Ändra sökning
Avgränsa sökresultatet
139140141142143144145 7051 - 7100 av 7214
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 7051.
    Zdravkovic, Jelena
    et al.
    KTH, Tidigare Institutioner                               , Data- och systemvetenskap, DSV.
    Johannesson, Paul
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Data- och systemvetenskap, DSV.
    Cooperation of Processes through Message Level Agreement2004Ingår i: ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2004, 564-579 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    E-Business is constantly growing as organizations are trying to integrate electronically in order to automate exchange of information and services. To construct inter-organizational processes, the involved enterprises must agree on ways how to invoke process services on the business partner's system. A problem is that existing processes are so diverse in protocols, activity and message forms that it is impossible to start collaboration without comprehensive adaptations. In this paper, we propose a framework for interoperation of processes, which is based on requirements for equivalence of document exchanges. We argue that this level of equivalence is sufficient to enable existing enterprise processes to collaborate without internal redesign. The proposed framework is aimed to facilitate process collaboration by using a mediator layer to perform necessary adaptations, while minimizing requirements for process similarity.

  • 7052.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kabilan, Vandana
    Contract-based Exception Handling Process Patterns2008Ingår i: Proceedings of the 7th International Conference on Information Systems and its Applications (ISTA 2008), Springer , 2008, Vol. 5Konferensbidrag (Refereegranskat)
  • 7053. Zdravkovic, Jelena
    et al.
    Kabilan, Vandana
    Enabling Business Process Interoperability Using Contract Workflow Models2005Ingår i: ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2005: COOPIS, DOA, AND ODBASE, PT 1, PROCEEDINGS, 2005, 77-93 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Business transactions are governed by legally established contracts. Contractual obligations are to be fulfilled by executing business processes of the involved parties. To enable this, contract terms and conditions need to be semantically mapped to process concepts and then analyzed for compliance with existing process models. To solve the problem, we propose a methodology that, using a layered contract ontology, deduces contract requirements into a high-level process description named Contract Workflow Model (CWM). By applying a set of transformation rules, the CWM is then compared for compliance with existing, executable process models. By the use of its concepts, the methodology enables comprehensive identification and evolution of requirements for interoperability of processes of the contracting parties.

  • 7054.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kirikova, MariteJohannesson, PaulStockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Advanced Information Systems Engineering: 27th International Conference, CAiSE 2015, Stockholm, Sweden, June 8-12, 2015, Proceedings2015Samlingsverk (redaktörskap) (Refereegranskat)
    Abstract [en]

    This book constitutes the proceedings of the 27th International Conference on Advanced Information Systems Engineering, CAiSE 2015, held in Stockholm, Sweden, in June 2015.

    The 31 papers presented in this volume were carefully reviewed and selected from 236 submissions. They were organized in topical sections named: social and collaborative computing; business process modeling and languages; high volume and complex information management; requirements elicitation and management; enterprise data management; model conceptualisation and evolution; process mining, monitoring and predicting; intra- and inter-organizational process engineering; process compliance and alignment; enterprise IT integration and management; and service science and computing. The book also contains the abstracts of 3 keynote speeches and 5 tutorials, presented at the conference.

  • 7055.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kirikova, Marite
    Johannesson, Paul
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Preface to CAISE 20152016Ingår i: Information Systems, ISSN 0306-4379, E-ISSN 1873-6076, Vol. 62Artikel i tidskrift (Övrigt vetenskapligt)
  • 7056.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Pastor, Oscar
    Loucopoulos, Pericles
    On the Capability Notion in Business Informatics: [Opening]2014Ingår i: [Proceedings of] The 1st International Workshop on Capability-oriented Business Informatics (CoBI 2014) / [ed] Jelena Zdravkovic, Peri Loucopoulos, Oscar Pastor, 2014, 1-2 s.Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    The business environments of today are changing rapidly, entailing complex anddynamic organizational constellations. Enterprises operating in these conditions needto have the capability to deliver their services in a variety of business contexts withsustainable quality and moreover to leverage them to competitive advantage. Latelythe notion of capability has gained a growing attention, due to a number of factors:the notion directs business investment focus, it can be used as a baseline for businessplanning, and it leads directly to service specification and design.

  • 7057.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rychkova, Irina
    Speckert, Thomas
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Requirements for IT Governance in Organizations Experiencing Decentralization2015Ingår i: Information Systems Engineering in Complex Environments: CAiSE Forum 2014, Thessaloniki, Greece, June 16-20, 2014, Selected Extended Papers / [ed] Selmin Nurkan, Elias Pimenidis, Springer, 2015, 269-285 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Decentralization of organizations and subsequent change of their management and operation styles requires changes in organization’s processes and heavily involves the IT. A case study in the Higher Education sector in Sweden has shown that Enterprise Architecture (EA) frameworks fit to primarily centralized organizational structures, and as such have shortcomings when used in decentralized organizations. Overcoming these deficiencies requires some new principles to be introduced and incorporated into the EA knowledge. In particular for IT governance, the case study showed that the peer-to-peer principles, such as peer production, can offer more suitable governance over current EA frameworks as they are able to better match the decentralized components of the university’s organizational structure.

  • 7058.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Rychkova, Irina
    Sorbonne, , .
    speckert, thomas
    OMICRON electronics, , .
    Requirements for IT Governance in Organizations Experiencing Decentralization2014Ingår i: CAiSE 2014 Forum, Springer , 2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    Decentralization of organizations and subsequent change of their management and operation styles requires changes in organization’s processes and heavily involves IT. Enterprise Architecture (EA) frameworks fit to primarily centralized organizational structures, and as such have shortcomings when used in decentralized organizations. We illustrate this idea on the example of one organization in Higher Education sector that faces decentralization of its structure and has to adapt to it. Overcoming these deficiencies requires some new principles to be introduced and incorporated into the EA knowledge. In particular for IT governance, in this study we present how peer-to-peer principles, such as peer production, can offer more suitable governance over current EA frameworks as they are able to better match the decentralized components an organizational structure.

  • 7059.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, Janis
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Grabis, Janis
    A Comparative Analysis of Using the Capability Notion for Congruent Business and Information Systems Engineering2017Ingår i: Complex Systems Informatics and Modeling Quarterly, ISSN 2255-9922, nr 10, 1-20 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The notion of capability has been gaining a growing attention in the business and information system (IS) engineering community due to a number of reasons: it facilitates focus on business investments, it can be used as a baseline for business planning, and it directly leads to service specification and design. It is not however widely known to what extent capability is considered in different modeling approaches, how it is defined, and what purpose it fulfills. This article analyzes how the notion of capability is included in the frameworks spanning from business-oriented such as Business Architecture and Business Value Modeling, to the alignment-oriented represented by Enterprise Architecture (EA), and Enterprise Modeling (EM). The results of the analysis have shown that capability has widespread presence in the frameworks and that its conceptual meaning is largely similar, while the intentions and the mechanisms of its use differ, which raises stimulating opportunities for new contributions and improvements in the field.

  • 7060.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, Janis
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henkel, Martin
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Grabis, Janis
    Modelling Business Capabilities and Context Dependent Delivery by Cloud Service2013Ingår i: Advanced Information Systems Engineering: Proceedings / [ed] Camille Salinesi, Moira C. Norrie, Óscar Pastor, Springer Berlin/Heidelberg, 2013, 369-383 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Contemporary business environments are changing rapidly, organizations are global, and cloud-based services have become a norm. Enterprises operating in these conditions need to have the capability to deliver their business in a variety of business contexts. Capability delivery thus has to be monitored and adjusted. Current Enterprise Modeling approaches do not address context-dependent capability design and do not explicitly support runtime adjustments. To address this challenge, a capability-driven approach is proposed to model business capabilities by using EM techniques, and to use model-based patterns to describe how software applications can adhere to changes in the execution context. A meta-model for capability design and delivery is presented with the consideration to delivering solutions as cloud services. The proposal is illustrated with an example case from an energy efficiency project. A supporting architecture for the capability development and the delivery in the cloud is also presented.

  • 7061.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, Janis
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kirikova, Marite
    Karagiannis, Dimitri
    Winter, Robert
    Advanced Enterprise Modeling: Editorial2015Ingår i: Business & Information Systems Engineering, ISSN 1867-0202, Vol. 57, nr 1, 1-2 s.Artikel i tidskrift (Övrigt vetenskapligt)
  • 7062.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, JanisStockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.Kirikova, MariteKaragiannis, DimitrisWinter, Robert
    Advanced Enterprise Modeling2015Samlingsverk (redaktörskap) (Refereegranskat)
  • 7063.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, Janis
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kirikova, Marite
    Karagiannis, Dimitris
    Winter, Robert
    BISE – Call for Papers Issue 1/20152013Ingår i: Business & Information Systems Engineering, ISSN 1867-0202, Vol. 5, nr 5, 361-361 s.Artikel i tidskrift (Refereegranskat)
  • 7064.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Stirna, Janis
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Kuhr, Jan-Christian
    Koç, Hasan
    Requirements Engineering for Capability Driven Development2014Ingår i: The Practice of Enterprise Modeling: 7th IFIP WG 8.1 Working Conference, PoEM 2014, Manchester, UK, November 12-13, 2014: proceedings / [ed] Ulrich Frank, Berlin: Springer, 2014, Vol. 197, 193-207 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Lately, the notion of capability has emerged in IS engineering as an instrument to context dependent design and delivery of business services. Representing core business functionalities of an organization, capabilities, and capability driven IS development can be seen as both – a shift beyond and complement to the widely established service-oriented engineering paradigm where needs of customers form the leading modeling and design perspective. To ensure the needs of business stakeholders for variety of business contexts that an organization faces, and thus facilitate successful systems delivery, capability-driven development needs a well-defined method for requirements engineering, as well as its confirmation in practices. In this paper a process for specifying requirements capabilities and their designs is proposed. An application of the proposed approach to the area of Business Process Outsourcing (BPO) services. is carried out for the German company SIV.

  • 7065.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Svee, Eric-Oluf
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Giannoulis, Constantinos
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Capturing consumer preferences as requirements for software product lines2015Ingår i: Requirements Engineering, ISSN 0947-3602, E-ISSN 1432-010X, Vol. 20, nr 1, 71-90 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Delivering great consumer experiences in competitive market conditions requires software vendors to move away from traditional modes of thinking to an outside- in perspective, one that shifts their business to becoming consumer-centric. Requirements engineers operating in these conditions thus need new means to both capture real preferences of consumers and then relate them to requirements for software customized in different ways to fit anyone. Additionally, because system development models require inputs that are more concrete than abstract, the indistinct values of consumers need to be classified and formalized. To address this challenge, this study aims to establish a conceptual link between preferences of consumers and system requirements, using software product line (SPL) as a means for systematically accommodating the variations within the preferences. The novelty of this study is a conceptual model of consumer preference, which integrates generic value frameworks from both psychology and marketing, and a method for its transformation to requirements for SPL using a goal-oriented RE framework as the mediator. The presented artifacts are grounded in an empirical study related to the development of a system for online education.

  • 7066.
    Zdravkovic, Jelena
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Zikra, Iyad
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Ilayperuma, Tharaka
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    An MDA Method for Service Modeling by Formalizing REA and Open-edi Business Frameworks with SBVR2011Konferensbidrag (Refereegranskat)
    Abstract [en]

    Business frameworks offer great opportunities of communication between people for working on the enterprise system engineering processes, as well as for eliciting services that the enterprise can offer in collaboration contexts. However, these kinds of frameworks, such as Resource-Event-Agent and Open-edi, recently unified in Open-edi Business Ontology (OeBTO), lack formal representations. This fact considerably limits their use in system development, particularly in model-driven development methods where the efficiency of transformations is of great importance. In this paper we suggest a formalization of OeBTO using OMG’s standard Semantics of Business Vocabulary and Business Rules (SBVR), as a method for creating a service-centric business model. This makes it possible to provide the necessary formal logic foundation to allow automatic processing of the business model and its transformation to a system-level service model. An example from the bank loan business sector is used to argument the application of the method.

  • 7067.
    Zec, Milos
    et al.
    Department of Informatic, Linnaeus University, Växjö, Sweden.
    Kajtazi, Miranda
    Örebro universitet, Handelshögskolan vid Örebro Universitet. Department of Informatic, Linnaeus University, Växjö, Sweden.
    Examining how IT Professionals in SMEs Take Decisions About Implementing Cyber Security Strategy2015Ingår i: PROCEEDINGS OF 9TH EUROPEAN CONFERENCE ON IS MANAGEMENT AND EVALUATION (ECIME 2015), Academic Conferences Limited, 2015, 231-239 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    With the significant growth of cyber space, business organizations have become more alert than ever before that cyber security must be considered seriously and that there is a need to develop up-to-date security measures. It has become an increasing trend that cyber-attackers concentrate more on small and medium than on large enterprises, due to their known vulnerability towards cyber security. In exchange of successful cyber security measures in organizations, the security risks must be taken into consideration more closely that could be helpful for re-thinking their decision-making on cyber security. This article develops a theoretical framework on cyber security with three aspects taken in consideration: organizational, technological and psychological, that deserves the attention of IT professionals while and after creating cyber security measures in their SMEs. The first two aspects (organizational and technological) focus on understanding the IT professionals' decision-making process, while the third aspect (psychological) focuses on understanding the IT professionals' post decision-making reactions. Firstly, the organizational aspect presupposes that the ones who create cyber security measures are exposed to unclear and undefined decision processes and rights that lead to system vulnerabilities. Secondly, the technological aspect focuses on disclosing how many IT professionals in their organizations fail to meet foundational technological measures, such as the existence of Internet firewall, logs of system events, existence of hardware and software inventory list, data backup, antivirus software and password rules. Lastly, the psychological aspect, explains how post cyber security decisions made by IT professionals may have a contra-effect on the organization. Our data analyses collected based on interviews with IT professionals across 6 organizations (SMEs) show that cyber security is yet to be developed among SMEs, an issue that must not be taken lightly. Results show that the IT professionals in these organizations need to strengthen and develop their security thinking, in order to decrease the vulnerability of informational assets among SMEs. We believe that a perspective on understanding decision-making processes upon the cyber security measures by IT professionals in SMEs may bring a theoretical redirection in the literature, as well as an important feedback to practice.

  • 7068.
    Zeng, Zili
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Hu, Xin
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Mei, Shuo
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Factors affecting a Mobile Application’s Acceptance: An empirical study of user acceptance of WeChat in China2013Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Along with the development of smart phones and smart phones operating systems, users of smart phones are able to install software, games and other programs provided by third-party providers. WeChat as a third party software that exists in the current market, is an in-stant messaging application that enables users to send voice, video, pictures and text to their contacts through mobile network. Being a new application, the user acceptance of WeChat has not been studied. Therefore, the result of this study will be valuable to fill the knowledge gap about user acceptance study of this mobile application, and future development of other similar instant messaging mobile application could also benefit from this study. This study focuses on WeChat users and answers to the following research questions: 1. What are the factors that affect the users‘ acceptance of WeChat? 2. How could other competing instant messaging applications improve their user acceptance? The purpose of this study is to explain factors that affect the users‘ acceptance of WeChat among WeChat users who are studying in one specific school and working in one specific company. This study adopts a deductive, theory testing approach. The research model was proposed through literature review and expert interview, and six hypotheses were developed based on the research model. A survey was conducted subsequently to collect quantitative data. Hypotheses were tested through analyzing the quantitative data by using SPSS. Through testing the hypotheses, this study concluded that effort expectancy, social influence, facilitating conditions, cost and privacy are the factors that could affect user acceptance of WeChat. Other similar IM mobile applications could take those identified factors as reference in further user acceptance study, and the proposed research model in this study could also help in improving understanding of user acceptance in similar IM mobile application study.

  • 7069.
    Zetterholm, My
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Are the Physiological and Digital Systems Converging?: Exploring the relation between humans and mobile technologies.2016Självständigt arbete på avancerad nivå (magisterexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    This thesis has its starting point in the digitalization of society focusing on the rapid development of mobile technologies and the increasing interplay between humans and machines. The use of information and communication technologies (ICT) is extending at a fast pace, affecting all parts of society, and the everyday life of most individuals. The fast progressing development of mobile technologies (smartphones and their accessories/ wearable’s) is creating new trends such as health tracking and quantified self. These mobile technologies can register an increasing number of physiological features, implying that the interconnection between the physiological and digital systems is increasing. This creates a range of new possibilities within health and medical research but it also creates new challenges and the need for new knowledge in how we relate these devices to our bodies. In the psychological perspective, smartphone use is increasing and previous studies imply that these devices are affecting our behaviour, our mental health as well as our cognitive functions. This implies for a need to understand the relation we have to these devices also in a psychological perspective, focusing on emotions and cognition. This study set out to explore the relation between humans and technologies from a systems perspective. The research question involved: How are users and smartphones related in physical and psychological perspectives? The methods used were questionnaires and interviews. The respondents were students in two European universities, who described their experiences of smartphone use, and three doctors (in medicine and biomedicine) that provided interesting aspects in how mobile technologies can be related to the human body from a system perspective

     

    In a physical perspective the users as well as their physical environments could be described as converging with the digital systems. The need of being connected and have access to all life-spheres at once seemed to be an important driving force, implying that users are dependent on information and a converged life-style. In a psychological perspective, the emotional bond seemed stronger then the actual physical need. The perceptions of smartphones differed, but a common denominator described by both Swedish and Albanian users, was the perception of the smartphone as something with human-like features, comparable to a friend. The last part of the study concerned if smartphones can be seen as a new entity of our own system, comparable to an organ. The result suggests that this depends on the individual use, if the technologies is used to sustain health, the value it provides, and it is also a matter of the users ontological believes. The concept of physio-digital convergence is proposed as a new concept to analyse the development of increasing use of mobile technologies further.

  • 7070.
    Zetterholm, My
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Brandt, Patrik
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Jokela, Päivi
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Physio-digital Convergence: Aspects on Security2016Ingår i: Proceedings of 7th International Conference Information Systems and Technology Innovations: the New Paradigm for a Smarter Economy / [ed] Kozeta Sevrani, Tirana: University of Tirana , 2016, 1Konferensbidrag (Refereegranskat)
    Abstract [en]

    The fast progressing development of mobile technologies and health applications has given rise to trends like health tracking and quantify self. This kind of mobile health applications can measure an increasing amount of physiological parameters, which implies an increasing interconnectivity between users and mobile technologies. An explorative pre-study was made which studied the relation between users and mobile technologies on students in Sweden and Albania. The results imply an increasing interconnectivity between users and mobile technologies and this can be considered as both a physical and psychological phenomenon. From a system perspective the physiological and digital systems can be seen as converging, driven by both technical innovations and user behavior. This blurring of system boundaries requires for reflections within philosophy and ethics as well as security and integrity. The concept of Physio-digital convergence is proposed as a perspective to further analyze this development. Recommendations on further research include integrity and security issues, which are both pointed out as critical aspects in this context. 

  • 7071.
    Zetterlund, Emelie
    et al.
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Erlingsson, Victoria
    Linnéuniversitetet, Fakulteten för teknik (FTK), Institutionen för informatik (IK).
    Gemensamma faktorer för lyckade och misslyckade interna IT-projekt: En fallstudie på två internationella verksamheter2016Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Det finns forskning från flera olika perspektiv som har studerat kritiska framgångsfaktorer gällande arbete i projekt. Det problem som finns är att det inte finns ett specifikt genomförande för att uppnå lyckat resultat inom projektarbeten. Belassi och Tukel (1996) har tagit fram en teori att analysera projektgenomförande utifrån. Modellen behöver utvecklas med tiden och förändras för att anpassas till specifika typer av projekt, till exempel interna IT-projekt som denna undersökning behandlar. I den här studien har en fallstudie genomförts på två verksamheter där det i varje verksamhet finns ett intern IT-projekt som anses vara lyckat och ett som anses vara misslyckat. Med grund i Belassi och Tukels (1996) teori Critical success/failure factors in projects har kvalitativa intervjuer genomförts i syfte att ta reda på vilka framgångsfaktorer som är kritiska för lyckade och misslyckade interna IT-projekt. Vidare är syftet även att se om det finns andra kritiska framgångsfaktorer som kan utveckla teorin. Den insamlade empirin analyserades genom kategorisering och studiens resultat visar vilka de kritiska framgångsfaktorerna är för de två verksamheternas utvalda interna IT-projekt. Det har även skapats en utvecklad modell med kritiska framgångs- och misslyckandefaktorer som inte tidigare fanns omnämnda i teorin men som visade sig ha en inverkan på projektets resultat. Studien visade att ledarskap och kommunikation var viktiga faktorer för att uppnå framgångsrika projekt. Det visade sig också att det inte enbart var projektdeltagarnas tekniska bakgrund som spelade in utan även annan kompetens hos individerna. I de fall då det inte uppfattats som att någon utvärdering var gjord ansåg flera individer att det hade varit bra om det hade genomförts. Projektdeltagarnas kompetens och utvärdering av projektets genomförande var därför, tillsammans med externa leverantörer och användarnas stöd, faktorer som valdes att kompletteras i den vidareutvecklade modellen. Projektgruppen engagemang tas redan upp i Belassi och Tukels (1996) teori, men det framhävs i undersökningen att engagemanget bör vara objektivt.

  • 7072.
    Zetterlund, Marie
    Högskolan i Skövde, Institutionen för datavetenskap.
    Infology: a study to identify possible elements of infology in some system development methodologies1999Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats
    Abstract [en]

    The purpose of this work is to identify possible elements of infology in some systems development methodologies. To reach the aim two objectives were identified: to gain an understanding of the concept of infology and secondly to study different kinds of methodologies and analyse them to find out possible elements of infology. In order to reach the aim of this work a literature study was performed. Four methodologies were chosen for the analysis and the selection represented a wide range of different methodologies. They were: Soft Systems Methodology (SSM), Effective Technical and Human Implementation of Computer based Systems (ETHICS), Structured Systems Analysis and Design Method (SSADM) and Yourdon Systems Method (YSM). The infological approach has been characterised and the fundamental characteristic of infology is the distinction between data and information. A consequence from this distinction is that the users of the intended information system should participate in the developing process in order to understand the complex and dynamic relations in an organisation and information system. The results of this work have shown that the soft methodologies (SSM and ETHICS) have a high degree of infology and the more hard methodologies (SSADM and YSM) have a low degree of infology.

  • 7073.
    Zetterman, Karin
    Högskolan i Skövde, Institutionen för datavetenskap.
    Användarprofiler: kan de bidra till kvalitet i beslutsfattande?2002Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats
    Abstract [sv]

    Antalet intranät växer ständigt, samtidigt som allt fler människor känner att de inte kan ta till sig all den information som de erhåller. Intranäten innehåller en mängd användbar information som alla anställda kan ta del av. För att kunna använda intranätet effektivt krävs det att användarna sorterar bland all den information som finns på intranätet. Med hjälp av användarprofiler kan detta ske på ett enkelt sätt. Syftet med detta arbete var att behandla frågan om användarprofiler kan bidra till att bättre beslut tas genom att information overload reduceras. För att besvara arbetets frågeställning har telefonintervjuer med sju respondenter genomförts. Litteraturen som studerats inom detta arbete visar på att information overload kan leda till en mängd konsekvenser så väl för de anställda som företaget som helhet. Resultatet av telefonintervjuerna visar att användarprofiler används ute på företag samt att flera av respondenterna anser att dessa kan bidra till kvalitet i beslutfattandet genom reducering av information overload.

  • 7074.
    Zetterström, Andreas
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Data- och systemvetenskap.
    Visual Compositional-Relational Programming2010Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    In an ever faster changing environment, software developers not only need agile methods, but also agile programming paradigms and tools. A paradigm shift towards declarative programming has begun; a clear indication of this is Microsoft's substantial investment in functional programming. Moreover, several attempts have been made to enable visual programming. We believe that software development is ready for a new paradigm which goes beyond any existing declarative paradigm: visual compositional-relational programming. Compositional-relational programming (CRP) is a purely declarative paradigm -- making it suitable for a visual representation. All procedural aspects -- including the increasingly important issue of parallelization -- are removed from the programmer's consideration and handled in the underlying implementation. The foundation for CRP is a theory of higher-order combinatory logic programming developed by Hamfelt and Nilsson in the 1990's. This thesis proposes a model for visualizing compositional-relational programming. We show that the diagrams are isomorphic with the programs represented in textual form. Furthermore, we show that the model can be used to automatically generate code from diagrams, thus paving the way for a visual integrated development environment for CRP, where programming is performed by combining visual objects in a drag-and-drop fashion. At present, we implement CRP using Prolog. However, in future we foresee an implementation directly on one of the major object-oriented frameworks, e.g. the .NET platform, with the aim to finally launch relational programming into large-scale systems development.

  • 7075.
    Zetterström, Andreas
    et al.
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Data- och systemvetenskap.
    Dahlberg, Gunnar
    Uppsala universitet, Humanistisk-samhällsvetenskapliga vetenskapsområdet, Samhällsvetenskapliga fakulteten, Institutionen för informatik och media, Data- och systemvetenskap.
    Teknisk infrastrukturs påverkan på agil systemutveckling: En kvalitativ fallstudie av Graip-projektet2010Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [sv]

    Författarna har utvecklat ett IT-system till missbruksvården inom socialtjänsten i Gotlands kommun. Utvecklingsprojektet används som kvalitativ fallstudie för att studera hur teknisk infrastruktur för systemutveckling påverkar systemutvecklingsprocessen. Projektet utvecklades agilt med en skräddarsydd variant av XP (Extreme Programming). Teknologier som användes var ASP.NET MVC, LINQ, LINQ-to-SQL, jQuery och Visual Studio.

    Syftet med uppsatsen är att besvara en frågeställning kring relationen mellan teknisk infrastruktur för systemutveckling och systemutvecklingsmetoder: har den tekniska infrastukturen (utvecklingsverktyg och miljöer, klassbibliotek, mjukvaruramverk) påverkat systemutvecklingsmetoden? Om så är fallet, på vilket sätt?

    I fallstudien studeras hur den agila systemutvecklingsmetoden påverkats av den tekniska in­fra­strukturen. Metoden studeras utifrån två agila värderingar och sju agila principer. Värderingar är anpassning till förändringar snarare än följande av planer och fungerande mjukvara snarare än omfattande dokumentation. Principerna är parprogrammering, kodstandard, omstrukturering, små releaser, kollektivt kodägande, kontinuerlig integration och enkel design.

    Fallstudien visar att teknisk infrastruktur i hög grad underlättar utvecklingsarbetet – möjliggör snabb utveckling, bidrar till ökad kodkvalitet och tvingar utvecklarna att följa sunda designprinciper och designmönster. Vissa nackdelar och potentiella risker med ramverken och teknologierna identifieras: leverantörsberoende och låsning till ramverkets designprinciper. Slutsatser är att teknologierna och ramverken har en betydande påverkan på systemutvecklingsprocessen och kraftigt underlättar ett agilt arbetssätt.

  • 7076.
    Zeynep, Ahmet
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Holmquist, Lars Erik
    Sharing mobile services - Beyond the app store model2010Ingår i: MobileHCI 2010, ACM Press , 2010Konferensbidrag (Övrigt vetenskapligt)
  • 7077.
    Zeynep, Ahmet
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Jonsson, Martin
    Holmquist, Lars Erik
    Sumon, Saiful Islam
    Supporting embodied exploration of physical concepts in mixed digital and physical interactive settings2011Ingår i: TEI 2011, ACM Press , 2011Konferensbidrag (Övrigt vetenskapligt)
  • 7078.
    Zeynep, Ahmet
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Cramer, Henriette
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Holmquist, Lars Erik
    SICS / Mobile Life, , .
    Rost, Mattias
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Gamification and location-sharing: Some emerging social conflicts2011Ingår i: CHI2011, Vancouver, Canada: ACM Press , 2011Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Location-sharing services such as foursquare are a prominent example of commercial apps that use gamification to increase user engagement. These gamification elements however have to coexist with a plethora of usage motivations. We here present selected observations on emerging conflicts between gamification elements and other usage motivations for location-sharing. We argue gamification needs to take into account the social context in which services operate and that conflicts within this context can both be detrimental and add to playfulness.

  • 7079.
    Zeynep, Ahmet
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Väänänen-Vainio Mattila, Kaisa
    Tampere University of Technology, , .
    Face to face makes a difference: Recommendation Practices of Users of Mobile Services2011Ingår i: UbiComp2011, Beijing, China: ACM Press , 2011Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    The mobile app stores and markets provide companies, independent developers and researchers alike with possibilities to distribute innovative designs for mobile devices on a global scale. However, reaching a large numbers of users does not in itself ensure a large number of users adopting the mobile application or service. Large-scale adoption depends on additional factors such as novelty in service design, ease of use, enjoyable interaction, built-in mechanisms for further distribution of the mobile service as well as the practice of word-of-mouth recommendations. In this position paper we present the background and preliminary findings from a study aimed at investigating the motivations and practices by which users recommend mobile apps and services among their acquaintances. We discuss our perspective on distribution of mobile applications and services on a large scale and end this paper by suggesting questions for discussion and future research.

  • 7080.
    Zhang, Ge
    et al.
    Fraunhofer Institute FOKUS, Berlin, Germany.
    Ehlert, Sven
    Fraunhofer Institute FOKUS, Berlin, Germany.
    Magedanz, Thomas
    Fraunhofer Institute FOKUS, Berlin, Germany.
    Sisalem, Dorgham
    Tekelec, Berlin, Germany.
    Denial of Service Attack and Prevention on SIP VoIP Infrastructures Using DNS Flooding2007Ingår i: Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications (IPTCOMM 2007), New York: ACM Press, 2007, 57-66 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    A simple yet effective Denial of Service (DoS) attack on SIP servers is to flood the server with requests addressed at irresolvable domain names.

  • 7081.
    Zhang, Ge
    et al.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Fischer-Hübner, Simone
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Martucci, Leonardo A.
    Karlstads universitet, Fakulteten för ekonomi, kommunikation och IT, Avdelningen för datavetenskap.
    Ehlert, Sven
    Fraunhofer FOKUS, Berlin, Germany.
    Revealing the calling history on SIP VoIP systems by timing attacks2009Ingår i: Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES 2009), IEEE Press, IEEE Computer Society, 2009, 135-142 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Many emergent security threats which did not exist in the traditional telephony network are introduced in SIP VoIP services. To provide high-level security assurance to SIP VoIP services, an inter-domain authentication mechanism is defined in RFC 4474. However, this mechanism introduces another vulnerability: a timing attack which can be used for effectively revealing the calling history of a group of VoIP users. The idea here is to exploit the certificate cache mechanisms supported by SIP VoIP infrastructures, in which the certificate from a caller's domain will be cached by the callee's proxy to accelerate subsequent requests. Therefore, SIP processing time varies depending whether the two domains had been into contact beforehand or not. The attacker can thus profile the calling history of a SIP domain by sending probing requests and observing the time required for processing. The result of our experiments demonstrates that this attack can be easily launched. We also discuss countermeasures to prevent such attacks

  • 7082. Zhang, Pengyi
    et al.
    Liu, Chang
    Hansen, Preben
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    I Need More Time!: The Influence of Native Language on Search Behavior and Experience2016Ingår i: Working Notes of CLEF 2016 - Conference and Labs of the Evaluation forum: CEUR Proceedings / [ed] Krisztian Balog, Linda Cappellato, Nicola Ferro, Craig Macdonald, 2016, 1166-1182 s.Konferensbidrag (Refereegranskat)
  • 7083.
    Zhang, Sheng
    et al.
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China..
    Wang, Xin
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China..
    Yao, Minghui
    Nanchang Hangkong Univ, Sch Informat Engn, Nanchang, Peoples R China..
    Song, William Wei
    Högskolan Dalarna, Akademin Industri och samhälle, Informatik. Dalarna Univ, Business Intelligence & Informat, Borlange, Sweden..
    Community-based message transmission with energy efficient in opportunistic networks2016Ingår i: Web Information Systems Engineering – WISE 2016: 17th International Conference, Shanghai, China, November 8-10, 2016, Proceedings, Part II, 2016, Vol. 10042, 411-423 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    An Opportunistic Networks is a wireless self-organized network, in which there is no need to build a fixed connectivity between source node and destination node, and the communication depends on the opportunity of node meeting. There are some classical message transmission algorithms, such as PRoPHET, MaxProp, and so on. In the Opportunity Networks with community characteristic, the different message transmission strategies can be sued in inter-community and intra-community. It improves the message successful delivery ratio significantly. The classical algorithms are CMTS and CMOT. We propose an energy efficient message forwarding algorithm (EEMF) for community-based Opportunistic Networks in this paper. When a message is transmitted, we consider not only the community characteristic, but also the residual energy of each node. The simulation results show that the EEMF algorithm can improve the message successful delivery ratio and reduce the network overhead obviously, in comparison with classical routing algorithms, such as PRoPHET, MaxProp, CMTS and CMOT. Meanwhile the EEMF algorithm can reduce the node's energy consumption and prolong the lifetime of network.

  • 7084.
    Zhang, Xiang
    Växjö universitet, Fakulteten för matematik/naturvetenskap/teknik, Matematiska och systemtekniska institutionen.
    Efficiency in Emergency medical service system: An analysis on information flow2007Självständigt arbete på avancerad nivå (magisterexamen), 20 poäng / 30 hpStudentuppsats
    Abstract [en]

    In an information system which includes plenty of information services, we are always seeking a solution to enhance efficiency and reusability. Emergency medical service system is a classic information system using application integration in which the requirement of information flow transmissions is extremely necessary. We should always ensure this system is running in best condition with highest efficiency and reusability since the efficiency in the system directly affects human life.

    The aim of this thesis is to analysis emergency medical system in both qualitative and quantitative ways. Another aim of this thesis is to suggest a method to judge the information flow through the analysis for the system efficiency and the correlations between information flow traffic and system applications.

    The result is that system is a main platform integrated five information services. Each of them provides different unattached functions while they are all based on unified information resources. The system efficiency can be judged by a method called Performance Evaluation, the correlation can be judged by multi-factorial analysis of variance method.

  • 7085.
    Zhang, Yanqing
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Constructing Swedish Fashion Identity Exhibition Review: Svenskt Mode (Swedish Fashion): 2000–2015, Sven-Harry’s Art Museum, Stockholm, May 23–August 31, 20142015Ingår i: Fashion theory, ISSN 1362-704X, E-ISSN 1751-7419Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This is an exhibition review article. It describes the goal, the curatorship, display and exhibited objects. The exhibition focuses on Swedish fashion design and treats fashion as something in relation to art. It analyzes the exhibition as part of institutionalization of Swedish fashion system. Understanding fashion as a system rather than material clothing is the key point here.

  • 7086.
    Zhang, Yanqing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Juhlin, Oskar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Fashion as System or Action Net in ‘Fashion in All Things’: a Case in Color Design of Mobile Phones2012Ingår i: Fashion: Exploring Critical Issues / [ed] Barbara Brownie, Laura Petican, Johannes Reponen, Oxford: Inter-Disciplinary Press, 2012, nr 1, 263-270 s.Kapitel i bok, del av antologi (Övrigt vetenskapligt)
    Abstract [en]

    Contemporary fashion has permeated into all things in life beyond clothes. Recently, fashion theories take on interests in organization and system. Kawamura proposes a fashion system through which clothing is transformed into the idea of fashion. Can this fashion system be used to analyze other things in fashion? We present a study using mobile phone, one of the most intimate gadgets to people, as a way to approach ‘fashion in all things’. We chose the color as a way to study the fashion aspect in mobile design. Through the empirical study, we find that the decision making of color in mobile industry is a collective process. It is greatly influenced by technology, materials, consumer lifestyle and trend. The trendy colors in mobile design are not defined by certain cultural or social institutions, but formulated by actions conducted by various actors in certain social context. Our study shows that fashion can embrace more than Kawamura’s system, e.g. the action net of color design in mobile technology. Although mobile design shares some similarities with clothing fashion, the concept of fashion-ology is very Parisian and deals with only clothing. It is not fully applicable to mobile industry. If we want to use a fashion system that can apply to fashion in all things, we should revisit the theory to reveal the general characteristics of the fashion world or build smaller theory for each category.

  • 7087.
    Zhang, Yanqing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Juhlin, Oskar
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    The “life and death” of great Finnish fashion phone: A periodization of changing styles in Nokia phone design between 1992 and 20132016Ingår i: Mobile Media & Communication, ISSN 2050-1579, Vol. 4, nr 3, 385-404 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Visual aesthetics is an essential part of our experience of mobile devices, but the ways in which it is accounted for in design have largely been overlooked. We investigate whether an aesthetization of mobile design is taking place and, if so, how it is being pursued through institutional practices in organizations. We conduct a visual analysis of all Nokia phone releases between 1992 and 2013 complemented by an interview series with key actors. The study reveals a continuous increase in aesthetic variation between 1998 and 2008, which is visible in the variation of colors, forms and materials. The period between 2003 and 2008, which we term the Grand period, marks the peak of aesthetization of Nokia’s devices. It exhibits great variation, and is visibly similar to aesthetics in the fashion industry. With the introduction of the slate form, we see a decrease in visual variation between 2009 and 2013. The interviews reveal how the visual design was driven by organizational strategies, such as customer segmentation in general, and an orientation toward the fashion industry, e.g. in the creation of a fashion segment. The study reveals how aesthetic variation is weaved into a complex innovation system with sometimes conflicting demands deriving from e.g. technology and user interaction.

  • 7088.
    Zhang, Yiping
    et al.
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Yu, Xinyi
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Gilles, Sintset
    Högskolan i Jönköping, Internationella Handelshögskolan, IHH, Informatik.
    Enterprise System Post-Implementation: A Practice of System Evaluation Issues in Health Care Organization: A case study of Jönköping County Council2011Självständigt arbete på grundnivå (kandidatexamen), 10 poäng / 15 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Introduction: As Information Technology (IT) becomes more and more advanced, the Enterprise System (ES) starts to attract researcher’s attention. While with the high rate of failure IT projects, it is important to evaluate the IT project properly. This paper conducts a case study in the Health Care area and chooses Jönköping County Council’s ROS system to be the target system. According to the established linkage between theory and real world organization, a practice of Enterprise System Evaluation is conducted by using an existing Uwizeyemungu et al.’s Enterprise System Effects Evaluation Model (ESEM). The research questions are as follows:

    1. What are the Enterprise Systems Effects which impact on business processes?
    2. To what extend do the ES effects impact on the business processes?

    Purpose: the study is an exploratory study that aims at identifying what are the ES Effects which impact on the business processes and assessing the importance and the actual degree of these effects. The answers of the first goal are explored by analyzing the documents and the record of interview, and the results are the basis of the second question.

    Method: This research has adopted a combined approach because of the nature of the research questions. Data has been collected through face-to-face interview, survey and the organizational documents. Secondary data are also be used for analyzing. Both qualitative and quantitative data are used for getting a reliable conclusion.

    Conclusions: The Enterprise System effects can be categorized into automaional effects, informational effects and transformational effects. The relationship between such effects and Performance indicators are very important. By determining the importance and impacts degree of such relationships, the evaluation results can be explicitly calculated and understood.

  • 7089.
    Zhang, Zhi
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Hierarchical multi-reader RFID systems for Internet-of-Things2010Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
  • 7090.
    Zhang, Zhi
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Lu, Zhonghai
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Chen, Qiang
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Yan, Xiaolang
    Institute of VLSI Design, Zhejiang University, Hangzhou, China.
    Zheng, Li-Rong
    A high performance multi-reader passive RFID system for Internet-of-ThingsIngår i: IEEE Transactions on Wireless Communications, ISSN 1536-1276, E-ISSN 1558-2248Artikel i tidskrift (Övrigt vetenskapligt)
  • 7091.
    Zhang, Zhi
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Lu, Zhonghai
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Chen, Qiang
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    Yan, Xiaolang
    Institute of VLSI Design, Zhejiang University, Hangzhou, China.
    Zheng, Li-Rong
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektroniksystem.
    COSMO: CO-simulation with MATLAB and OMNeT++ for indoor wireless networks2010Ingår i: 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    Simulations are widely used to design and evaluate new protocols and applications of indoor wireless networks. However, the available network simulation tools face the challenges of providing accurate indoor channel models, three-dimensional (3-D) models, model portability, and effective validation. In order to overcome these challenges, this paper presents a new CO-Simulation framework based on MATLAB and OMNeT++ (COSMO) to rapidly build credible simulations for indoor wireless networks. A hierarchical ad hoc passive RFID network for indoor tag locating is described as a case study, demonstrating the significance and efficiency of COSMO compared with other network simulators. COSMO surpasses other network simulators in terms of workload and validity.

  • 7092.
    Zhang, Zhi
    et al.
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Pang, Zhibo
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Chen, Jun
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Chen, Qiang
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Tenhunen, Hannu
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Zheng, Li-Rong
    KTH, Skolan för informations- och kommunikationsteknik (ICT), Centra, VinnExcellence Center for Intelligence in Paper and Packaging, iPACK. KTH, Skolan för informations- och kommunikationsteknik (ICT), Elektronik- och datorsystem, ECS.
    Yan, Xiaolang
    Institute of VLSI Design, Zhejiang University, Hangzhou, China.
    Two-layered wireless sensor networks for warehouses and supermarkets2009Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    The rapid development of wireless sensor network and RFID technologies offers a wide range of novel applications and services. In this paper, we present a two-layered wireless network for warehouses and supermarkets to monitor goods storage and sale, and assist for quality management and market analysis. The hierarchical architecture uses IEEE 802.15.4a impulse ultra-wideband radio (IR-UWB) communication protocol between slave sensor nodes and master sensor nodes, and IEEE 802.11b/g between master sensor nodes and server. The performance of our proposal is evaluated based on the widely used OMNeT++ simulation environment. Simulation results are presented and discussed according to different sampling rates and traffic loads for specific scenarios requirements. © 2009 IEEE.

  • 7093.
    Zhang, Ziqi
    et al.
    University of Sheffield, England.
    Gentile, Anna Lisa
    University of Sheffield, England.
    Blomqvist, Eva
    Linköpings universitet, Institutionen för datavetenskap, Interaktiva och kognitiva system. Linköpings universitet, Tekniska fakulteten.
    Augenstein, Isabelle
    University of Sheffield, England.
    Ciravegna, Fabio
    University of Sheffield, England.
    An Unsupervised Data-driven Method to Discover Equivalent Relations in Large Linked Datasets2017Ingår i: Semantic Web, ISSN 1570-0844, E-ISSN 2210-4968, Vol. 8, nr 2Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This article addresses a number of limitations of state-of-the-art methods of Ontology Alignment: 1) they primarily address concepts and entities while relations are less well-studied; 2) many build on the assumption of the well-formedness of ontologies which is unnecessarily true in the domain of Linked Open Data; 3) few have looked at schema heterogeneity from a single source, which is also a common issue particularly in very large Linked Dataset created automatically from heterogeneous resources, or integrated from multiple datasets. We propose a domain-and language-independent and completely unsupervised method to align equivalent relations across schemata based on their shared instances. We introduce a novel similarity measure able to cope with unbalanced population of schema elements, an unsupervised technique to automatically decide similarity threshold to assert equivalence for a pair of relations, and an unsupervised clustering process to discover groups of equivalent relations across different schemata. Although the method is designed for aligning relations within a single dataset, it can also be adapted for cross-dataset alignment where sameAs links between datasets have been established. Using three gold standards created based on DBpedia, we obtain encouraging results from a thorough evaluation involving four baseline similarity measures and over 15 comparative models based on variants of the proposed method. The proposed method makes significant improvement over baseline models in terms of F1 measure (mostly between 7% and 40%), and it always scores the highest precision and is also among the top performers in terms of recall. We also make public the datasets used in this work, which we believe make the largest collection of gold standards for evaluating relation alignment in the LOD context.

  • 7094.
    Zhang, Zuotai
    et al.
    KTH, Skolan för industriell teknik och management (ITM), Materialvetenskap.
    Seetharaman, Seshadri
    KTH, Skolan för industriell teknik och management (ITM), Materialvetenskap.
    Li, Wenchao
    Wang, Xidong
    Synthesis and characterization of MgAlON-BN composites2007Ingår i: INTERNATIONAL JOURNAL OF MATERIALS RESEARCH, ISSN 1862-5282, Vol. 98, nr 1, 64-71 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In the present paper the Gibbs energy of formation of MgAlON was evaluated, and on this basis the phase stability diagram of Mg-Al-O-N-B was established. Dense magnesium aluminium oxynitride-boron nitride (MgAlON-BN) composites with 0-30 vol.% BN were synthesized by hot pressing in the temperature range 1750-1850 degrees C in the phase stability region. The phase compositions of the composites analyzed by X-ray diffraction indicated that the main phases were MgAlON and h-BN and no impurities were found. The microstructures of the composites analyzed by transmission electron microscopy, scanning electron microscopy, and high-resolution electron microscopy showed that the MgAlON did not react with BN, and the latter was distributed on the grain boundary of MgAlON homogeneously. Excessive BN (> 20 vol.%) resulted in a discontinuous microstructure for MgAlON. A matrix-flushing method was employed in the quantitative X-ray diffraction analysis for the multi-component MgAlON-BN composites. The results showed that the relative MgAlON content decreased in the process of sintering MgAlON-BN composites. Thermodynamic analysis showed that some Al2O3, AlN, and MgO escaped under the reaction conditions. The lattice parameters of MgAlON in the composites have also been evaluated.

  • 7095.
    Zhang, Zuotai
    et al.
    KTH, Skolan för industriell teknik och management (ITM), Materialvetenskap.
    Teng, Li-Dong
    KTH, Skolan för industriell teknik och management (ITM), Materialvetenskap.
    Li, Wenchao
    Mechanical Properties and Microstructures of hot-pressed MgAlON-BN Composites2007Ingår i: Journal of the European Ceramic Society, ISSN 0955-2219, Vol. 27, nr 1, 319-326 s.Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The relationship between the mechanical properties and microstructure of hot-pressed MgAlON-BN composite materials was investigated by scanning electron microscopy (SEM), transmission electron microscopy (TEM), high resolution electron microscopy (HREM) and X-ray diffraction (XRD) techniques. The phase compositions of hot-pressed samples prepared from starting mixtures of Al2O3, AlN, MgO and h-BN consisted of MgAlON phases as a matrix and BN phases as the second phase. The density, bending strength at room temperature, fracture toughness and Vickers hardness were measured. The results indicated that the density, strength and Vickers hardness decrease with increasing h-BN content due to the non-reactive nature and layered structure of h-BN. The fracture toughness, however increased with increasing h-BN addition, reaching a maximum of 3.64 MPa m(0.5); it decreased with further increase of BN content. The increase of fracture toughness was attributed to the presence of microcracks and the decrease was considered to be the discontinuous microstructure of the MgAlON phases. Temperature dependence of bending strength remained constant at low temperature, followed by an increase at 800 degrees C and then, dropped quickly. The increase in the bending strength of the composite was attributed to the decrease of residual stress and to the interwoven microstructure of the composites which prevented grain boundary slip and reduced the attenuation rate of high temperature strength. The machinability of the composites was examined. The results indicate that the composite materials with BN content more than 15 vol.% exhibit excellent machinability and could be drilled using conventional hard metal alloy drills

  • 7096.
    Zhao, Jing
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Temporal weighting of clinical events in electronic health records for pharmacovigilance2015Ingår i: 2015 IEEE International Conference on Bioinformatics and Biomedicine: Proceedings / [ed] Jun (Luke) Huan et al., IEEE Computer Society, 2015, 375-381 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Electronic health records (EHRs) have recently been identified as a potentially valuable source for monitoring adverse drug events (ADEs). However, ADEs are heavily under- reported in EHRs. Using machine learning algorithms to automatically detect patients that should have had ADEs reported in their health records is an efficient and effective solution. One of the challenges to that end is how to take into account temporality when using clinical events, which are time stamped in EHRs, as features for machine learning algorithms to exploit. Previous research on this topic suggests that representing EHR data as a bag of temporally weighted clinical events is promising; however, how to assign weights in an optimal manner remains unexplored. In this study, nine different temporal weighting strategies are proposed and evaluated using data extracted from a Swedish EHR database, where the predictive performance of models constructed with the random forest learning algorithm is compared. Moreover, variable importance is analyzed to obtain a deeper understanding as to why a certain weighting strategy is favored over another, as well as which clinical events undergo the biggest changes in importance with the various weighting strategies. The results show that the choice of weighting strategy has a significant impact on the predictive performance for ADE detection, and that the best choice of weighting strategy depends on the target ADE and, specifically, on its dose-dependency.

  • 7097.
    Zhao, Jing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henriksson, Aron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Learning temporal weights of clinical events using variable importance2016Ingår i: BMC Medical Informatics and Decision Making, ISSN 1472-6947, E-ISSN 1472-6947, Vol. 16, nr Suppl. 2, 71Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Background: Longitudinal data sources, such as electronic health records (EHRs), are very valuable for monitoring adverse drug events (ADEs). However, ADEs are heavily under-reported in EHRs. Using machine learning algorithms to automatically detect patients that should have had ADEs reported in their health records is an efficient and effective solution. One of the challenges to that end is how to take into account the temporality of clinical events, which are time stamped in EHRs, and providing these as features for machine learning algorithms to exploit. Previous research on this topic suggests that representing EHR data as a bag of temporally weighted clinical events is promising; however, the weights were in that case pre-assigned according to their time stamps, which is limited and potentially less accurate. This study therefore focuses on how to learn weights that effectively take into account the temporality and importance of clinical events for ADE detection. Methods: Variable importance obtained from the random forest learning algorithm is used for extracting temporal weights. Two strategies are proposed for applying the learned weights: weighted aggregation and weighted sampling. The first strategy aggregates the weighted clinical events from different time windows to form new features; the second strategy retains the original features but samples them by using their weights as probabilities when building each tree in the forest. The predictive performance of random forest models using the learned weights with the two strategies is compared to using pre-assigned weights. In addition, to assess the sensitivity of the weight-learning procedure, weights from different granularity levels are evaluated and compared. Results: In the weighted sampling strategy, using learned weights significantly improves the predictive performance, in comparison to using pre-assigned weights; however, there is no significant difference between them in the weighted aggregation strategy. Moreover, the granularity of the weight learning procedure has a significant impact on the former, but not on the latter. Conclusions: Learning temporal weights is significantly beneficial in terms of predictive performance with the weighted sampling strategy. Moreover, weighted aggregation generally diminishes the impact of temporal weighting of the clinical events, irrespective of whether the weights are pre-assigned or learned.

  • 7098.
    Zhao, Jing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henriksson, Aron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Asker, Lars
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Boström, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Detecting Adverse Drug Events with Multiple Representations of Clinical Measurements2014Ingår i: 2014 IEEE International Conference on Bioinformatics and Biomedicine (BIBM): Proceedings, IEEE Computer Society, 2014, 536-543 s.Konferensbidrag (Refereegranskat)
    Abstract [en]

    Adverse drug events (ADEs) are grossly under-reported in electronic health records (EHRs). This could be mitigated by methods that are able to detect ADEs in EHRs, thereby allowing for missing ADE-specific diagnosis codes to be identified and added. A crucial aspect of constructing such systems is to find proper representations of the data in order to allow the predictive modeling to be as accurate as possible. One category of EHR data that can be used as indicators of ADEs are clinical measurements. However, using clinical measurements as features is not unproblematic due to the high rate of missing values and they can be repeated a variable number of times in each patient health record. In this study, five basic representations of clinical measurements are proposed and evaluated to handle these two problems. An empirical investigation using random forest on 27 datasets from a real EHR database with different ADE targets is presented, demonstrating that the predictive performance, in terms of accuracy and area under ROC curve, is higher when representing clinical measurements crudely as whether they were taken or how many times they were taken by a patient. Furthermore, a sixth alternative, combining all five basic representations, significantly outperforms using any of the basic representation except for one. A subsequent analysis of variable importance is also conducted with this fused feature set, showing that when clinical measurements have a high missing rate, the number of times they were taken by one patient is ranked as more informative than looking at their actual values. The observation from random forest is also confirmed empirically using other commonly employed classifiers. This study demonstrates that the way in which clinical measurements from EHRs are presented has a high impact for ADE detection, and that using multiple representations outperforms using a basic representation.

  • 7099.
    Zhao, Jing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henriksson, Aron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Asker, Lars
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Boström, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Predictive modeling of structured electronic health records for adverse drug event detection2015Ingår i: BMC Medical Informatics and Decision Making, ISSN 1472-6947, E-ISSN 1472-6947, Vol. 15, nr SIArtikel i tidskrift (Refereegranskat)
    Abstract [en]

    Background: The digitization of healthcare data, resulting from the increasingly widespread adoption of electronic health records, has greatly facilitated its analysis by computational methods and thereby enabled large-scale secondary use thereof. This can be exploited to support public health activities such as pharmacovigilance, wherein the safety of drugs is monitored to inform regulatory decisions about sustained use. To that end, electronic health records have emerged as a potentially valuable data source, providing access to longitudinal observations of patient treatment and drug use. A nascent line of research concerns predictive modeling of healthcare data for the automatic detection of adverse drug events, which presents its own set of challenges: it is not yet clear how to represent the heterogeneous data types in a manner conducive to learning high-performing machine learning models. Methods: Datasets from an electronic health record database are used for learning predictive models with the purpose of detecting adverse drug events. The use and representation of two data types, as well as their combination, are studied: clinical codes, describing prescribed drugs and assigned diagnoses, and measurements. Feature selection is conducted on the various types of data to reduce dimensionality and sparsity, while allowing for an in-depth feature analysis of the usefulness of each data type and representation. Results: Within each data type, combining multiple representations yields better predictive performance compared to using any single representation. The use of clinical codes for adverse drug event detection significantly outperforms the use of measurements; however, there is no significant difference over datasets between using only clinical codes and their combination with measurements. For certain adverse drug events, the combination does, however, outperform using only clinical codes. Feature selection leads to increased predictive performance for both data types, in isolation and combined. Conclusions: We have demonstrated how machine learning can be applied to electronic health records for the purpose of detecting adverse drug events and proposed solutions to some of the challenges this presents, including how to represent the various data types. Overall, clinical codes are more useful than measurements and, in specific cases, it is beneficial to combine the two.

  • 7100.
    Zhao, Jing
    et al.
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Henriksson, Aron
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Boström, Henrik
    Stockholms universitet, Samhällsvetenskapliga fakulteten, Institutionen för data- och systemvetenskap.
    Cascading Adverse Drug Event Detection in Electronic Health Records2015Ingår i: 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA): Proceedings, IEEE Computer Society, 2015Konferensbidrag (Refereegranskat)
    Abstract [en]

    The ability to detect adverse drug events (ADEs) in electronic health records (EHRs) is useful in many medical applications, such as alerting systems that indicate when an ADE-specific diagnosis code should be assigned. Automating the detection of ADEs can be attempted by applying machine learning to existing, labeled EHR data. How to do this in an effective manner is, however, an open question. The issues addressed in this study concern the granularity of the classification task: (1) If we wish to predict the occurrence of ADE, is it advantageous to conflate the various ADE class labels prior to learning, or should they be merged post prediction? (2) If we wish to predict a family of ADEs or even a specific ADE, can the predictive performance be enhanced by dividing the classification task into a cascading scheme: predicting first, on a coarse level, whether there is an ADE or not, and, in the former case, followed by a more specific prediction on which family the ADE belongs to, and then finally a prediction on the specific ADE within that particular family? In this study, we conduct a series of experiments using a real, clinical dataset comprising healthcare episodes that have been assigned one of eight ADE-related diagnosis codes and a set of randomly extracted episodes that have not been assigned any ADE code. It is shown that, when distinguishing between ADEs and non-ADEs, merging the various ADE labels prior to learning leads to significantly higher predictive performance in terms of accuracy and area under ROC curve. A cascade of random forests is moreover constructed to determine either the family of ADEs or the specific class label; here, the performance is indeed enhanced compared to directly employing a one-step prediction. This study concludes that, if predictive performance is of primary importance, the cascading scheme should be the recommended approach over employing a one-step prediction for detecting ADEs in EHRs.

139140141142143144145 7051 - 7100 av 7214
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf