SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "L4X0:1101 8526 "

Search: L4X0:1101 8526

  • Result 1-50 of 228
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Backlund, Per (author)
  • Development Process Knowledge Transfer through Method Adaptation, Implementation, and Use
  • 2004
  • Doctoral thesis (other academic/artistic)abstract
    • Information Systems Engineering (ISE) is an interdisciplinary approach to enable the realisation of successful information systems in a broad sense. ISE comprises a number of areas of expertise that must be integrated and managed in order to build information systems. Since ISE is becoming progressively more complex there is an increasing need to codify and manage knowledge within and about the ISE process. From a knowledge perspective the different model types created in an ISE project are examples of codified knowledge about the future system. The descriptions of how work should proceed are examples of codified knowledge of the process of creating the system. In summary, one of the main concerns in the ISE process is to manage the substantial amount of knowledge associated with the process as such as well as with the target domain of the actual development project and the developed software. In the thesis I recognise three areas of knowledge in ISE: development process knowledge, target domain knowledge, and software knowledge. Furthermore, I use a set of knowledge perspectives in order to describe and analyse ISE from a knowledge perspective. Finally, I introduce three aspects: organisation, artefact, and individual in order to be able to discuss and analyse how methods are actually used in organisations and how they affect the work situation. The results are presented in the form of a framework for knowledge transfer in ISE that comprises the knowledge perspective, the knowledge area, and the aspect of knowledge transfer. The framework is thus used to analyse the results from the six papers enclosed in the thesis. The results also comprise an empirical characterisation of a method in use which is based on data collected during an ethnographical study. Finally the results are made concrete in the form of a pattern collection for method introduction and method use.
  •  
2.
  • Cakici, Baki, 1984- (author)
  • The Informed Gaze : On the Implications of ICT-Based Surveillance
  • 2013
  • Doctoral thesis (other academic/artistic)abstract
    • Information and communication technologies are not value-neutral. I examine two domains, public health surveillance and sustainability, in five papers covering: (i) the design and development of a software package for computer-assisted outbreak detection; (ii) a workflow for using simulation models to provide policy advice and a list of challenges for its practice; (iii) an analysis of design documents from three smart home projects presenting intersecting visions of sustainability; (iv) an analysis of EU-financed projects dealing with sustainability and ICT; (v) an analysis of the consequences of design choices when creating surveillance technologies. My contributions include three empirical studies of surveillance discourses where I identify the forms of action that are privileged and the values that are embedded into them. In these discourses, the presence of ICT entails increased surveillance, privileging technological expertise, and prioritising centralised forms of knowledge.
  •  
3.
  • Cöster, Rickard, 1973- (author)
  • Algorithms and Representations for Personalised Information Access
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • Personalised information access systems use historical feedback data, such as implicit and explicit ratings for textual documents and other items, to better locate the right or relevant information for individual users.Three topics in personalised information access are addressed: learning from relevance feedback and document categorisation by the use of concept-based text representations, the need for scalable and accurate algorithms for collaborative filtering, and the integration of textual and collaborative information access.Two concept-based representations are investigated that both map a sparse high-dimensional term space to a dense concept space. For learning from relevance feedback, it is found that the representation combined with the proposed learning algorithm can improve the results of novel queries, when queries are more elaborate than a few terms. For document categorisation, the representation is found useful as a complement to a traditional word-based one.For collaborative filtering, two algorithms are proposed: the first for the case where there are a large number of users and items, and the second for use in a mobile device. It is demonstrated that memory-based collaborative filtering can be more efficiently implemented using inverted files, with equal or better accuracy, and that there is little reason to use the traditional in-memory vector approach when the data is sparse. An empirical evaluation of the algorithm for collaborative filtering on mobile devices show that it can generate accurate predictions at a high speed using a small amount of resources.For integration, a system architecture is proposed where various combinations of content-based and collaborative filtering can be implemented. The architecture is general in the sense that it provides an abstract representation of documents and user profiles, and provides a mechanism for incorporating new retrieval and filtering algorithms at any time.In conclusion this thesis demonstrates that information access systems can be personalised using scalable and accurate algorithms and representations for the increased benefit of the user.
  •  
4.
  •  
5.
  • Laaksolahti, Jarmo (author)
  • Plot, Spectacle, and Experience : Contributions to the Design and Evaluation of Interactive Storytelling
  • 2008
  • Doctoral thesis (other academic/artistic)abstract
    • Interactive storytelling is a new form of storytelling emerging in the crossroads of many scholarly, artistic, and industrial traditions. In interactive stories the reader/spectator moves from being a receiver of a story to an active participant. By allowing participants to influence the progression and outcome of the story new experiences will arise. This thesis has worked on three aspects of interactive storytelling: plot, spectacle, and experience. The first aspect is concerned with finding methods for combining the linear structure of a story, with the freedom of action required for an interactive experience. Our contribution has focused on a method for avoiding unwanted plot twists by predicting the progression of a story and altering its course if such twists are detected.The second aspect is concerned with supporting the storytelling process at the level of spectacle. In Aristotelian terms, spectacle refers to the sensory display that meets the audience of a drama and is ultimately what causes the experience. Our contribution focuses on graphically making changing emotions and social relations, important elements of dramatic stories in our vision, salient to players at the level of spectacle. As a result we have broadened the view of what is important for interactive storytelling, as well as what makes characters believable. So far not very much research has been done on evaluating interactive stories. Experience, the third aspect, is concerned with finding qualitative methods for evaluating the experience of playing an interactive story. In particular we were interested in finding methods that could tell us something about how a players experience evolved over time, in addition to qualities such as agency that have been claimed to be characteristic for interactive stories. Our contribution consists of two methods that we have developed and adapted for the purposes of evaluating interactive stories that can provide such information. The methods have been evaluated on three different interactive storytelling type games.
  •  
6.
  • Sundström, Petra, 1976- (author)
  • Designing Affective Loop Experiences
  • 2010
  • Doctoral thesis (other academic/artistic)abstract
    • There is a lack of attention to the emotional and the physical aspects of communication in how we up to now have been approaching communication between people in the field of Human Computer Interaction (HCI). As designers of digital communication tools we need to consider altering the underlying model for communication that has been prevailing in HCI: the information transfer model. Communication is about so much more than transferring information. It is about getting to know yourself, who you are and what part you play in the communication as it unfolds. It is also about the experience of a communication process, what it feels like, how that feeling changes, when it changes, why and perhaps by whom the process is initiated, altered, or disrupted. The idea of Affective Loop experiences in design aims to create new expressive and experiential media for whole users, embodied with the social and physical world they live in, and where communication not only is about getting the message across but also about living the experience of communication - feeling it. An Affective Loop experience is an emerging, in the moment, emotional experience where the inner emotional experience, the situation at hand and the social and physical context act together, to create for one complete embodied experience. The loop perspective comes from how this experience takes place in communication and how there is a rhythmic pattern in communication where those involved take turns in both expressing themselves and standing back interpreting the moment. To allow for Affective Loop experiences with or through a computer system, the user needs to be allowed to express herself in rich personal ways involving our many ways of expressing and sensing emotions – muscles tensions, facial expressions and more. For the user to become further engaged in interaction, the computer system needs the capability to return relevant, either diminishing, enforcing or disruptive feedback to those emotions expressed by the user so that the she wants to continue express herself by either strengthening, changing or keeping her expression. We describe how we used the idea of Affective Loop experiences as a conceptual tool to navigate a design space of gestural input combined with rich instant feedback. In our design journey, we created two systems, eMoto and FriendSense.
  •  
7.
  • Chemane, Lourino, 1966- (author)
  • ICT Platform Integration - MCDM Based Framework for the Establishment of Value Network : Case Study: Mozambique Government Electronic Network (GovNet)
  • 2011
  • Doctoral thesis (other academic/artistic)abstract
    • The selection of ICT service providers are among many of the challenges in building networks (intranets and extensions to the Internet) due to the high investment on equipment (CAPEX) and on operational costs (OPEX). This thesis proposes a Multi-Criteria Decision Method based decision support framework via the deployment of the Analytical Hierarchy Process method that can be used to improve selection and evaluation practices. The work deals explicitly with the role of ICT in supporting the corporate mission, and goals, in building the organization value network. It helps also in planning and defining the access to the Internet and strategies for making critical ICT related decisions. A specific study, The Government Electronic Network Project in Mozambique, has been used as a use case for the developed model and for validating the framework. The thesis also covers aspects related to the broader eGovernment process in Mozambique, such as the architecture, the principles, and the associated IT protocols and standards required for the interoperability of the respective eGovernment systems. The framework and recommendations are expected to contribute in assisting organizations to increase the usage and improve the management of IT platforms and services. In addition, they should help in bettering the systematization of the input data in specifying the requirements for the services offered by Internet service providers. The model should bring to the attention of decision-makers many factors that are currently neither considered nor are central to the selection processes. Furthermore, the decision-makers can use the framework in explaining and describing the investment decisions behind ICT projects in the context of the organization value network.
  •  
8.
  • Zdravkovic, Jelena (author)
  • Process Integration for the Extended Enterprise
  • 2006
  • Doctoral thesis (other academic/artistic)abstract
    • In many industries today, the speed and costs with which new products are delivered to customers provide the basis for competitive advantage. Electronic business (e-business) is a concept that shortens the “time to market” and enables transacting at lower costs. Currently, one of the main limitations in the exploitation of e-business is the lack of efficient Information System (IS) integration, both in intra- and cross-enterprise environments. Intra-enterprise integration is complex, as the business needs and the underlying information systems do not evolve in accordance. In the cross-enterprise context, transparent system integration is hardly achievable due to the incompatibility of the services of the involved partners. This means that the future success of the integration depends heavily on the possibilities offered in terms of interoperability among the involved enterprises. The Business Process Management (BPM) discipline addresses this challenge, as processes have been recognized as key mechanisms through which most intra- and cross-enterprise interactions take place. The development of methods for successful integration of process models is one of the essential issues for the use of the BPM approach in the application and evolution of e-business. In this thesis, we address two topics in the area of business process management: 1) intra-enterprise process integration which concerns alignment between the internal business processes and information systems enclosed in the form of software services and 2) cross-enterprise integration which concerns coordination of the internal business processes of an enterprise with the processes of its suppliers, intermediaries, or customers. The goal of the thesis is to add theoretical and applicable knowledge to the field of business process management by using the proposed approaches for improvement of process integration in intra- and cross-enterprise contexts.
  •  
9.
  •  
10.
  • Boström, Gustav, 1973- (author)
  • Simplifying development of secure software : Aspects and Agile methods
  • 2006
  • Licentiate thesis (other academic/artistic)abstract
    • Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.
  •  
11.
  • Bylund, Markus, 1971- (author)
  • A Design Rationale for Pervasive Computing : User Experience, Contextual Change and Technical Requirements
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • The vision of pervasive computing promises a shift from information tech-nology per se to what can be accomplished by using it, thereby fundamen-tally changing the relationship between people and information technology. In order to realize this vision, a large number of issues concerning user ex-perience, contextual change, and technical requirements should be ad-dressed. We provide a design rationale for pervasive computing that encom-passes these issues, in which we argue that a prominent aspect of user ex-perience is to provide user control, primarily founded in human values. As one of the more significant aspects of the user experience, we provide an extended discussion about privacy. With contextual change, we address the fundamental change in previously established relationships between the practices of individuals, social institutions, and physical environments that pervasive computing entails. Finally, issues of technical requirements refer to technology neutrality and openness—factors that we argue are fundamen-tal for realizing pervasive computing. We describe a number of empirical and technical studies, the results of which have helped to verify aspects of the design rationale as well as shap-ing new aspects of it. The empirical studies include an ethnographic-inspired study focusing on information technology support for everyday activities, a study based on structured interviews concerning relationships between con-texts of use and everyday planning activities, and a focus group study of laypeople’s interpretations of the concept of privacy in relation to informa-tion technology. The first technical study concerns the model of personal service environments as a means for addressing a number of challenges con-cerning user experience, contextual change, and technical requirements. Two other technical studies relate to a model for device-independent service de-velopment and the wearable server as a means to address issues of continu-ous usage experience and technology neutrality respectively.
  •  
12.
  •  
13.
  •  
14.
  • Ciobanu Morogan, Matei, 1973- (author)
  • Security system for ad-hoc wireless networks based on generic secure objects
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • As computing devices and wireless connectivity become ubiquitous, new usage scenarios emerge, where wireless communication links between mobile devices are established in an ad-hoc manner. The resulting wireless ad-hoc networks differ from classical computer networks in a number of ways, lack of permanent access to the global network and heterogeneous structure being some of them. Therefore, security services and mechanisms that have been designed for classical computer networks are not always the optimal solution in an ad-hoc network environment. The research is focused on analyzing how standard security services that are available in classical networks can be provided in an ad-hoc wireless network environment. The goal is to design a security system optimized for operation in ad-hoc wireless networks that provides the same security services – authentication, access control, data confidentiality and integrity, non-repudiation – currently available in classic wired networks. The first part of the thesis is the design and implementation of a security platform based on generic secure objects. The flexible and modular nature of this platform makes it suitable for deployment on devices that form ad-hoc networks – ranging from Java-enabled phones to PDAs and laptops. We then investigate the problems that appear when implementing in ad-hoc networks some of the security technologies that are standard building blocks of secure systems in classical computer networks. Two such technologies have been found to present problems, namely the areas of certification and access control. In a series of articles, we have described the problems that appear and devised solutions to them by designing protocols, techniques and extensions to standards that are optimized for usage in the ad-hoc network environment. These techniques, together with the functionality provided by the underlying security platform, are used to implement all standard security services – confidentiality, authentication, access control, non repudiation and integrity, allowing to integrate ad-hoc networks into the existing security infrastructure.
  •  
15.
  • Davies, Guy, 1962- (author)
  • Mapping and integration of schema representations of component specefications
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • Specification for process oriented applications tends to use languages that suffer from infinite, intractable or unpredictably irregular state spaces that thwart exhaustive searches by verification heuristics. However, conceptual schemas based on FOL, offer techniques for both integrating and verifying specifications in finite spaces. It is therefore of interest to transform process based specifications into conceptual schemata. Process oriented languages have an additional drawback in that reliable inputs to the integration of diverse specifications can result in unreliable outputs. This problem can more easily be addressed in a logic representation in which static and dynamic properties can be examined separately. The first part of the text describes a translation method from the process based language SDL, to first order logic. The usefulness of the method for industrial application has been demonstrated in an implementation. The method devised is sufficiently general for application to other languages with similar characteristics. Main contributions consist of: formalising the mapping of state transitions to event driven rules in dynamic entity-relationship schemas; analysing the complexity of various approaches to decomposing transitions; a conceptual representation of the source language that distinguishes meta- and object models of the source language and domain respectively. The second part of the text formally describes a framework for the integration of schemata that allows the exploration of their properties in relation to each other and to a set of integration assertions. The main contributions are the formal framework; an extension to conflicts between agents in a temporal action logic; complexity estimates for various integration properties.
  •  
16.
  •  
17.
  • Hagen, Ulf, 1951- (author)
  • Lodestars for Player Experience : Ideation in Videogame design
  • 2012
  • Licentiate thesis (other academic/artistic)abstract
    • The design and development of commercial AAA videogames is a difficult and complex endeavor. It involves large development teams that together aim to create high quality, entertaining games that sell well. Up to now, very few scholars have documented or problematized this practice. This thesis presents a study of the design practices in big game development studios that make commercial AAA videogames. The study focuses on the so called ideation part of videogame development, in which the design ideas are generated, developed and communicated in the work team. The primary data comes from interviews conducted with seven Swedish game developers, but a large quantity of secondary data has also been used. The study shows that the design practice in many studios is to focus on the player experience instead of game features. To secure the intended player experience, the studios have moved away from "big design up front" in the form of classical game design documents, and are instead using a variety of verbal, visual and audial tools to articulate and communicate their vision of the game-to-be. In the thesis, I coin the term lodestars to denote these articulations of the main game concept and the intended player experience. I then move on to describe, exemplify and categorize them. The main purpose of lodestars is to allow everyone in the development team to make design choices in line with a commonly shared design vision in order to create a unified player experience.
  •  
18.
  • Jansson, Eva, 1971- (author)
  • Working together when being apart : An analysis of distributed collaborative work through ICT from an organizational and psychosocial perspective
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • The purpose of the research is to analyze collaboration and communication in distributed teams working together through ICT (Information and Communication Technology), to provide an overview and a broader understanding of important areas that require consideration. The analysis is from an organizational, psychosocial and managerial perspective, with the aim to support the development of strategies and the creation of more efficient and pleasant distributed work environments. Research questions concern the psychosocial work environment; differences, problems and opportunities for distributed teams, with deeper analysis of areas that was demonstrated particularly difficult. The analysis is concretized into advice to guide distributed teams; common problem areas are pointed out and an attempt on a theoretical model of distributed project work is made. A solid ground for continued research in the area as well as possibilities to support distributed teams is provided. The research was mainly conducted in globally distributed project courses at a university level, where students communicated and collaborated through ICT. The results apply on distributed projects, but can also be relevant for other areas in the new ICT facilitated work environment. The research has been conducted by investigating how team members behave in and perceive distributed work environments; analyzing how i.e. variations in organization, work, social activities and behavior affect how well the collaboration and communication work Teams working in distributed projects go through the same stages and encounter the same problems as any other team. Some problems become harder to overcome, there are new obstacles, at the same time as other problems become less noticeable and new opportunities arise. The base for collaboration and communication changes when team members don't see each other regularly. Teams are entailed to use ICT for basically all communication and various media demands alterations in behavior, as well as it alters the relation between senses and how people perceive things. Distributed team members don't have the same awareness of each other and get fewer cues to interpret situations and handle teambuilding, motivational problems and conflicts. Several of the regular ways to start socializing, build trust and get a common base for understanding and collaboration are not present in a distributed environment. There is no physical team space to meet in and team members don't "see" each other on a regular basis. It is possible to successfully work in distributed teams without regular face-to-face meetings even if it is more intricate. It will always be different, and the big danger is believing that it won't. Working in distributed teams is not necessarily worse, but there are no effortless solutions for replacing face-to-face encounters. Distributed projects require effort, but conducted right it can be a rewarding experience that brings an extra dimension to the project work. To make distributed projects work well it is necessary to consider technological issues as well as their effects on individuals. It is essential to understand the new issues people encounter when moving to a distributed work environment and the interrelations between different areas and variables.
  •  
19.
  • Jonsson, Martin, 1973- (author)
  • Sensing and Making Sense : Designing Middleware for Context Aware Computing
  • 2007
  • Doctoral thesis (other academic/artistic)abstract
    • Computing devices are becoming wireless, smaller and embedded into other artifacts. Some of them are mobile while others are built into the environment. The novel technologies are also becoming more dependent of communication with other computing devices over different kinds of networks. These interconnected devices constitute locally and globally distributed service environments that will enforce new requirements on the design of software systems. These new type of environments provide both opportunities for new types of applications as well as a number of new problems that will have to be addressed. One approach that have been suggested both in order to provide new functionalities and as a possible solution to some of the problems is to try and collect and incorporate aspects of the /context/ of a person, activity or device as a part of the computer system. This thesis addresses some issues that have to be considered when designing this kind of systems. In particular the thesis examines how to design middleware that can support the creation of context aware applications. As a part of this work several instances of such systems have been implemented and put in use and tested in various applications. Some key problems with respect to the design of context information middleware are also identified and examined. One question that is addressed concerns the clash between the need for internal representations of context information and the goal of middleware to support a broad range of applications. Another problem that has been addressed concerns how to create means for context aware service discovery in ubiquitous computing environments. Various mechanisms that address these problems have been implemented and tested. Finally the work addresses issues related to the role of the users in this kind of systems. Implementations and experiments have been performed where users take more active roles in aspects of system maintenance and adaptation as well as in the interpretation and representation of context information.
  •  
20.
  • Juell-Skielse, Gustaf, 1964- (author)
  • ERP adoption in small and medium sized enterprises
  • 2006
  • Licentiate thesis (other academic/artistic)abstract
    • Enterprise resource planning (ERP) is established among a majority of small and medium sized companies in Kista Science City and seems to have a positive effect on organizational effectiveness. Kista Science City is Sweden’s largest corporate centre, with more companies and employees in a limited area than anywhere else in Europe. This study looks at the level of adoption of ERP functions, perceived organizational effectiveness and critical success factors. The most common use of ERP is for financial control and reporting, followed by order entry and purchasing. A significant relationship between the level of adoption and organizational effectiveness was found. Although Enterprise Resource Planning has become an established phenomenon the investments in ERP software are far from fully utilized. Most companies have started to use ERP to integrate functional areas but few companies have moved to extended ERP (ERPII). The adoption of functionality for customer relationship management seems to have started, but the use of e-commerce, business intelligence and supply chain management is very low. Different reasons for the low level of adoption are discussed and it is suggested that the interrelationship between SMEs and ERP-consultants be investigated further. ERP-consultants are important change agents and knowledge transfers for ERP and one way to interpret the data is that ERP-consultants are caught in a negative spiral where they focus on installations and technical maintenance of core ERP, which prevents them from developing new, extended ERP competence. An analysis of critical success factors showed that although technical competence was important socially oriented factors such as project teamwork and composition as well as communication had a greater effect on organizational effectiveness. Surprisingly enough, project management did not have any effect on organizational effectiveness. Common implementation methods for ERP focus on project management. It is suggested to further analyse if these methods could be improved by an increased adaptability to differences in company settings and requirements as well as through a better use of critical success factors. Organizational effectiveness can be measured in many ways and it was found that the success factors varied in terms of how they correlated with different measures. In the next step, the doctorial thesis, it is suggested that a prototype environment is developed to stimulate an increased use of extended ERP among small and medium sized companies. Several actors, such as SMEs, consultants, vendors and students would be involved. The prototype environment could facilitate enhancements of implementation methods and reduction of implementation costs through the development of reusable objects such as add-on solutions, process maps and system configurations. It could also help small and medium sized companies to investigate the business benefits of ERP by increasing involvement and familiarity while on the same time decrease costs and risks.
  •  
21.
  • Kabilan, Vandana, 1973- (author)
  • Ontology for Information Systems (04IS) Design Methodology : Conceptualizing, Designing and Representing Domain Ontologies
  • 2007
  • Doctoral thesis (other academic/artistic)abstract
    • Globalization has opened new frontiers for business enterprises and human communication. There is an information explosion that necessitates huge amounts of information to be speedily processed and acted upon. Information Systems aim to facilitate human decision-making by retrieving context-sensitive information, making implicit knowledge explicit and to reuse the knowledge that has already been discovered. A possible answer to meet these goals is the use of Ontology. Ontology has been studied for a long time in the fields of AI, Logic and Linguistics. Current state-of-the art research in Information Systems has focused on the use of ontologies. However, there remain many obstacles for the practical and commercial use of ontologies for Information Systems. One such obstacle is that current Information System designers lack the know-how to successfully design an ontology. Current ontology design methodologies are difficult to use by Information Systems designers having little theoretical knowledge of ontology modeling. Another issue is that business enterprises mostly function in the social domain where there are complex underlying semantics and pragmatics involved. This research tries to solve some of these issues by proposing the Ontology for Information Systems (O4IS) Design Methodology for the design of ontologies for Information Systems. The research also proposes a Unified Semantic Procedural Pragmatic Design for explicit conceptualization of the semantics and pragmatics of a domain. We further propose a set of Semantic Analysis Representations as conceptual analysis patterns for semantic relationship identification. We also put forward the Dual Conceptual Representation so that the designed ontology is understandable by both humans and machines. Finally, a logical architecture for domain ontology design called the Multi-Tier Domain Ontology Architecture is proposed. We follow the design science in Information Systems research methodology. The proposed solutions are demonstrated through two case studies carried out in different domains. The first case study is that of business contract knowledge management, which focuses on the analysis of contractual obligations, their fulfillment via the performance of business actions, and the deduction of a contract compliant workflow model. The second case study relates to military operations simulations and modeling. The emphasis in this case study is to analyze, model and represent the domain knowledge as a re-usable resource to be used in a number of modeling and simulation applications.
  •  
22.
  • Kabilan, Vandana (author)
  • Using multi tier contract ontology to model contract workflow models
  • 2003
  • Licentiate thesis (other academic/artistic)abstract
    • Legal Business Contracts govern the business relationshipbetween trading business partners. Business contracts are likeblueprints of expected business behaviour from all thecontracting parties involved. Business contracts bind theparties to obligations that must be fulfilled by expectedperformance events. Contractual violations can lead to bothlegal and business consequences. Thus it is in the bestinterests of all parties concerned to organise their businessprocess flows to be compliant to the stipulated businesscontracts terms and conditions.However, Contract Management and Business Process Managementin the current information systems domain are not closelyintegrated. Also it is not easy for business domain experts orinformation systems experts to understand and interpret thelegal terms and conditions into their respective domain needsand requirements. This thesis addresses the above two issues inan attempt to build a semantic bridge across the differentdomains of a legal business contract. This thesis focuses onthe contract execution phase of typical business contracts andas such views contract obligations as processes that need to beexecuted and monitored. Business workflows need to be as closeas possible to the stated contract obligation executionworkflow.In the first phase, a framework for modelling andrepresenting contractual knowledge in the form of Multi TierContract Ontology (MTCO) is proposed. The MTCO uses conceptualmodels as knowledge representation methodology. It proposes astructured and layered collection of individual ontologiesmoving from the top generic level progressively down tospecific template ontologies. The MTCO is visualised as areusable, flexible, extendable and shared knowledge base.In the second phase, a methodology for deducing the ContractWorkflow Model (CWM) is proposed. The CWM is deduced from theMTCO and a contract instance document in a stepwise userguideline. The CWM outlines the preferred choreography ofbusiness performance that successfully fulfils the execution ofcontract obligations. The deduced CWM is visualised as an aidto monitor the contract, as a starting point for businessprocess integration and business process workflow design.
  •  
23.
  •  
24.
  • Li, Wei, 1979- (author)
  • Towards a Person-Centric Context Aware System
  • 2006
  • Licentiate thesis (other academic/artistic)abstract
    • A recent trend is to integrate sensing, communication, and computation into every aspect of our daily life, ranging from various user devices to physical environment. The goal is to give computer systems an awareness of the users and their situations, so that they can support their diverse interaction needs at anytime, any place. A major problem hindering achieving this promising goal is that the users usually play a passive role in these systems with little possibility to interfere with the processing. Additionally, there is no option for the user to prevent being monitored by the system. This drawback stems from the lack of an independent and consistent user oriented viewpoint in current ubiquitous computing systems, which can easily result in the occurrence of user privacy invasion and misinterpretation of the user. To overcome this problem, this thesis proposes a Person-Centric Context Aware System architecture, helping to preserve an independent representation for each individual user to different computer systems. The main idea embraced in this system architecture is that the users are the owners of their personal information, thus they should have the control of how their information will be used by others. In the design of this system architecture, a number of important issues have been addressed with their corresponding solutions in terms of different system components. Among these issues, three are identified as the most crucial ones, and hence these issues have received most of our efforts to provide better solutions: Context Data Communication, Location Detection, and Communication Anonymity support. A prototype system constructed during the process of developing each specific solution is also presented. Together these comprise the main contributions of this thesis work. Finally, our concluding remarks are presented together with our planned future work, based on the current implementation of a Person-Centric Context Aware System.
  •  
25.
  • Mattsson, Johan, 1971- (author)
  • Interaction through spells : establishing traces of nvisible onnections
  • 2005
  • Licentiate thesis (other academic/artistic)abstract
    • In post desktop and co-located collaborative computer interaction as well as in real world settings, there are usually both private and shared work threads going on. For example: private, individual activities such thinking, taking notes, (dreaming…) and the shared collaborative work tasks such discussing, presenting or producing sketches or document drafts etc. A central issue in collaborative activities is to share awareness of the ongoing activity as an option for the co-workers to influence the shared work process. Significant passages in cooperative activities are the configurations of common tasks, such as entering, leaving or changing the users acting and participation in shared activities. Spells introduce real-world user interfaces that provide tools to allow the users to easily and intuitively express how and when they intend to contribute to interactive activities. This expression both makes the user and the co-workers able to reveal and interpret the interactive environment and signaling meaning for all participants. The Spells is a metaphor system for interaction within co-located collaborative work settings. The Spells are supported by a platform for implementing artifacts that supports the Spells based on that platform two prototype systems have been implemented cases of the Spells, Magic Bowl and iwand. The Spells provide a user interaction form that bridges gaps between co-located entities, addressing both people and devices in a world of ubiquitous computing.
  •  
26.
  • Mattsson, Johan, 1971- (author)
  • Pointing, Placing, Touching : Physical Manipulation and Coordination Techniques for Interactive Meeting Spaces
  • 2007
  • Doctoral thesis (other academic/artistic)abstract
    • In the design and study of dedicated ubiquitous computing environments, efforts to enhance and support co-located collaborative activities and work have been a particular focus. In his vision of ubiquitous computing, Mark Weiser foresees a new era of computing, one that closes and follows on from the era of Personal Computing (Post Desktop). The vision involves simultaneous computations facilitated by a number of technical resources (services and artifacts) available in the environment. Ubiquitous Computing also draws on the perspective of embodied interaction: that our overall physical and social interaction, and the design of artifacts supporting interaction with people, places, and the environment, are two different perspectives sharing a common goal. This thesis addresses three critical aspects of interactive meeting spaces: Multi-device selection, Multi-device setup, and Multi-device direct manipulation. To do so, physical interaction techniques have been designed that make more visible the critical and central co-located manipulation and coordination actions in interactive meeting spaces. The tree designed physical interaction techniques, that have been developed and investigated are: the iwand, a pointing technique; the Magic Bowl, a placing technique; and Physical Cursors, a touching technique. In evaluation of the interaction techniques, addressed five problems that originated in observations during the development of interactive meeting spaces. How to: 1) identify and manipulate a physical object in order to select and control a particular service; 2) support the control of complementary combinations of services through physical manipulation; 3) capture, store and recall a preset group of services; 4) maintain and reuse presets, to preserve the prerequisite for a scene, under continually changing circumstances; and 5) design ways to manipulate physical widgets to enable a social protocol for coordination as an alternative to individual (invisible) manipulation? A tentative design pattern language developed, along with “sharing control”, a further developed sample of a design pattern, which applies to physical manipulations in interactive meeting spaces. Additionally, principles are described for conducting long-term studies of living-laboratory observations and for revisiting central design decisions. The principles and design patterns are drawn from designed interaction techniques and from the design and deployment of interactive meeting spaces.
  •  
27.
  •  
28.
  • Odelstad, Jan (author)
  • Many-Sorted Implicative Conceptual Systems
  • 2008
  • Doctoral thesis (other academic/artistic)abstract
    • A theory of many-sorted implicative conceptual systems (abbreviated msic-systems) is presented. Examples of msic-systems include legal systems, normative systems, systems of rules and instructions, and systems expressing policies and various kinds of scientific theories. In computer science, msic-systems can be used in, for instance, legal information systems, decision support systems, and multi-agent systems. In the thesis, msic-systems are studied from a logical and algebraic perspective aiming at clarifying their structure and developing effective methods for representing them. Of special interest are the most narrow links or joinings between different strata in a system, that is between subsystems of different sorts of concepts, and the intermediate concepts intervening between such strata. Special emphasis is put on normative systems, and the role that intermediate concepts play in such systems, with an eye on knowledge representation issues. Normative concepts are constructed out of descriptive concepts using operators based on the Kanger-Lindahl theory of normative positions. An abstract architecture for a norm-regulated multi-agent system is suggested, containing a scheme for how normative positions will restrict the set of actions that the agents are permitted to choose from. Technical results inlude a characterization of an msic-system in terms of the most narrow joinings between different strata, characterization of the structure of the most narrow joinings between two strata, conditions for the extendability of intermediate concepts, and finally, a specification of the conditions such that the Boolean operations on intermediate concepts will result in intermediate concepts and characterization of most narrow joinings in terms of weakest grounds and strongest consequences.
  •  
29.
  • Rydberg Fåhraeus, Eva, 1941- (author)
  • A Triple Helix of Learning Processes - How to cultivate learning, communication and collaboration among distance-education learners
  • 2003
  • Doctoral thesis (other academic/artistic)abstract
    • This work focuses on collaborative learning and how it canbe applied and supported in distance education. Previous workindi-cates that distance learners experience more loneliness,technical problems and lack of stimulation than face-to-facelearners do. Collaboration with peers may improve the feelingof connectedness and engagement. However, collaborativelearning is not the answer to all problems in distanceeducation--and it creates new problems. The present workexplores problems, opportunities and processes whencollaborative learning is introduced in distance education--andsuggests solutions.Related research on distance education andcomputer-supported collaborative learning is reviewed andrelated to own research. The different roles of information andcommunication technology in these areas are described.Six own research papers are reviewed and integrated. Threeof them explore university courses on computer use in society.Learners interacted mainly through a forum system, i.e. asystem for text-based, asynchronous electronic conferences anddiscussions. The special character offorum communication hadan impact on communication and collaboration processes. Onepaper summarizes these results and deduces a first list of tipsto teachers and systems designers, aiming to reduce problemsand take advantage of collabo-rative-learningopportunities.One paper, a report to the Swedish School Board, provides anoverview of research on distance education, withrecommendations for use in secondary schools.To get a broader picture of distance-education learners andtheir special situation and interests, a study was conducted inAustralia. Most of the learners were secondary-school students,living far away from towns. Communication was normallyrestricted to mail, radio and telephone. Opportunities forcollaboration between peers were rare, and correspondencetraditions and the lack of technological infrastructure weredelaying changes. However, a development towards morecollaborative learning had started.Empirical data were gathered ethnographically in naturalcourse settings. Results were analysed using 'activity theory'as a framework.The main contribution of this work is a description of howthree groups of learning processes develop and interact: (a) ofcontent, (b) of communication, and (c) of collaboration. Theyform the spiralling model of a"Triple Helix". Finally, detailed advice is given aschecklists to organisations, teachers, learners and systemdesigners.Keywords:Distance education, Collaborative learning,Computer-supported collaborative learning, Information andcommuni-cation technology, ICT, Forum system, Learningprocesses.
  •  
30.
  •  
31.
  • Sandholm, Thomas, 1974- (author)
  • Statistical Methods for Computational Markets : Proportional Share Market Prediction and Admission Control
  • 2008
  • Doctoral thesis (other academic/artistic)abstract
    • We design, implement and evaluate statistical methods for managing uncertainty when consuming and provisioning resources in a federated computational market. To enable efficient allocation of resources in this environment, providers need to know consumers' risk preferences, and the expected future demand. The guarantee levels to offer thus depend on techniques to forecast future usage and to accurately capture and model uncertainties. Our main contribution in this thesis is threefold; first, we evaluate a set of techniques to forecast demand in computational markets; second, we design a scalable method which captures a succinct summary of usage statistics and allows consumers to express risk preferences; and finally we propose a method for providers to set resource prices and determine guarantee levels to offer. The methods employed are based on fundamental concepts in probability theory, and are thus easy to implement, as well as to analyze and evaluate. The key component of our solution is a predictor that dynamically constructs approximations of the price probability density and quantile functions for arbitrary resources in a computational market. Because highly fluctuating and skewed demand is common in these markets, it is difficult to accurately and automatically construct representations of arbitrary demand distributions. We discovered that a technique based on the Chebyshev inequality and empirical prediction bounds, which estimates worst case bounds on deviations from the mean given a variance, provided the most reliable forecasts for a set of representative high performance and shared cluster workload traces. We further show how these forecasts can help the consumers determine how much to spend given a risk preference and how providers can offer admission control services with different guarantee levels given a recent history of resource prices.
  •  
32.
  •  
33.
  • Sneiders, Eriks, 1968- (author)
  • Automated question answering : template-based approach
  • 2002
  • Doctoral thesis (other academic/artistic)abstract
    • The rapid growth in the development of Internet-basedinformation systems increases the demand for natural langu-ageinterfaces that are easy to set up and maintain. Unfortunately,the problem of understanding natural language queries is farfrom being solved. Therefore this research proposes a simplertask of matching a one-sentence-long user question to a numberof question templates, which cover the knowledge domain of theinformation system, without in-depth understanding of the userquestion itself.The research started with development of an FAQ(Frequently Asked Question) answering system that providespre-stored answers to user questions asked in ordinary English.The language processing technique developed for FAQ retrievaldoes not analyze user questions. Instead, analysis is appliedto FAQs in the database long before any user questions aresubmitted. Thus, the work of FAQ retrieval is reduced tokeyword matching without understanding the questions, and thesystem still creates an illusion of intelligence.Further, the research adapted the FAQ answering techniqueto a question-answering interface for a structured database,e.g., relational database. The entity-relationship model of thedatabase is covered with an exhaustive collection of questiontemplates - dynamic, parameterized "frequently asked questions"- that describe the entities, their attributes, and therelationships in form of natural language questions. Unlike astatic FAQ, a question template contains entity slots - freespace for data instances that represent the main concepts inthe question. In order to answer a user question, the systemfinds matching question templates and data instances that fillthe entity slots. The associated answer templates create theanswer.Finally, the thesis introduces a generic model oftemplate-based question answering which is a summary andgene-ralization of the features common for the above systems:they (i) split the application-specific knowledge domain into anumber of question-specific knowledge domains, (ii) attach aquestion template, whose answer is known in advance, to eachknowledge domain, and (iii) match the submitted user questionto each question template within the context of its ownknowledge domain.Keywords:automated question answering, FAQ answering,question-answering system, template-based question answering,question template, natural language based interface
  •  
34.
  • Stirna, Janis, 1969- (author)
  • The Influence of Intentional and Situational factors on Enterprise Modelling Tool Acquisition in Organisations
  • 2001
  • Doctoral thesis (other academic/artistic)abstract
    • Enterprise Modelling (EM) tools are an important part ofevery EM application project. Continuous evolution of modellingmethods therefore requires efficient EM tool support. Extensiveefforts have been devoted to developing new EM tools andmodelling techniques. Considerably less attention has been paidto the aspects of acquiring and introducing EM tools inorganisations. Our grounded theory study shows that thisprocess is far from simple. It is determined by theorganisation's intentions regarding EM and by the situation inthe EM user organisation. As a contribution to this, we presentan EM tool acquisition process, which focuses on selecting anappropriate EM tool acquisition scenario for an organisation.This process has the following stages - assessing theorganisation, choosing an EM tool acquisition strategy, andfollowing the EM tool acquisition strategy. We support theprocess of evaluating the situation at hand by providingguidelines for assessing intentional and situational factorsthat influence the use of EM tools.We also outline EM itself, along with its applicationprocess, and describe possible sources for gathering therequirements for an EM tool-set. Major requirements categoriesare discussed and analysed with respect to the goals andproblems regarding EM tools. Each category of requirements canbe satisfied to a certain degree, depending on theorganisational needs and various situational factors.This grounded theory study provides two main contributions.Firstly, it proposes a systematic approach for EM toolacquisition supported by a set of guidelines.The approachenables an organisation to assess its needs of EM tools and itsown appropriateness for EM tool usage. As a result, an EM userorganisation is able to choose an EM tool acquisition strategythat meets the situation it faces. This is a contribution tothe overall success of practical use of EM methods and tools.Secondly, it provides an important baseline for future researchand theory building within the area of EM tool adoption andapplication. It also gives valuable information andrequirements for development of new EM tools and relatedservices.
  •  
35.
  • Sundgren, David (author)
  • Distribution of expected utility in second-order decision analysis
  • 2007
  • Licentiate thesis (other academic/artistic)abstract
    • In decision analysis maximising the expected utility is an often used approach in choosing the optimal alternative. But when probabilities and utilities are vague or imprecise expected utility is fraught with complications. Studying second-order effects on decision analysis casts light on the importance of the structure of decision problems, pointing out some pitfalls in decision making and suggesting an easy to implement and easy to understand method of comparing decision alternatives. The topic of this thesis is such second-order effects of decision analysis, particularly with regards to expected utility and interval-bound probabilities. Explicit expressions for the second-order distributions inherent in interval-bound probabilities in general and likewise for distributions of expected utility for small decision problems are produced. By investigating these distributions the phenomenon of warping, that is concentration of belief, is studied.
  •  
36.
  • Sundgren, David (author)
  • Distribution of expected utility in second-order decision analysis
  • 2007
  • Licentiate thesis (other academic/artistic)abstract
    • In explicatione consiliorum, maxima facere communis utilitas saepe trita ratio deligendi meliorem optionem est. Verum si probabilitates et utilitates incertae vel dubiae sint, communis utilitas perturbationes affert. Studium secundi ordinis effectuum in explicatione consiliorum explanat momentum structurae quaestionium consilii, insidias aliquas ad consilium capiendum indicat et facilem ad efficiendum et intellegendum rationem comparandi varia consilia suadet. Haec thesis tractat de secundi ordinis effectibus explicationis consilii, praesertim de commune utilitate et de probabilitatibus coniunctis intervallo. Voces apertae distributionum ordinis secundi in probabilitatibus intervallo conjunctis insitarum omnino et item distributionum utilitatis expectatae in parvis quaestionibus consiliorum eduntur. His distributionibus cognitis studetur res inflexionis, aliter dictu intentio fidei.
  •  
37.
  • Svensson, Harald, 1973- (author)
  • Developing support for agile and plan-driven methods
  • 2005
  • Doctoral thesis (other academic/artistic)abstract
    • Software development processes provide means to develop software in a structured and disciplined way. Although these processes provide support for how to develop software, there is still a challenge to successfully apply them in practice. Thus, there is a need to support management of software development processes so that their use generate as good results as possible. The thesis presents support for agile and plan-driven methods, which represent different approaches for developing software. The support for agile methods was developed after performing a case study and a survey, in order to gather empirical data. The support for plan-driven methods was developed after applying a combination of research methods such as a controlled experiment, grounded theory and theoretical analysis. The developed support for managing agile and plan-driven methods is based on the results from an extensive empirical basis consisting of five studies, with both qualitative and quantitative approaches. The developed support for agile methods consists of a set of guidelines for organizations to consider when introducing agile methods. The developed support for plan-driven methods concerns support for the Business Process Analyst role to manage its work in a software development context. Further, the Personal Software Process is allocated to several roles in order to increase its applicability.
  •  
38.
  •  
39.
  • Vanourek, Gregg, 1970- (author)
  • Life Entrepreneurs
  • 2008. - 1
  • Book (pop. science, debate, etc.)
  •  
40.
  •  
41.
  • Wrigstad, Tobias, 1976- (author)
  • Ownership-Based Alias Managemant
  • 2006
  • Doctoral thesis (other academic/artistic)abstract
    • Object-oriented programming relies on sharing and the mutable states of objects for common data structures, patterns and programming idioms. Sharing and mutable state is a powerful but dangerous combination. Uncontrolled aliasing risks causing representation exposure, where an object's state is exposed and modifiable out of the control of its conceptually owning object. This breaks encapsulation, and hence, in extension, abstraction. Contemporary object-oriented programming languages' support for alias encapsulation is mediocre and easily circumvented. To this end, several proposals have been put forward that strengthen encapsulation to enable construction of more reliable systems and formally reasoning about properties of programs. These systems are vastly superior to the constructs found in for example C++, Java or C#, but have yet to gain acceptance outside the research community. In this thesis, we present three constructs for alias management on top of a deep ownership types system in the context of the Joline programming language. Our constructs are fully statically checkable and impose little run-time overhead. We show the formal semantics and soundness proof for our constructs as well as their formal and informal aliasing properties. We show applications and extensions and perform a practical evaluation of our system with our implemented Joline compiler. The evaluation suggests that our constructs are compatible with real-world programming, makes use of some of our own proposed patterns, and encourages further practical studies of programming with ownership-based constructs for alias management.
  •  
42.
  • Zemke, Stefan, 1971- (author)
  • Data mining for prediction - financial series case
  • 2003
  • Doctoral thesis (other academic/artistic)abstract
    • Hard problems force innovative approaches and attention todetail, their exploration often contributing beyond the areainitially attempted. This thesis investigates the data miningprocess resulting in a predictor for numerical series.Theseries experimented with come from financial data - usuallyhard to forecast.One approach to prediction is to spot patterns in the past,when we already know what followed them, and to test on morerecent data. If a pattern is followed by the same outcomefrequently enough, we can gain confidence that it is a genuinerelationship.Because this approach does not assume any special knowledgeor form of the regularities, the method is quite general -applicable to other time series, not just financial. However,the generality puts strong demands on the patterndetection - asto notice regularities in any of the many possible forms.The thesis' quest for an automated pattern-spotting involvesnumerous data mining and optimization techniques: neuralnetworks, decision trees, nearest neighbors, regression,genetic algorithms and other. Comparison of their performanceon a stock exchange index data is one of the contributions.As no single technique performed sufficiently well, a numberof predictors have been put together, forming a votingensemble. The vote is diversified not only by differenttraining data - as usually done - but also by a learning methodand its parameters. An approach is also proposed how tospeed-up a predictor fine-tuning.The algorithm development goes still further: A predictioncan only be as good as the training data, therefore the needfor good data preprocessing. In particular, new multivariatediscretization and attribute selection algorithms arepresented.The thesis also includes overviews of prediction pitfallsand possible solutions, as well as of ensemble-building forseries data with financial characteristics, such as noise andmany attributes.The Ph.D. thesis consists of an extended background onfinancial prediction, 7 papers, and 2 appendices.
  •  
43.
  • Malmberg, Åke (author)
  • Systemic Grammar Network as a knowledge representation language
  • 1993
  • Reports (other academic/artistic)abstract
    • The Systemic Grammar Network notation is a non-formal knowledge representation language. We define a variant of the System Grammar Network notation and use this notation as a draft modelling language in the knowledge acquisition process of the VVEXP project. VVEXP is a prototype of a knowledge based system that predicts slipperiness on the roads. VVEXP has access to a real time database that contains recordings from more than five hundred field stations. One recording typically contains temperatures of air and road surface, wind speed and direction, dew point and precipitation. We use the METAMETH methodology, focus on the knowledge acquisition process and discuss our choice of draft modelling language. Other draft modelling languages that might be used in METAMETH are compared to Systemic Grammar Network. We conclude that Systemic Grammar Network was a good draft modelling language to represent the specific kind of domain knowledge characteristic of the VVEXP project.
  •  
44.
  • Aasi, Parisa, 1986- (author)
  • Information Technology Governance: The Role of Organizational Culture and Structure
  • 2018
  • Doctoral thesis (other academic/artistic)abstract
    • Information Technology Governance (ITG) is among the most important challenges for the managers today. IT is not anymore just a supportive tool but also a strategic driver for the businesses. In the dynamic and competitive world of today, it is crucial for organizations to know how to govern IT rather than just to use it. IT governance deals with specifying responsibilities and decision rights to encourage the desirable behaviour from IT and generate value from IT investments. IT governance can impact the overall performance of organizations, however there are still difficulties in understanding IT governance and the factors that may influence it.Organizational culture and structure are among the factors that have significant influence on many issues in an organization. According to previous research, organizational culture and structure need to be considered when implementing IT governance. However, there is a lack of research focusing on how organizational culture and structure can influence IT governance performance and implementation. Thus, the main research question addressed in this thesis is: How are organizational culture and structure related to IT governance? To address this question, this research has performed literature reviews and conducted case studies to investigate the role of organizational culture and structure on IT governance. As the first step, the previous literature was reviewed to find the gaps in the research on culture and IT governance. As the next step, four case studies were conducted to explore the influence of organizational culture and structure on IT governance. Two case studies have investigated the relation between organizational structure and IT governance implementation and performance in large organizations; and two other case studies investigated on how different types of organizational culture influence IT governance performance outcomes.The results of this research respond to the research question by specifying the role of culture in IT governance through a categorization of prior research both from research and practice perspectives; specifying the influence of different organizational culture types on IT governance performance outcomes in different organizations; and by specifying IT organizational structure relationship with IT governance performance outcomes and IT governance implementation.The research presented in this thesis provides both theoretical and empirical contributions to the IT governance research and practice.
  •  
45.
  •  
46.
  • Aggestam, Lena (author)
  • IT-supported Knowledge Repositories : Increasing their Usefulness by Supporting Knowledge Capture
  • 2008
  • Doctoral thesis (other academic/artistic)abstract
    • Organizations use various resources to achieve business objectives, and for financial gain. In modern business, knowledge is a critical resource, and organizations cannot afford not to manage it. Knowledge Management (KM) aims to support learning and to create value for the organization. Based on three levels of inquiry (why, what, how), work presented in this thesis includes a synthesized view of the existing body of knowledge concerning KM and hence a holistic characterization of KM. This characterization reveals a strong dependency between KM and Learning Organization (LO). Neither of them can be successful without the other. We show that a KM project resulting in an IT-supported knowledge repository is a suitable way to start when the intention is to initiate KM work. Thus, our research focuses on ITsupported knowledge repositories.Large numbers of KM projects fail, and organizations lack support for their KM undertakings. These are the main problems that our research addresses. In order for an IT-supported knowledge repository to be successful, it must be used. Thus, the content of the repository is critical for success. Our work reveals that the process of capturing new knowledge is critical if the knowledge repository is to include relevant and updated knowledge. With the purpose of supporting the capture process, this thesis provides a detailed characterization of the capture process as well as guidance aiming to facilitate the implementation of the capture process in such a way that knowledge is continuously captured, also after the KM implementation project is completed. We argue that the continuous capture of new knowledge which can potentially be stored in the knowledge repository will, in the long term perspective, have a positive influence on the usefulness of the repository. This will most likely increase the number of users of the repository and accordingly increase the number of successful KM projects.All the work presented in this thesis is the result of a qualitative research process comprising a literature review and an empirical study that were carried out in parallel. The empirical study is a case study inspired by action research, which involved participation in the project Efficient Knowledge Management and Learning in Knowledge Intensive Organizations (EKLär).
  •  
47.
  • Aghaee, Naghmeh, 1986- (author)
  • The Usefulness of ICT Support Systems for Thesis Courses : Learners' Perspectives at Bachelor and Master Level
  • 2015
  • Doctoral thesis (other academic/artistic)abstract
    • Doing a bachelor’s or master’s degree is a journey that leads to success or attrition (dropout). Previous research show to the significance of considering learners’ perspectives and their need for information and different types of interaction. This can be done through online ICTSS (information and communication technology support systems). The overall aim of this dissertation was to create knowledge about how the use of ICTSS can facilitate different types of interaction and support learners in order to reduce thesis problems and attrition and to enhance the quality of the thesis outcomes. The aim was operationalized by two research questions scrutinizing the interaction problems in the thesis process and investigating how the use of ICTSS can facilitate different types of interaction to reduce such problems and attrition, and to enhance the learning opportunities and quality of the thesis outcomes. To answer the research questions, five main studies were performed by applying different research methods on a case study. The empirical studies were performed at the Department of Computer and Systems Sciences (DSV) at Stockholm University, Sweden. The respondents were different learners (students) with active thesis projects at the bachelor or master level in different programs at DSV between 2012 and 2015. For the first two studies, conceptual and content analysis of the data collected from the case study was performed. For the three other studies, open-ended online questionnaires (survey) and interviews were conducted. On the basis of the findings, three main types of interaction issues were developed which related to the need for more learner-content, peer-to-peer, and learner-supervisor interaction in the thesis process. The hypothesis was that the interaction issues could be reduced by implementing a set of strategic suggestions through the use of an ICTSS including a set of functionalities and resources. The usefulness of these functionalities and resources was evaluated with regard to the learners’ perception and experiences. The findings were categorized to facilitate learner-content, peer-to-peer, and learner-supervisor interaction, as well as management of the contents, supervision, and communication of the supervisory team. From these categories, a conceptual framework was developed in this dissertation to illustrate how the use of the ICTSS supports the thesis process. In conclusion, providing access to a set of structured e-resources and supporting educational communication through different types of interaction with peers and the supervisory team, enables learners’ self-managed learning and facilitates similar learning opportunities for learners in thesis courses.
  •  
48.
  • Aidemark, Jan (author)
  • Strategic Planning of Knowledge Management Systems : A Problem Exploration Approach
  • 2007
  • Doctoral thesis (other academic/artistic)abstract
    • Knowledge management (KM) is focused on the problems and opportunities of using organizational knowledge as a resource. Information systems that are used to support KM processes are called knowledge management systems (KMS). A KMS is distinguished from any information system by the organizational processes that it supports, that is, creation, capture, storage and dissemination of competences and knowledge. The research area can be summarized as: “Perspectives and frameworks for the strategic planning of knowledge management systems, i.e. information systems for the support of organizational knowledge processes”. We approach the problem area from a strategic point of view, assuming that the problems of the area are based on a socio-technical dimension and that a multiple-paradigm approach is necessary for dealing with the problems of the various KM areas. The research strategy applied to achieve this is interpretative case studies. A number of case studies are used for exploring KM planning areas, developing frameworks for planning and testing the resulting approach. The empirical material consists of three main case studies, together with a number of secondary cases by other writers in the KM field. The outcome of the research is a planning approach, which is given the name: “The problem exploration approach”. The approach is intended for the generation of ideas of possible systems, as a strategic part of knowledge management systems planning. The purpose of the planning approach is to support the creation of a portfolio of KMS. A KMS portfolio is a structured set of information systems that could be developed for an organizational unit. The approach consists of five planning frameworks, all targeting different aspects of an organization. “The problem exploration approach” and its development process are then examined for more general insights into the subject of strategic KM planning. As an outcome of this examination a 12-point program for balancing a planning approach is presented.
  •  
49.
  • Al Sabbagh, Bilal, 1978- (author)
  • Cybersecurity Incident Response : A Socio-Technical Approach
  • 2019
  • Doctoral thesis (other academic/artistic)abstract
    • This thesis examines the cybersecurity incident response problem using a socio-technical approach. The motivation of this work is the need to bridge the knowledge and practise gap that exists because of the increasing complexity of cybersecurity threats and our limited capability of applying cybersecurity controls necessary to adequately respond to these threats. Throughout this thesis, knowledge from Systems Theory, Soft Systems Methodology and Socio-Technical Systems is applied to examine and document the socio-technical properties of cybersecurity incident response process. The holistic modelling of cybersecurity incident response process developed concepts and methods tested to improve the socio-technical security controls and minimise the existing gap in security controls.The scientific enquiry of this thesis is based on pragmatism as the underpinning research philosophy.  The thesis uses a design science research approach and embeds multiple research methods to develop five artefacts (concept, model, method, framework and instantiation) outlined in nine peer-reviewed publications. The instantiated artefact embraces the knowledge developed during this research to provide a prototype for a socio-technical security information and event management system (ST-SIEM) integrated with an open source SIEM tool. The artefact relevance was validated through a panel of cybersecurity experts using a Delphi method. The Delphi method indicated the artefact can improve the efficacy of handling cybersecurity incidents.
  •  
50.
  • Alam, Mahbub Ul, 1988- (author)
  • Advancing Clinical Decision Support Using Machine Learning & the Internet of Medical Things : Enhancing COVID-19 & Early Sepsis Detection
  • 2024
  • Doctoral thesis (other academic/artistic)abstract
    • This thesis presents a critical examination of the positive impact of Machine Learning (ML) and the Internet of Medical Things (IoMT) for advancing the Clinical Decision Support System (CDSS) in the context of COVID-19 and early sepsis detection.It emphasizes the transition towards patient-centric healthcare systems, which necessitate personalized and participatory care—a transition that could be facilitated by these emerging fields. The thesis accentuates how IoMT could serve as a robust platform for data aggregation, analysis, and transmission, which could empower healthcare providers to deliver more effective care. The COVID-19 pandemic has particularly stressed the importance of such patient-centric systems for remote patient monitoring and disease management.The integration of ML-driven CDSSs with IoMT is viewed as an extremely important step in healthcare systems that could offer real-time decision-making support and enhance patient health outcomes. The thesis investigates ML's capability to analyze complex medical datasets, identify patterns and correlations, and adapt to changing conditions, thereby enhancing its predictive capabilities. It specifically focuses on the development of IoMT-based CDSSs for COVID-19 and early sepsis detection, using advanced ML methods and medical data.Key issues addressed cover data annotation scarcity, data sparsity, and data heterogeneity, along with the aspects of security, privacy, and accessibility. The thesis also intends to enhance the interpretability of ML prediction model-based CDSSs. Ethical considerations are prioritized to ensure adherence to the highest standards.The thesis demonstrates the potential and efficacy of combining ML with IoMT to enhance CDSSs by emphasizing the importance of model interpretability, system compatibility, and the integration of multimodal medical data for an effective CDSS.Overall, this thesis makes a significant contribution to the fields of ML and IoMT in healthcare, featuring their combined potential to enhance CDSSs, particularly in the areas of COVID-19 and early sepsis detection.The thesis hopes to enhance understanding among medical stakeholders and acknowledges the need for continuous development in this sector.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-50 of 228
Type of publication
doctoral thesis (180)
licentiate thesis (42)
reports (4)
book (1)
editorial proceedings (1)
Type of content
other academic/artistic (226)
pop. science, debate, etc. (1)
peer-reviewed (1)
Author/Editor
Johannesson, Paul, P ... (17)
Ekenberg, Love, Prof ... (9)
Danielson, Mats, Pro ... (9)
Boström, Henrik, Pro ... (8)
Fors, Uno, Professor (7)
Yngström, Louise, Pr ... (6)
show more...
Ramberg, Robert, Pro ... (6)
Yngström, Louise (5)
Wangler, Benkt, Prof ... (5)
Ekenberg, Love (4)
Persson, Anne (4)
Jansson, Carl Gustaf (4)
Johansson, Björn, As ... (3)
Johannesson, Paul (3)
Hansson, Henrik, Ass ... (3)
Boman, Magnus, Profe ... (3)
Wangler, Benkt (3)
Dalianis, Hercules, ... (3)
Juhlin, Oskar, Profe ... (3)
Nilsson, Anders G., ... (3)
Popov, Oliver, Profe ... (3)
Brown, Barry, Profes ... (3)
Larsson, Aron, Docen ... (3)
Rusu, Lazar, Profess ... (2)
Révay, Péter, Profes ... (2)
Lavesson, Niklas, Pr ... (2)
Jonathan, Gideon Mek ... (2)
Söderström, Eva (2)
Keller, Christina, A ... (2)
Lindberg, Ola, Profe ... (2)
Skeppstedt, Maria, 1 ... (2)
Dalianis, Hercules (2)
Kjellin, Harald, Pro ... (2)
Kowalski, Stewart, P ... (2)
Yngström, Louise, Pr ... (2)
Ben Yahia, Sadok, Pr ... (2)
Asker, Lars (2)
Nilsson, Gunnar, Pro ... (2)
Boman, Magnus (2)
Åhlfeldt, Rose-Mhari ... (2)
Runeson, Per (2)
Sundgren, David (2)
Asker, Lars, Docent (2)
Tholander, Jakob (2)
Malmberg, Åke (2)
Tholander, Jakob, As ... (2)
Larsson, Aron, Assoc ... (2)
Eloff, Mariki, Profe ... (2)
Knutsson, Ola, PhD (2)
Juell-Skielse, Gusta ... (2)
show less...
University
Stockholm University (189)
Royal Institute of Technology (32)
University of Skövde (7)
RISE (7)
University of Gävle (6)
Uppsala University (3)
show more...
Södertörn University (3)
Linnaeus University (3)
Mid Sweden University (2)
Halmstad University (1)
University West (1)
Jönköping University (1)
Swedish National Defence College (1)
Red Cross University College (1)
show less...
Language
English (223)
Swedish (5)
Research subject (UKÄ/SCB)
Natural sciences (161)
Social Sciences (42)
Engineering and Technology (22)
Medical and Health Sciences (2)
Humanities (1)

Year

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view