACM technical symposium on Computer science education, New York: Association for Computing Machinery (ACM), 2013, s. 159-164Konferensbidrag (Refereegranskat)
    Abstract [en]

    All major computing curricula recommendations mention methodological skills and knowledge as an important learning objective in undergraduate and graduate education. None of those curricula recommendations, however, include a meth- odology course for students. One reason for that lack might be the stunning diversity of computing fields and the unique methods each branch of computing uses in their research. A methodology course in computing has to make a choice be- tween three options: a narrow but deep specialization in some techniques and methods, a broad but superficial covering of a large number of methods, and a higher-level view on the principles of methodology and research design. This paper adopts the high-level approach, and presents a course description for a methodology course that aims at providing students understanding of how the elements of a research study link together.

  • 7016.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Panelist: Experiments in Computer Science: Are Traditional Experimental Principles Enough?2012Övrigt (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    A panel talk given at European Computer Science Summit 2012.

  • 7017.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The Science of Computing: shaping a Discipline2014Bok (Övrigt vetenskapligt)
    Abstract [en]

    The identity of computing has been fiercely debated throughout its short history. Why is it still so hard to define computing as an academic discipline? Is computing a scientific, mathematical, or engineering discipline? By describing the mathematical, engineering, and scientific traditions of computing, The Science of Computing: Shaping a Discipline presents a rich picture of computing from the viewpoints of the field’s champions. The book helps readers understand the debates about computing as a discipline. It explains the context of computing’s central debates and portrays a broad perspective of the discipline. The book first looks at computing as a formal, theoretical discipline that is in many ways similar to mathematics, yet different in crucial ways. It traces a number of discussions about the theoretical nature of computing from the field’s intellectual origins in mathematical logic to modern views of the role of theory in computing. The book then explores the debates about computing as an engineering discipline, from the central technical innovations to the birth of the modern technical paradigm of computing to computing’s arrival as a new technical profession to software engineering gradually becoming an academic discipline. It presents arguments for and against the view of computing as engineering within the context of software production and analyzes the clash between the theoretical and practical mindsets. The book concludes with the view of computing as a science in its own right—not just as a tool for other sciences. It covers the early identity debates of computing, various views of computing as a science, and some famous characterizations of the discipline. It also addresses the experimental computer science debate, the view of computing as a natural science, and the algorithmization of sciences.

  • 7018.
    Tedre, Matti
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Three Debates about Computing2013Ingår i: The Nature of Computation. Logic, Algorithms, Applications: Proceedings / [ed] Paola Bonizzoni, Vasco Brattka, Benedikt Löwe, Springer Berlin/Heidelberg, 2013, s. 404-413Konferensbidrag (Refereegranskat)
  • 7019.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Apiola, Mikko
    University of Helsinki, , Department of Computer Science.
    Three computing traditions in school computing education2013Ingår i: Improving computer science education / [ed] Djordje M. Kadijevich, Charoula Angeli, Carsten Schulte, New York: Routledge , 2013Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 7020.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Brash, Danny
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Männikkö-Barbutiu, Sirkku
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Cronjé, Johannes
    Towards Identification and Classification of Core and Threshold Concepts in Methodology Education in Computing2014Ingår i: "ITICSE '14: proceedings of the 2014 Innovation & Technology in Computer Science Education Conference, New York: ACM Press, 2014, s. -242Konferensbidrag (Refereegranskat)
    Abstract [en]

    Research methodology is a quintessential component of science, but methods differ greatly between sciences. In computing, methods are borrowed from many fields, which causes difficulties to methodology education in computing. In our methodology courses in computing, we have observed a number of core and threshold concepts that affect students’ success. This essay describes a work in progress towards under- standing those core and threshold concepts in methodology education in computing, classified along two dimensions. We classify methodological concepts in terms of standard elements of research design in students’ projects in computing, and in terms of their centrality and difficulty. We present examples of three types of troublesome knowledge concerning methodology: the strangeness and complexity of methodological concepts, misimpressions from everyday experience, and reasonable but mistaken expectations.

  • 7021.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Chuma, Veronica
    Apiola, Mikko
    Survey on Mobile Phone Battery End-Life in Tanzania2013Ingår i: Africon 2013: Proceedings, IEEE conference proceedings, 2013, s. 1-5Konferensbidrag (Refereegranskat)
    Abstract [en]

    Tens of tons of mobile phone batteries and other mobile technology are imported in Tanzania every year. It is, however, still unclear what happens to mobile devices in the end of their life cycle. This study combined qualitative and quantitative methods to explore what happens to mobile batteries after their useful lifespan. The study found that one third of the respondents threw away their used mobile phone batteries, while most other respondents re-used batteries or kept them at home. There was very little indication of recycling activities, and knowledge about used mobile device recollection was uncommon. This study found little or no connection between environmental awareness and age, education, gender, or other demographic variables: habits of waste disposal remained the same across demographics.

  • 7022.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap. University of Eastern Finland, Finland.
    Denning, Peter J.
    Shifting Identities in Computing: From a Useful Tool to a New Method and Theory of Science2017Ingår i: Informatics in the Future: Proceedings of the 11th European Computer Science Summit (ECSS 2015), Vienna, October 2015 / [ed] Hannes Werthner, Frank van Harmelen, Cham, Switzerland: Springer Publishing Company, 2017, s. 1-16Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Following a number of technological and theoretical breakthroughs in the 1930s, researchers in the nascent field of automatic computing started to develop a disciplinary identity independent from computing's progenitor fields, mainly electrical engineering and mathematical logic. As the technology matured in the next four decades, computing emerged as a field of great value to all of science and engineering. Computing's identity as an academic discipline was the subject of many spirited debates about areas of study, methods, curricula, and relations with other fields. Debates over the name of the field and its relations with older academic departments occupied many hours and journal pages. Yet, over time computing revolutionized practices, then principles, of science and engineering. Almost every field - not just science and engineering, but also humanities - embraced computing and developed its own computational branch. Computing triumphed over all the doubts and became the most important player in science today.

  • 7023.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Denning, Peter J.
    The Long Quest for Computational Thinking2016Ingår i: Proceedings of the 16th Koli Calling International Conference on Computing Education Research, Association for Computing Machinery (ACM), 2016, s. 120-129Konferensbidrag (Refereegranskat)
    Abstract [en]

    Computational thinking (CT) is a popular phrase that refers to a collection of computational ideas and habits of mind that people in computing disciplines acquire through their work in designing programs, software, simulations, and computations performed by machinery. Recently a computational thinking for K–12 movement has spawned initiatives across the education sector, and educational reforms are under way in many countries. However, modern CT initiatives should be well aware of the broad and deep history of computational thinking, or risk repeating already refuted claims, past mistakes, and already solved problems, or losing some of the richest and most ambitious ideas in CT. This paper presents an overview of three important historical currents from which CT has developed: evolution of computing’s disciplinary ways of thinking and practicing, educational research and efforts in computing, and emergence of computational science and digitalization of society. The paper examines a number of threats to CT initiatives: lack of ambition, dogmatism, knowing versus doing, exaggerated claims, narrow views of computing, overemphasis on formulation, and lost sight of computational models.

  • 7024.
    Tedre, Matti
    et al.
    Tumaini University, , .
    Hansson, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Mozelius, Peter
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Lind, Säde
    University of Eastern Finland, , School of Computing.
    Crucial Considerations in One-to-One Computing in Developing Countries2011Ingår i: IST-Africa 2011, Paul Cunningham and Miriam Cunningham (Eds) , 2011Konferensbidrag (Refereegranskat)
    Abstract [en]

    One-to-one computing has lately become one of the buzzwords in the educational technology initiatives in developing countries. Various versions of one-to-one computing have recently been implemented around the developing world. Governments and educational organizations have often felt a pressure to acquire new technology as an effort to leapfrog development, but this has in most cases been done without any deeper analysis of the complete framework that successful one-to-one computing initiatives require. A number of One Laptop Per Child (OLPC) projects have subscribed to the view that one-to-one computing should not delve into non-technical areas like teacher training, curriculum development, or content development. We, however, consider the non-technical issues to be of great importance for the success of computer-enhanced learning in primary schools. This paper presents and analyzes nine crucial and often neglected considerations for successfully implementing one-to-one computing initiatives: a pedagogical framework, teacher training, a support model, content in local languages, adaptation to local conditions, parental agreement and support, monitoring and evaluation, administrative support, and sustainability. We disagree with the view that one-to-one computing is only about leveraging the children themselves. By properly considering our nine propositions, one–to–one computing initiatives can increase their positive impacts in primary schools in developing regions.

  • 7025.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    John, Pajunen
    An easy approach to epistemology and ontology in computing theses2013Ingår i: Proceedings of the 13th Koli Calling International Conference on Computing Education Research, New York: Association for Computing Machinery (ACM), 2013, s. 97-104Konferensbidrag (Refereegranskat)
    Abstract [en]

    In many research fields---notably social sciences but also in those fields where design, experiment-based science, and social sciences are mixed---researchers must often describe their epistemological and ontological commitments in research reports. The research literature describes those commitments in various ways, often grouped under research paradigms such as positivism, post-positivism, and constructivism, and described as "world views." This paper presents the bare bones of the ontological and epistemological questions in scientific practice. Ontologically speaking, subject matters can be mind-dependent or mind-independent. Epistemologically speaking, elements of research may be more or less open to interpretation. This paper introduces a simplified approach to standard research terminology for computing and engineering students by offering a rough-and-ready way for resolving ontological and epistemological questions.

  • 7026.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Josephat, Oroma
    Pasanen, Tomi
    Ngumbuke, Fredrick
    Sutinen, Erkki
    McIntyre, Dan
    Four Years of IT Program Development in Tanzania2012Ingår i: IST-Africa 2012: Conference Proceedings / [ed] Paul Cunningham & Miriam Cunningham, Dar es Salaam, Tanzania: IIMC International Information Management Corporation , 2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    It has been shown that national, regional, and local needs must be taken into account in successful IT (information technology) education. Educational programs need to be contextualized to utilize particular strengths of their context of deployment, and they need to meet particular educational, social, and workforce strategic objectives. Based on those premises, Tumaini University in Iringa, Tanzania, started a contextualized IT program in 2007. To date, two cohorts of students have graduated, and the program has somewhat stabilized. This joint paper reports participant observation over a time-span of four and a half years, as analyzed by the IT program’s four previous heads of department, ICT director of the college, and the college’s director for research and postgraduate studies. The paper identifies 8 major success factors and 40 SWOT analysis items for IT education development. Our analysis makes 18 pedagogical, administrative, curricular, technical, sociocultural, and financial recommendations for development of IT education in the Tanzanian context.

  • 7027.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Moisseinen, Nella
    University of Helsinki.
    Experiments in Computing: A Survey2014Ingår i: Scientific World Journal, ISSN 1537-744X, E-ISSN 1537-744X, s. 549398-Artikel, forskningsöversikt (Refereegranskat)
    Abstract [en]

    Experiments play a central role in science. The role of experiments in computing is, however, unclear. Questions about the relevance of experiments in computing attracted little attention until the 1980s. As the discipline then saw a push towards experimental computer science, a variety of technically, theoretically, and empirically oriented views on experiments emerged. As a consequence of those debates, today's computing fields use experiments and experiment terminology in a variety of ways. This paper analyzes experimentation debates in computing. It presents five ways in which debaters have conceptualized experiments in computing: feasibility experiment, trial experiment, field experiment, comparison experiment, and controlled experiment. This paper has three aims: to clarify experiment terminology in computing; to contribute to disciplinary self-understanding of computing; and, due to computing's centrality in other fields, to promote understanding of experiments in modern science in general.

  • 7028.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Verhagen, Harko
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Methodology Education in Computing: Arrangements and Results from Two Courses2014Ingår i: 2014 IEEE Frontiers in Education Conference Proceedings, IEEE Computer Society, 2014, s. 668-673Konferensbidrag (Refereegranskat)
    Abstract [en]

    Methodology education is one of the less studied and discussed areas of computing education. Underplaying methodological education starts from computing curricula, which discuss methodology to different degrees, depending on the branch of computing. In computer science education research, programming courses have been analyzed through and through, but methodology courses in computing are largely devoid of course descriptions, analytic studies, and experimental studies. This paper presents the learning objectives, contents, and arrangements for a fully online graduate level course on methodology and research design in computing. The course was run twice in a relatively large school of computing (5700 students) and it included students from a neighboring institution of the same size. Students' (N=136) learning was analyzed from multiple viewpoints. Their final work was analyzed qualitatively by course facilitators as well as scored on a 90-point scale. Their coursework was qualitatively reviewed and graded by their peers and facilitators. The effect of students' learning approaches to course results was analyzed using Biggs' R-SPQ-2F questionnaire. Student feedback was collected using a slightly modified course feedback questionnaire of the university. This paper presents the course arrangements, course results, and analysis of students' learning.

  • 7029.
    Tedre, Matti
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Wikedzi, Timothy
    Central Questions of ICT & Ethics: IT Ethics Course Design in Tanzania2012Ingår i: IST-Africa 2012: Conference Proceedings / [ed] Paul Cunningham & Miriam Cunningham, Dar es Salaam, Tanzania: IIMC International Information Management Corporation , 2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    The proliferation of information and communication technology has brought up a wide variety of ethical questions that have not before been a concern in Tanzania. When the possibilities of technology are new, one rarely even notices the deep ethical questions arising from its use or misuse. In the popular media the typical ethical questions are concerned with criminal uses of technology, or with immediately perceivable surface phenomena, such as spread of offensive or illegal material. ICT ethics, however, is a much broader topic, and ICT professionals must have a good understanding of the issues involved as well as the practical implications of those issues. This paper discusses from a Tanzanian viewpoint, firstly, the central questions of ethics that ICT professionals must be aware of. Secondly, this paper presents the pedagogical vehicles for educating Tanzanian students about those questions. Thirdly, this paper presents the course design and content for an e-learning course that was designed to bring the abstract ethical questions into life in a Tanzanian e-learning course.

  • 7030.
    Tegelberg, Charlotta
    Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), Handelshögskolan (from 2013).
    Critical Success Factors Influencing the Degree of Alignment Between a Business Process and a CRM System: A Case Study of an IT Company2018Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    The need for information in real time and the technology development has become more fast and more efficient. Companies today need to be more responsive to their customers to stay on top. Also, companies’ business processes need effective support from information technology solutions. The fit, or alignment, between the business process and the Customer Relationship Management (CRM) system design is crucial in order to leverage efforts within marketing and sales. If there is a misfit, companies do not take full advantage of the potential that CRM systems can leverage in terms of better managing relationships with customers, which in turn may result in higher rates of closed deals.

    The main purpose of this bachelor thesis in Information Systems is to identify and describe critical success factors influencing on the degree of alignment between a business process and a CRM system from an organisational perspective. The sub-purpose is to identify and describe the influence of process−system alignment on performance.

    The IT company Apica has been used as the case study company in the bachelor thesis. Apica is suitable for this study since it has already adopted a CRM system related to its sales process. A research literature-based analysis model was developed in order to be able to more precisely investigate the chosen purpose. The intention is to review critical success factors that influence the success of the process−system alignment.

    In the chosen qualitative approach, a semi-structured interview guide was developed, based on the analysis model. Five interviews with co-workers in the case study company were conducted.

    The analysis of the collected primary empirical data has led to the following conclusions. A high degree of process−system alignment concerning a well-defined and functional business process in relation to a CRM system has a positive influence on the company’s sales process performance. A higher degree of process−system alignment can improve the company’s process performance, increase the sales force productivity and lead to better decision making. According to the findings, the positive outcome of a process−system alignment depends mainly on three factors: management commitment, data management, and system integrations. The empirical results also suggests a new finding: A successfully aligned sales process with the CRM system also lead to knowledge sharing. Knowledge sharing contributes to that salespeople learn from deals made in the past. The historical data help salespeople in managing customer relationships, which may lead to shorter sales cycles and larger deal sizes, which implies increased sales. 

  • 7031. Tegin, Johan
    et al.
    Iliev, Boyko
    Örebro universitet, Akademin för naturvetenskap och teknik.
    Skoglund, Alexander
    Örebro universitet, Akademin för naturvetenskap och teknik.
    Kragic, Danica
    Royal Institute of Technology (KTH).
    Wikander, Jan
    Royal Institute of Technology (KTH).
    Real life grasping using an under-actuated robot hand: simulation and experiments2009Ingår i: ICAR 2009: 14th international conference on advanced robotics, vols 1-2, New York: IEEE conference proceedings, 2009, s. 366-373Konferensbidrag (Refereegranskat)
    Abstract [en]

    We present a system which includes an under-actuated anthropomorphic hand and control algorithms for autonomous grasping of everyday objects. The system comprised a control framework for hybrid force/position control in simulation and reality, a grasp simulator, and an under-actuated robot hand equipped with tactile sensors.We start by presenting the robot hand, the simulation environment and the control framework that enable dynamic simulation of an under-actuated robot hand. We continue by presenting simulation results and also discuss and exemplify the use of simulation in relation to autonomous grasping. Finally, we use the very same controller in real world grasping experiments to validate the simulations and to exemplify system capabilities and limitations.

  • 7032.
    Tegsved, Magnus
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Kritisk reflektion av använd teori för införande av digitala teknologier, ”Tidsläckage Teorin”.2018Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Tid är viktigt i alla verksamheter och tid har ett ekonomiskt värde som ofta glöms bort. Det är därför viktigt att förstå vad som händer med tiden när organisationer väljer att digitalisera sig.Denna artikel syftar på att visa vilket ekonomiskt värde som uppstår i en organisation med införandet av digitala teknologier och med användningen av”Tidsläckage Teorin”.

  • 7033.
    Tell, Anders W.
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henkel, Martin
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Perjons, Erik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    A Method for Situating Capability Viewpoints2016Ingår i: Perspectives in Business Informatics Research: 15th International Conference, BIR 2016, Prague, Czech Republic, September 15–16, 2016, Proceedings / [ed] Václav Řepa, Tomáš Bruckner, Springer, 2016, s. 278-293Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents a method that is used to enrich existing architecture frameworks or methods by enabling development of situated capability viewpoints. The method addresses the issue that in many cases viewpoint definitions suggest a singular way to consider and model a domain. This issue is particularly prevalent in frameworks developed by one profession, such as IT architects, where general concepts, such as capability and service, may have narrow definitions. The method we suggest is to start with a base capability viewpoint and then tailor that into specific situated capability viewpoints by incorporating situational concerns. Each tailored viewpoint supports a stakeholder’s work situation and aims to increase intended and actual use of capability analysis. The method is built upon the ISO 42010 standard, an extendable base capability viewpoint, and concepts from method engineering. The method is demonstrated by applying it to the Strategy Map framework by Kaplan and Norton.

  • 7034.
    Temesghen, Henok
    Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT.
    Facebook bland studenter: Störningsmoment eller hjälpmedel?2017Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Digitala plattformar som sociala medier har revolutionerat sättet vi interagerar och kommunicerar med andra människor. 77% av den svenska befolkningen använder sig av sociala medier och denna siffra kommer bara att fortsätta stiga. Av dessa plattformar är det kanske mest spridda och populära sociala nätverket Facebook, som är värd för nästan 2 miljarder dagliga användare världen över.

    I denna studie ligger fokus på studenter och den påverkan som Facebook har på deras skolarbete. Med påverkan på skolarbetet menas de effekter som användandet av den sociala plattformen ger upphov till. I detta fall innebär det huruvida användandet av Facebook bland studenter påverkar koncentrationen på deras skolarbete. Även om det finns flera allmänna fördelar av att använda sig av sociala medier finns det ett kunskapsgap gällande deras övergripande påverkan på studentpopulationen. Studien bidrar till att analysera användandet av sociala medier i relation till inlärning, genom att specifikt analysera Facebook, och den påverkan som Facebook kan ha på inlärningsaktiviteter.

    För att kunna besvara forskningsfrågan har en kvantitativ metod använts. En webbaserad enkätundersökning med stängda frågor valdes som verktyg för datainsamling. Enkäten distribuerades via sociala medier till grupper där majoriteten av medlemmarna var studenter, specifikt riktade mot studenter vid Högskolan i Borås. Enkäten har på uppmaning av författarna vidare delats av dessa medlemmar till andra studenter. Att använda sig av sociala medier för att sprida enkäten var optimalt då undersökningen enbart riktar sig in mot användare av Facebook. Totalt har 147 svar har samlats in från enkätundersökningen.

    För att svara på om Facebook fungerar som antingen ett hjälpmedel eller ett störningsmoment i samband med skolarbete behövs vidare forskning. En analysering av enkätundersökning gav upphov till indikatorer som visar på att den påverkan som Facebook kan ha på studenter i samband med egenstudier kommer i två olika former. Påverkan som rör användares beteende, exempelvis att studenterna inte är medvetna hur lång tid det tar att återgå till skolarbetet efter ett oplanerat avbrott, och påverkan vilket uppstår som ett resultat av specifik funktionalitet i Facebook. Detta kan vara att vissa funktioner har större chans att distrahera användarna från skolarbetet. Undersökningen identifierade även vilka åtgärder studenter tar för att undvika att bli negativt påverkade av Facebook under skolarbete. Implikationerna från studiens resultat skapar en grund för nya studier som berör sociala medier. Resultatet kan vidare användas i förbättringssyfte för vidare forskning inom digitala plattformar.

  • 7035.
    Tempe, Marcus
    Högskolan i Skövde, Institutionen för datavetenskap.
    Caveat Lector: Läsaren må se upp!2001Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Internet är ett globalt nätverk som förser en användare med ofantliga mängder information. Internet ger även användaren den unika möjligheten att själv publicera sin information utan någon form av kontroll. Den möjligheten har gjort att mycket missvisande och falsk information finns tillgänglig på Internet. Det är helt upp till användaren att försöka avgöra om informationen är sann, giltig och korrekt, det vill säga trovärdig, frågan är bara om användaren gör det?

    Följande examensarbete har undersökt om en erfaren Internetanvändare utför någon form av källkritisk granskning, eller överhuvudtaget funderar över trovärdigheten hos information från webben. För att besvara ovanstående fråga har en enkätundersökning genomförts på olika datastudenter som studerar vid Högskolan i Skövde.

    Slutsatserna från enkätundersökningen var att studenterna tänker ofta på om information från webben är trovärdig. De utför även stundtals någon form av källkritisk granskning på informationen. Dock ansåg många att de hade bristande kunskaper att utvärdera trovärdigheten hos informationen från webben.

  • 7036.
    Tengbjörk, David
    et al.
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Zaitzewsky Micales, Jacinto
    Örebro universitet, Handelshögskolan vid Örebro Universitet.
    Internetanvändares upplevelse av onlineintegritet - En studie med kvantitativa och kvalitativa undersökningar om internetanvändares upplevelse av onlineintegritet2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
  • 7037. Tengstrand, Lisa
    et al.
    Megyesi, Beata
    Henriksson, Aron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Duneld, Martin
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kvist, Maria
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    EACL - Expansion of Abbreviations in CLinical text2014Ingår i: Proceedings of the 3rdWorkshop on Predicting and Improving Text Readability for Target Reader Population, Association for Computational Linguistics , 2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    In the medical domain, especially in clinical texts, non-standard abbreviations are prevalent, which impairs readability for patients. To ease the understanding of the physicians’ notes, abbreviations need to be identified and expanded to their original forms. We present a distributional semantic approach to find candidates of the original form of the abbreviation, and combine this with Levenshtein distance to choose the correct candidate among the semantically related words. We apply the method to radiology reports and medical journal texts, and compare the results to general Swedish. The results show that the correct expansion of the abbreviation can be found in 40% of the cases, an improvement by 24 percentage points compared to the baseline (0.16), and an increase by 22 percentage points compared to using word space models alone (0.18).

  • 7038.
    Tenhunen, Katja
    et al.
    Södertörns högskola, Institutionen för kommunikation, teknik och design.
    Holm, Jannica
    Södertörns högskola, Institutionen för kommunikation, teknik och design.
    Webbhjälpmedel för synskadade2002Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Syftet med uppsatsen är att ta reda på hur de synskadade kan ta till sig information på Internet. Även de synskadade ska ha rätt till att kunna använda sig av Internet som alla andra. Vi ska också undersöka vilka webbhjälpmedel som finns till hands för de synskadade idag och hur dessa webbhjälpmedel fungerar i praktiken. Vilka problem som man kan stöta på när man använder sig av dessa webbhjälpmedel? Vi ska även undersöka hur mycket webbplatsernas utformning påverkar de synskadades Internetanvändning. Dagens webbplatser tenderar att använda mer och mer grafik utan alternativa texter. De hjälpmedel som en synskadad person använder har svårt att tolka detta, vilket leder till att många webbplatser är otillgängliga för denna grupp av människor. Vi har intervjuat nio synskadade och helt blinda personer för att få en inblick i hur de använder sig av Internet, vilka hjälpmedel som är vanliga och hur dessa hjälpmedel fungerar i praktiken. Vi kom fram till att synskadade idag är relativt beroende av Internet och att de använder sig av webbplatser på Internet som de känner till sedan tidigare. De personer som vi har talat med upplever att det är väldigt många webbplatser som inte är anpassade för synskadade personer. Samtidigt upptäckte vi att tekniken faktiskt finns som kan tolka grafiken på Internet, men att denna teknik inte är tillgänglig mycket beroende på att syncentralerna som delar ut dessa hjälpmedel inte inser vikten av att uppdatera dessa hjälpmedel oftare.

  • 7039.
    Tennlin, Tomas
    Mälardalens högskola, Akademin för innovation, design och teknik.
    Redesign av Mini-Q2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Detta dokument redogör för en användbarhetsundersökningav programmet Webb-MiniQ. Undersökningen innefattar eninledande fas med intervjuer och genomgångar. En fas med 6deltagare som deltog i användbarhetstest, kortsortering ochsvarade på enkätfrågor. Sista fasen utgörs av analys avresultatet samt produktion av designförslag. Analysen avmaterialet indikerade ett stort antal problem (22 unika plusaspekter som framträdde under genomgångarna) medanvändbarheten, designförslagen syftar till att komma tillrättamed majoriteten av dessa.Detta dokument redogör för en användbarhetsundersökningav programmet Webb-MiniQ. Undersökningen innefattar eninledande fas med intervjuer och genomgångar. En fas med 6deltagare som deltog i användbarhetstest, kortsortering ochsvarade på enkätfrågor. Sista fasen utgörs av analys avresultatet samt produktion av designförslag. Analysen avmaterialet indikerade ett stort antal problem (22 unika plusaspekter som framträdde under genomgångarna) medanvändbarheten, designförslagen syftar till att komma tillrättamed majoriteten av dessa.

  • 7040.
    Tercero, Miurel
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Sung, Ki Won
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Zander, Jens
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Aggregate Interference from Secondary Users with Heterogeneous Density2011Ingår i: 2011 IEEE 22nd International Symposium On Personal Indoor And Mobile Radio Communications (PIMRC), IEEE , 2011, s. 428-432Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper presents an analytical model to approximate the probability distribution function of the aggregate interference that a primary user receives from multiple secondary transmitters. In particular, we consider heterogeneity in spatial distribution of secondary users such that there are several sites with densely populated secondary users in the whole area. The concentration of secondary users is modeled as an annulus sector with higher user density, which is termed hot zone. The mathematical framework presented in this paper can readily be adapted to various existing interference models. It is observed that the heterogenous user distribution has a considerable impact on the aggregate interference if the hot zone is near the primary receiver, while hot zones over a certain distance is well approximated by a homogeneous secondary user distribution. The aggregate interference also depends on the shape of the hot zone and the interference threshold imposed on the secondary users.

  • 7041.
    Tercero, Miurel
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth. National University of Engineering (UNI), Nicaragua.
    Sung, Ki Won
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Zander, Jens
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Impact of aggregate interference on meteorological radar from secondary users2011Ingår i: IEEE Wireless Communications and Networking Conference (WCNC), IEEE , 2011, s. 2167-2172Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we investigate the impact of aggregate interference in a secondary spectrum access system. Particularly, meteorological radar operating in 5.6 GHz band is considered to be a primary user. Secondary users are WLAN devices spreading in a large area which induce aggregate interference to the radar. We develop a mathematical model to derive the robability distribution function (PDF) of the aggregate interference. The derivation considers dynamic frequency selection (DFS) mechanism for the protection of the radar such that the transmission of each WLAN is regulated by an interference threshold. Numerical experiments are performed with various propagation environments and densities of WLAN devices. It is observed that the effect of aggregate interference is severe in a rural environment. The interference threshold for individual WLAN should be much lower than the maximum tolerable interference at the radar. Thus, only a limited number of WLANs can transmit at the same time. On the other hand, adverse effect of the aggregate interference is not shown in an urban environment, where up to 10 WLANs per square kilometer can use the radar spectrum without considering the aggregate interference. The framework discussed in this paper can readily be adapted to assess the aggregate interference for other types of radars.

  • 7042.
    Tercero, Miurel
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Sung, Ki Won
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Zander, Jens
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS. KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, KTH Center för Trådlösa System, Wireless@kth.
    Temporal secondary access opportuities for WLAN in radar bands2011Ingår i: Wireless Personal Multimedia Communications (WPMC), 2011 14th International Symposium on, Elsevier, 2011, s. 6081515-Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we quantify the temporal opportunities for secondary access in radar bands. In our study, WLANs are secondary users homogeneously or heterogeneously distributed, which opportunistically access the radar spectrum. Each WLAN employs dynamic frequency  selection (DFS) as a mechanism to protect the radar from interference. We also consider an interference protection mechanism based on DFS and the prediction of the radar’s antenna pattern, which is termed Temporal DFS. We have the most of the time the probability of accessing the radar band are higher when Temporal DFS is used. As a consequence, there are more active WLANs when Temporal DFS mechanism is considered compare with normal DFS mechanism. This, shows once more that by having knowledge of the primary users activity secondary users can increase the probability of accessing the spectrum and improve spectrum utilization.

  • 7043.
    Tercero Vargas, Miurel
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Kommunikationssystem, CoS.
    Topics in Dynamic Spectrum Access: Market Based Spectrum Sharing and Secondary User Access in Radar Bands2011Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    The steady growth in demand for spectrum has increased research interest in dynamic spectrum access schemes. This thesis studies some challenges in dynamic spectrum access based on two strategies: open sharing and hierarchical access. (1) In the open sharing model, the channels are allocated based on an auction process, taking into account the propagation characteristics of the channels, termed as channel heterogeneity. Two distributed dynamic spectrum access schemes are evaluated, sequential and concurrent. We show that the concurrent accessmechanismperforms better in terms of channel utilization and energy consumption, especially in wireless cellular network with an energy constraint. (2) In the hierarchical model, we assess the opportunities for secondary access in the radar band at 5.6GHz. The primary user is a meteorological radar and WLANs are the secondary users. The secondary users implement an interference protection mechanism to protect the radar, such that the WLAN’s transmission is regulated by an interference threshold. We evaluate the aggregate interference caused to the radar from multiple WLANs transmitting. We derive a mathematicalmodel to approximate the probability distribution function of the aggregate interference at the primary user, considering two cases: when secondary users are homogeneously distributed, and when they are heterogeneously distributed. The heterogeneous distribution of secondary users is modeled using an annulus sector with a higher density, called a hot zone. Finally, we evaluate opportunities for secondary access when WLANs employ an interference protection mechanism that considers the radar’s antenna pattern, such that temporal opportunities for transmission exist. The analytical probability distribution function of the interference is verified showing a good agrement with a Monte Carlo simulation. We show that the aggregate interference is sensitive to the propagation environment, thus in the rural case interference is more severe when compared to the urban case. In the evaluation of the hot zonemodel, we observe that the heterogenous distribution of secondary users has impact on the aggregate interference if the hot zone is near to the radar. The mathematical framework presented in this thesis can easily be adapted to assess interference to other types of primary and secondary users.

     

  • 7044.
    Ternström, Robert
    Södertörns högskola, Institutionen för kommunikation, medier och it.
    Hantering av den personliga integriteten inom e-handel: Enkätundersökning för registrerade användare på sidan tradera. Värden inom den personliga integriteten tas fram och andra viktiga faktorer för ett e-handelsföretag2012Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Allt fler företag väljer att vara webbaserade och ägna sig helt till e-handel. Samtidigt fortsätter antalet e-handelsföretag att öka i antal kraftigt. Företagens behov av personlig information och kunddata har även ökat för att förbli konkurrenskraftiga. Vilket skapar ett problem, behovet av denna personliga information hos företagen riskerar att inkräkta på användarens personliga integritet. Tidigare forskning presenterar inte mycket angående värdet av den personliga integriteten och de fördelar ett skyddande av detta genererar.  En empirisk studie bland svenska användare på e-handelssidan tradera där deltagarna delade deras åsikter och värden angående den personliga integriteten och e-handel utfördes och sammanställdes. Den personliga integriteten ses som ett värde för att utreda detta begrepp med en konceptuell utredning, som är en teori inom värdekänslig design. Bidraget till forskningen är ett ramverk för e-handelsföretag som handlar om hur de skall hantera den personliga integriteten. Arbetet har präglats mycket av inläsning som det har getts utrymme för inom rapporten. 

  • 7045.
    Teuber, Kristoffer
    Högskolan i Skövde, Institutionen för datavetenskap.
    Sensor Management in a Distributed Environment2003Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [en]

    In this work an investigation of the benefits and problems of implementing a tracker using sensor management is done. The tracker is implemented in a fusion node in a distributed radar simulator provided by Ericsson Microwave. To investigate this, a literature study of sensor fusion and sensor management is first done, after which a practical study is chosen as method. The fusion method presented in this work is then tested so that tests of sensor management, which depend upon implemented sensor fusion, can be trusted. Sensor management is tested by letting the system track a specific target in the simulated environment. The system is tested to see what impact the delay in the distributed environment has on the implemented system’s capability to track an object. Two different scenarios are chosen to test the system, where a scenario in this thesis is a fly-by of two aircrafts in the terrain covered by the radar sensors. To test the actual correctness of the system, three dimensional coordinates of the objects are used and Euclidian distance between the original value and the fused value is used as an error measurement. The results are then displayed in a series of graphs and tables.

    The results show that the chosen fusion algorithm works well with the unsynchronized data. The delay simulated in the system creates a great uncertainty where the object will be, but the presented prediction algorithm manages to find good estimates of the new positions of the object tracked. Loss of data however forces the system to use less information when estimating positions which leads to loss of track. Even though there is a long time delay the presented prediction algorithm can track the object for a period of time, until it looses track due to loss of data. It is also concluded that a system that manages to track an object using a narrow tracking beam is able to track more objects simultaneously using the same radar sensors.

  • 7046.
    Tevemark, Jonas
    Linköpings universitet, Institutionen för systemteknik.
    Intrusion Detection and Prevention in IP Based Mobile Networks2008Självständigt arbete på avancerad nivå (yrkesexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    Ericsson’s Packet Radio Access Network (PRAN) is a network solution for packet transport in mobile networks, which utilizes the Internet Protocol (IP). The IP protocol offers benefits in responsiveness and performance adaptation to data bursts when compared to Asynchronous Transfer Mode (ATM), which is still often used. There are many manufacturers / operators providing IP services, which reduce costs. The IP’s use on the Internet brings greater end-user knowledge, wider user community and more programs designed for use in IP environments. Because of this, the spectrum of possible attacks against PRAN broadens. This thesis provides information on what protection an Intrusion Prevention System (IPS) can add to the current PRAN solution.

    A risk analysis is performed to identify assets in and threats against PRAN, and to discover attacks that can be mitigated by the use of an IPS. Information regarding placement of an IPS in the PRAN network is given and tests of a candidate system are performed. IPS features in hardware currently used by Ericsson as well as missing features are pinpointed . Finally, requirements for an IPS intended for use in PRAN are concluded.

  • 7047.
    Thalji, Idriss
    et al.
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Institutionen för teknik och design.
    Zubair, Gaith
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Institutionen för teknik och design.
    A model for analysis and design of an integrated operations management system using systems engineering approach: A case study2007Självständigt arbete på grundnivå (yrkesexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Bakgrund: I allmänhet har operations verksamhet en del komplicerade system där friktion kan förekomma. De viktigaste systemen som har påverkan på operations verksamhet är produktion och underhålls system. Att behandla friktions förluster har varit svårt eftersom de både samverkar och delvis överlappar varandra. I dem här studien har olika fall av operationssystem behandlats med att först utveckla en modell, analysera och designa den integrerade operationssystemet för att få den billigaste och dem mest kostnads effektiva sätt att klara av.

    Metod: En modell har utvecklats baserat på de senaste metoderna genom att använda system paradigm metoder och systemtekniska angreppssätt.

    Resultat: Genom att använda fem sätt att analysera, sju bestämmelser extraherade, nio lösningar generade, valdes en av lösningarna och med lösningen som grund designades operations verksamhet.

    Slutsats: Resultatet förslog att operations verksamhet skall integrera organisation, process och kontroll ledningar och inte bara data ledningen.

  • 7048.
    Thell, Mats
    Högskolan i Skövde, Institutionen för datavetenskap.
    Utvärdering av kalenderöverföringsstandarden CAP2003Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Vi lever i ett stressigt samhälle där allt skall fungera och tiden är emot oss för det mesta. Ifall det gick att schemalägga alla händelser som skall och borde göras i ett gemensamt kalendersystem så skulle det förenkla situationen för många personer, som skall träffas eller andra händelser som kan uppstå. I detta arbete undersöks det ifall en ny öppen standard för kalenderöverföringar skulle fungera, samt om den är tillräckligt bra för att användas, eller om den skall undvikas. Inom arbetet implementeras en prototyp som baseras på denna kalenderöverföringsstandard. Den prototyp som framtogs, tillhandahåller de grundläggande funktionerna i CAP, jämförs med Microsoft Exchange. Slutsatserna av arbetet är att CAP är bra, enkelt och smidigt men protokollet är dock ej klart för att användas som en färdigutvecklad produkt.

  • 7049.
    Theodorsson, Mike
    et al.
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Rydiander, Ida
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Assuring Quality in Web-Based Information Systems: A quality-driven design model2007Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats
    Abstract [sv]

    Kvalitet har alltid varit ett begrepp svårt att fånga och tillämpa, speciellt när området Internet kommer in i bilden. Den här C-uppsatsen har således som syfte att undersöka och bryta ned kvalitetskonceptet samt presentera ett praktiskt tillvägagångsätt som kan utnyttjas under design processen. För att göra detta så har vi utvecklat en kvalitetsdriven designmodell, fokuserad runt fyra kvalitetsaspekter: tillgänglighet, användbarhet, navigation och interaktion. Genom att utnyttja praktiska och enkla tekniker och genom att mäta deras effektivitet i att utveckla kvalitet, så försöker den här studien att bevisa att kvalitet kan användas som en praktisk resurs. Kvalitet kan garanteras i alla designprojekt som involverar ett web-baserat informationssystem, genom användning av denna modell.

  • 7050.
    Thielen, Julia
    et al.
    Högskolan Väst, Institutionen för ekonomi och it, Avd för medier och design.
    Goffe, Karin
    Högskolan Väst, Institutionen för ekonomi och it, Avd för medier och design.
    Internet of Things och marknadsföring: En kvalitativ studie om användning av Internet of Things inom marknadsföring2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Syftet med studien är att kartlägga relationen mellan marknadsföring och Internet of Things. Målet är att bidra med ökad kunskap till marknadsförare och Internet of Things-utvecklare i att förstå vilka möjligheter och utmaningar det finns i att skapa marknadsföring med Internet of Things. För att utforska frågan har vi använt oss av forskningsansatsen induktivt angreppssätt samt gjort en kvalitativ tolkning av semistrukturerade djupintervjuer. Genom subjektivt urval har vi valt ut fem respondenter varav alla aktivt har arbetat med Internet of Things i kombination med marknadsföring och därav besitter erfarenhet och kunskap inom ämnet. Vi har analyserat respondenternas svar utifrån bland annat teorier och begrepp som involverar content marketing, context marketing, interactive marketing, Big data och Privacy by Design. Resultatet av studien visar på att kombinationen av Internet of Things och marknadsföring lämpar sig bäst till att utveckla kundrelationen mellan konsument och företag. Resultaten indikerar att störst potentiell nytta av IoT inom marknadsföring kan man se i interaktions- och relationsskapande aktiviteter som skapar ett ökat värde för konsumenten. Dessa möjligheter kan sammanfattas inom begreppet "mamma ser dig" och det är just det begreppet som konkretiserar IoT inom marknadsföring. "Mamma ser dig" kan förstås som ett koncept som beskriver ett omhändertagande perspektiv på relationen mellan företaget och konsumenten, snarare än ett övervakande "storebror ser dig". Även om studien visar på möjligheter med att använda Internet of Things i marknadsföring kvarstår utmaningen i att få kunden att känna sig trygg med att lämna ifrån sig data om sig själv till Internet of Things och se fördelarna med att göra det. Att analysera data som kunden lämnar ifrån sig och veta hur man skall använda den är också en utmaning för marknadsförare och Internet of Things-utvecklare. Studien tar även upp risken med avsaknaden av ramverk med regler att luta sig emot i utvecklingen av marknadsföring med hjälp av Internet of Things.

138139140141142143144 7001 - 7050 av 7793
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf