SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(SAMHÄLLSVETENSKAP) hsv:(Medie och kommunikationsvetenskap) hsv:(Systemvetenskap informationssystem och informatik med samhällsvetenskaplig inriktning) ;mspu:(article);lar1:(miun)"

Search: hsv:(SAMHÄLLSVETENSKAP) hsv:(Medie och kommunikationsvetenskap) hsv:(Systemvetenskap informationssystem och informatik med samhällsvetenskaplig inriktning) > Journal article > Mid Sweden University

  • Result 1-10 of 59
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Sjöö, Karolin, 1983, et al. (author)
  • Gender mainstreaming research funding: a study of effects on STEM research proposals
  • 2023
  • In: Science and Public Policy. - : Oxford University Press (OUP). - 1471-5430 .- 0302-3427. ; 50:2, s. 304-317
  • Journal article (peer-reviewed)abstract
    • Policymakers increasingly try to steer researchers to choose topics of societal concern and to conduct research in ways that reflect such concerns. One increasingly common approach is prompting researchers to integrate certain perspectives into the content of their research, but little is known about the effects of this governance modality. We analyze 1,189 science, technology, engineering, and mathematics research proposals submitted to the Swedish Research Council which, starting in 2020, required all applicants to consider including the sex and/or gender perspectives in their research. We identify three overarching strategies upon which researchers rely (content-, performer-, and impact-centered) and analyze the ways in which researchers across disciplines motivate, through text, the inclusion or exclusion of these perspectives. Based on our findings, we discuss the scope of the desired effect(s) of a requirement of this kind.
  •  
2.
  • Svärd, Proscovia, 1965-, et al. (author)
  • The implementation of an e-archive to facilitate open data publication and the use of common specifications : A case of three Swedish agencies
  • 2022
  • In: Government Information Quarterly. - : Elsevier. - 0740-624X .- 1872-9517. ; 39:4
  • Journal article (peer-reviewed)abstract
    • The study investigated how three agencies in Sweden were pursuing the implementation of an electronic archive (e-archive). The e-archive was seen by the Swedish National archives as a pre-requisite to the effective management of government information and would help the agencies to comply with the Swedish Public Sector Information (PSI) law which requires them to publish open data. It was also seen as an important component of an efficient e-government. The study further had two objectives: to establish whether the common specifications were being used and how the implementation of the PSI-law was being pursued. Interviews and a literature review were used as data gathering techniques. The Records Continuum Model (RCM) was applied to enhance an understanding of how the agencies were dealing with the publication of open data. Two of the agencies had implemented an e-archive but the third agency lacked one. All the three were publishing open data. The agency that did not have an e-archive was publishing open data that suited its existing information management infrastructure. This has implications since the PSI-law requires full publication of all PSI which has no restrictions. The common specifications were not being used by the agencies.
  •  
3.
  • Große, Christine, Fil.Dr, 1974-, et al. (author)
  • Information-flawing Filters in Critical Infrastructure Protection : The deficient Information Basis in a Swedish Approach
  • 2023
  • In: International Journal of Critical Infrastructures. - 1475-3219 .- 1741-8038. ; 19:1
  • Journal article (peer-reviewed)abstract
    • Various societal functions, such as healthcare, freight transports, water supplies and electricity, ensure the daily life, endurance and progress of modern societies. The protection of such critical functions requires comprehensive information processing. Based on evidence from documents on the Swedish planning process STYREL and interviews with entrusted decisionmakers at county administrative boards, municipalities and power grid operators, this study aims to crystallise information pathways and flaws to highlight information filtration and alteration. Analyses of the material reveal a set of information-flawing filters, such as information withholding or loss when sharing, information scarcity in criticality assessments and ad-hoc information creation due to scarcity. Because of these filters, the Swedish process causes an altering of information that affects the quality of decisions and the emergency response plan that relies on them. Thus, this study indicates deficiencies that relate to information sharing, information security and decision-making that pose risks to citizens and businesses.
  •  
4.
  • Sefyrin, Johanna (author)
  • From Profession to Practices in IT Design
  • 2012
  • In: Science, Technology and Human Values. - : SAGE Publications. - 0162-2439 .- 1552-8251. ; 37:6, s. 708-728
  • Journal article (peer-reviewed)abstract
    • In this article the argument is that in order to find women who participate in the design of IT, it is not enough to analyze gendered divisions of labor in terms of professional belongings but also to analyze the practices behind the professional categories that are involved in IT design. The purpose of the article is to explore how actors in various ways were configured during an IT design project. The article is based on an IT design project, and the empirical material for the study was gathered through the use of ethnographic methods, and analyzed diffractively. This analysis showed that the boundaries between actors shifted, that the actors were placed in several different positions, and that what was done in practices did not always fit with the formal positions. The analysis made it possible to see that in this IT design project, women were important participants on which the whole project depended. If this project is representative also for other IT design projects, the problem of women as outsiders of IT design could be rephrased, and the problem is no longer that women are not included in IT design, but that their participation does not always become visible. © The Author(s) 2012.
  •  
5.
  • Larsson, Aron, 1976-, et al. (author)
  • A Simulation-Game for Resilience Assessments in a Payment System Disruption Scenario
  • 2022
  • In: International Journal of Knowledge and Systems Science. - : I G I Global. - 1947-8208 .- 1947-8216. ; 13:1, s. 1-25
  • Journal article (peer-reviewed)abstract
    • This paper presents a quantitative agent-based simulation model of the everyday payment system used to simulate the business and consumer consequences of loss of functionality, or disruptions of the payment system for the food and fuel retailing markets as well as the bank sector in order to address resilience. The simulation model is used in a gaming simulation approach that couples a role-playing game with the simulation model in order to provide crisis management team-training to decision-makers in a multi-organisational context. Drawing primarily on resilience engineering and crisis response, the concepts of core values, coping strategies, and resilience value networks were used to guide the design of the simulation model. The ultimate aim of this study is to explore the collaborative responses from the key actors during the disruption scenario in order to evoke and facilitate collective resilience.
  •  
6.
  • Ahmad, Awais, 1981-, et al. (author)
  • Exploring the Medical Caregivers' Perceptions of Technology Acceptance for an Online Speech and Language Assessment Application Among Stroke Patients
  • 2023
  • In: International Journal on Advances in Life Sciences. - : International Academy, Research and Industry Association (IARIA). - 1942-2660. ; 15:1-2, s. 1-10
  • Journal article (peer-reviewed)abstract
    • Stroke is a globally increasing disease and speech and language deficiencies are common in stroke survivors. To facilitate medical caregivers in their professional work and to improve patients’ quality of life, technology can play an important role. However, the use and acceptance of technology are uncertain and more research is needed in this direction. This study evaluates the technology acceptance and adoption of an online speech and language assessment application. The evaluation-focused Design Science Research strategy was adopted for that purpose. Two physiotherapists, one occupational therapist and three speech therapists participated in the study. The Unified Theory of Acceptance and Use of Technology (UTAUT) was used as the theoretical base for interview questions formation and data analysis. The study findings show that the suggested application is useful and easy to use; however, it should be better synchronised with speech therapists’ daily work routines. The speech therapists stressed that the functionalities of the application should be designed in close collaboration with them, and it should be compatible with the already existing systems and services in place. Due to impairments after stroke, the patients have some specific preferences for software and hardware; such as a tablet with a touch pen is the preferred hardware. Additionally, the interface should have bigger text fonts and pictures, and highly contrastive colours in the graphics should be used for patients’ convenience. The user’s privacy and security, the patient’s current health, and their previous knowledge and experience with technology were also found important determinants for the intention to use the given technology.
  •  
7.
  • Anderson, Karen, et al. (author)
  • In Memoriam : Terry Cook (1947–2014)
  • 2014
  • In: Archival Science. - : Springer Science and Business Media LLC. - 1389-0166 .- 1573-7500 .- 1573-7519. ; 14:3-4, s. 205-206
  • Journal article (other academic/artistic)
  •  
8.
  • Aqeel-ur, Rehman, et al. (author)
  • An efficient mixed inter-intra pixels substitution at 2bits-level for image encryption technique using DNA and chaos
  • 2018
  • In: Optik (Stuttgart). - : Elsevier BV. - 0030-4026 .- 1618-1336. ; 153, s. 117-134
  • Journal article (peer-reviewed)abstract
    • In this paper, an image encryption system is proposed that uses only addition operation to achieve higher efficiency at diffusion phase after DNA encoding at pixel level. The image is first permuted and then encoded into DNA bases using sub-set of DNA complementary rules chaotically. Afterwards, the adjacent columns of DNA encoded image are added in the substitution phase named as inter-intra pixels substitution which followed by row addition named as inter-pixels substitution. This substitution is performed by adding DNA bases where each DNA base is composed of 2-bits. The addition operation performs randomly between DNA bases named mixed inter-intra pixel substitution. To strengthen security, initial conditions for chaotic maps are computed from SHA-256 hash of plain image which leads to enhance the resistance against known/chosen-plaintext and differential attacks. Due to fewer computational operations, the efficiency of the proposed cipher is high. The simulated results show that the proposed technique is extremely robust against statistical and differential attacks. It successfully surpassed the statistical tests such as Histogram, Correlation, Chi-Square and Entropy. For differential attack, it passed quantitative as well as qualitative Number of Pixel Change Rate (NPCR) and Unified Average Cipher Intensity (UACI) tests in a single round of encryption. 
  •  
9.
  • Asproth, Viveca, 1948-, et al. (author)
  • Anticipatory Modeling andSimulation for Inter RegionalSecurity
  • 2013
  • In: Systems. connecting matter, life, culture and technology. - 2305-6991. ; 1:1, s. 21-35
  • Journal article (peer-reviewed)abstract
    • The idea of anticipatory modeling and simulation with subsequent learning from the outcomes is here applied on inter-regional security work. In this setting, multi-actors have to both cooperate and make coordinated decisions with just partial information about each other. With help of netAgora, a net based environment for simulation, learning, and communication, the goal of training, preparedness and continuous improvement of decisions is met.
  •  
10.
  • Asproth, Viveca, 1948-, et al. (author)
  • NLS:A Reflection Support System for Increased Inter-Regional Security
  • 2014
  • In: International Journal of Information Technologies and Systems Approach. - : IGI Global. - 1935-570X .- 1935-5718. ; 7:2, s. 62-84
  • Journal article (peer-reviewed)abstract
    • Cooperation across national borders is of paramount importance for the security in border close regions. Timely and adequate training, reflection, and preparation are core tools for facilitating and stimulating such interregional cooperation. Hence, NetAgora, a service oriented web portal for security cooperation, was designed. In NetAgora there is first a service package with accident- and emergency scenarios. Here multi-actors can train their cooperation and decision making skills. The R-statistics open source package is applied for recording and analyzing data from those training occasions. In subsequent debriefing sessions this is used for post-learning. Further, from anticipatory modeling and simulation it is found that rescue operations are delayed and misguided due to shortcomings in the communication between security command and communication centers. Hence, the NetAgora Learning System is designed and prototyped in order to overcome that problem. It will facilitate and stimulate reflection in action and double loop learning and aims at improving communication patterns by anticipatory pre-learning.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-10 of 59
Type of publication
Type of content
peer-reviewed (57)
other academic/artistic (2)
Author/Editor
Asproth, Viveca, 194 ... (5)
Ekenberg, Love (4)
Danielson, Mats (4)
Holmberg, Stig (4)
Öberg, Lena-Maria (2)
Löfstedt, Ulrica (2)
show more...
Håkansson, Anita (2)
Lee, H. (1)
Park, J (1)
Cristofaro, Matteo (1)
Danielson, Mats, 195 ... (1)
Ekenberg, Love, 1962 ... (1)
Lee, J. (1)
Olausson, Pär M, 196 ... (1)
van Laere, Joeri (1)
Ahlin, Karin, 1963- (1)
Persson Slumpi, Thom ... (1)
Öberg, Lena-Maria, 1 ... (1)
Ahmad, Awais, 1981- (1)
Mozelius, Peter, Doc ... (1)
Hassan Sodhro, Ali (1)
Mozelius, Peter, Dr. ... (1)
Mörtberg, Christina (1)
Nyhlén, Sara, 1980- (1)
Cleveland- Innes, Ma ... (1)
Blusi, Madeleine (1)
Anderson, Karen (1)
Oliver, G. (1)
Yakel, E. (1)
Engvall, Tove (1)
Samuelsson, Göran, 1 ... (1)
Giritli Nygren, Kata ... (1)
Hrastinski, Stefan (1)
Runardotter, Mari (1)
Eriksson, Henrik, 19 ... (1)
Stjernström, Olof (1)
Sundgren, David (1)
Aqeel-ur, Rehman (1)
Liao, Xiaofeng (1)
Hahsmi, Muntazim Abb ... (1)
Haider, Rizwan (1)
Ring, Andreas (1)
Holmberg, Stig C. (1)
Dubois, Daniel (1)
Ekker, Knut (1)
Nyström, Christina (1)
Raharjo, Hendry, 197 ... (1)
Fasth, Tobias, 1980- (1)
Svahn, Mattias (1)
Johansson, Björn J.E ... (1)
show less...
University
Stockholm University (8)
Södertörn University (7)
Umeå University (2)
Chalmers University of Technology (2)
University of Gothenburg (1)
show more...
Royal Institute of Technology (1)
Luleå University of Technology (1)
Linköping University (1)
Linnaeus University (1)
Karlstad University (1)
show less...
Language
English (57)
Swedish (1)
Spanish (1)
Research subject (UKÄ/SCB)
Social Sciences (59)
Natural sciences (12)
Engineering and Technology (3)
Medical and Health Sciences (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view