Search results for "ACC"

showing 10 items of 15276 documents

Introduction to Integrating Knowledge and Learning Processes Minitrack

2013

This minitrack discusses knowledge management (KM) from an integrated perspective, i.e., the integration of KM, learning, and business processes. It mainly focuses on two issues: a) how can knowledge, learning and business processes integrated, and b) how can the related systems be integrated to enable an efficient workflow. Currently, even less learning environments take context and environment into account. Using mobile and ubiquitous technologies can lead to a paradigm shift in the construction of such learning environments: from static to highly contextualized knowledge and learning experiences. Based on the integration of knowledge and learning systems into social networks and social m…

ta113Knowledge managementSocial networkbusiness.industryBusiness processComputer scienceEducational technologyAcculturationBusiness process managementWorkflowRelational capitalKnowledge integrationOrganizational learningPersonal knowledge managementApprenticeshipbusinessCompetence (human resources)2012 45th Hawaii International Conference on System Sciences
researchProduct

Sensory modalities and mental content in product experience

2015

Contemporary research in human-technology interaction emphasises the need to focus on what people experience when they interact with technological artefacts. Understanding how people experience products requires detailed investigation of how physical design properties are mentally represented, and the theorisation of how people represent information obtained through different modalities still needs work. The objective of this study is to investigate how people experience modality-related affective aspects of products, using the psychological concept of mental content. For this purpose, we adopt the framework of user psychology, which is the sub-area of psychology involved with investigating…

ta113Modalitiesmedia_common.quotation_subjectCognitionkäyttäjäpsykologiaVariance (accounting)Industrial and Manufacturing Engineeringproduct experienceuser psychologysensory modalityStimulus modalityFeelingmental contentArtificial IntelligenceContent analysisaffective interactionProduct (category theory)PsychologyThink aloud protocolSocial psychologymedia_commonCognitive psychologyInternational Conference on Applied Human Factors and Ergonomics
researchProduct

An Information Systems Design Product Theory for Integrated Requirements, Test and Defect Management Systems

2012

Software companies need to develop high-quality products fast and with low cost. Development activities are typically distributed in different places and involve multiple stakeholders in different countries. Testing is an important way to ensure product quality but it is costly and takes ample time and resources. Sourcing testing services from specialized service providers is often the most viable option for software businesses. Flexible and effective test process management is especially vital to support the testing life-cycle when external testing service providers are involved. Yet, the extant literature provides little theoretical guidance for managing the testing life-cycle, including …

ta113Requirements managementTest strategyKnowledge managementProcess managementService product managementOffshoringTest managementComputer sciencebusiness.industrySystem testingSoftware performance testingService providerSoftware qualityOutsourcingSoftwareAcceptance testingPerformance engineeringManagement systemInformation systemNon-functional testingOperational acceptance testingbusinessSystem integration testing2012 45th Hawaii International Conference on System Sciences
researchProduct

Consumers’ adoption of information services

2013

This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.

ta113Service (business)Information Systems and ManagementKnowledge managementbusiness.industrymedia_common.quotation_subjectServices computingUnified theory of acceptance and use of technologyAffect (psychology)Management Information SystemsConceptual modelInformation systemDesign science researchBusinessMarketingInformation Systemsmedia_commonInformation & Management
researchProduct

Consumer Acceptance and Use of Instagram

2016

This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…

ta113Service (business)Value (ethics)Context modelHedonic motivationsocial media05 social sciencesSurvey researchContext (language use)AdvertisingUnified theory of acceptance and use of technology0502 economics and businessInstagram050211 marketingConstruct (philosophy)Psychologyta512consumer acceptance050203 business & management2016 49th Hawaii International Conference on System Sciences (HICSS)
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

Fall Detection Using Location Sensors and Accelerometers

2015

The rapid aging of the world's population is driving the development of pervasive solutions for elder care. These solutions, which often involve fall detection with accelerometers, are accurate in laboratory conditions but can fail in some real-life situations. To overcome this, the authors present the Confidence system, which detects falls mainly with location sensors. A user wears one to four tags. By detecting tag locations with sensors, the system can recognize the user's activity, such as falling and then lying down afterward, as well as the context in terms of the location in the home. The authors used a scenario consisting of events difficult to recognize as falls or nonfalls to comp…

ta113education.field_of_studyContext modelUbiquitous computingaccelerometersaccuracyComputer sciencePopulationReal-time computingagingWearable computerContext (language use)ta3141accelerationAccelerometersensorsComputer Science ApplicationscontextComputational Theory and MathematicsFalling (sensation)educationLyingSoftwareSimulationsenior citizensIEEE Pervasive Computing
researchProduct

Critical Analysis on the NHTSA Acceptance Criteria for In-Vehicle Electronic Devices

2014

We tested a commercial in-car navigation system prototype against the NHTSA criteria for acceptance testing of in-vehicle electronic devices, in order to see what types of in-car tasks fail the acceptance test and why. In addition, we studied the visual demands of the driving scenario recommended by NHTSA for task acceptance testing. In the light of the results, NHTSA guidelines and acceptance criteria need to be further developed. In particular visual demands of the driving scenario and for different simulators need to be standardized in order to enable fair testing and comparable test results. We suggest the visual occlusion method for finding a driving scenario that corresponds better wi…

ta113kosketusnäyttödriver distractionComputer scienceNavigation systemvisual demandReliability engineeringTest (assessment)Task (project management)Variety (cybernetics)Acceptance testingnavigation systemElectronicsDuration (project management)test performanceVisual occlusionSimulationacceptance criteriavisual occlusion
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct

Data mining framework for random access failure detection in LTE networks

2014

Sleeping cell problem is a particular type of cell degradation. There are various software and hardware reasons that might cause such kind of cell outage. In this study a cell becomes sleeping because of Random Access Channel (RACH) failure. This kind of network problem can appear due to misconfiguration, excessive load or software/firmware problem at the Base Station (BS). In practice such failure might cause network performance degradation, which is hardly traceable by an operator. In this paper we present a data mining based framework for the detection of problematic cells. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving BS. The choice of N i…

ta113sleeping cell problembusiness.industryComputer scienceFirmwareHeuristic (computer science)Event (computing)Reliability (computer networking)data miningLTE networkscomputer.software_genreBase stationRandom-access channelUser equipmentData miningbusinessrandom access channelcomputerRandom accessComputer network2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)
researchProduct