Search results for "Bile"
showing 10 items of 2148 documents
La sostenibilità dei rimedi consumeristici nella Direttiva 771/2019/UE e oltre
2022
Lo sviluppo sostenibile è al centro dell’agenda. Stati, istituzioni internazionali e attori privati sono impegnati nell’Agenda 2030 e nei suoi obiettivi. Uno dei compiti più importanti è l’implementazione di un consumo sostenibile. In questo contributo, si tratterà di verificare come il diritto dei consumatori possa aiutare a raggiungere questo obiettivo.
Il principio di precauzione come strumento di attuazione degli Obiettivi di Sviluppo Sostenibile dell'Agenda ONU 2030
2022
Muovendo dall’analisi degli Obiettivi di Sviluppo Sostenibile dell’Agenda ONU 2030, l’A. analizza il ruolo che il principio di precauzione svolge quale elemento capace di implementare la sinergia tra strumenti di public enforcement e di private enforcement funzionali ad attuare un modello di sviluppo improntato al canone della sostenibilità. In questa prospettiva l’attenzione si concentra sulla lettura delle tradizionali norme in materia di responsabilità civile alla luce delle discipline pubblicistiche attuative del principio di precauzione e delle finalità espresse negli obiettivi dell’Agenda ONU 2030. Muovendo dall’analisi degli Obiettivi di Sviluppo Sostenibile dell’Agenda ONU 2030, l’A…
Positive Computing as Paradigm to Overcome Barriers to Global Co-authoring of Open Educational Resources
2018
The adoption of Open Educational Resources (OER) can support collaboration and knowledge sharing. One of the main areas of the usage OER is the internationalization, i.e., the use in a global context. However, the globally distributed co-creation of digital materials is still low. Therefore, we identify essential barriers, in particular for co-authoring of OER in global environments. We use a design science research method to introduce a barrier framework for co-authoring OER in global settings and propose a wellbeing-based system design constructed from the barrier framework for OER co-authoring tool. We describe how positive computing concepts can be used to overcome barriers, emphasizing…
Using a mobile application to support children's writing motivation
2013
PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…
Why Do Users Switch Mobile Applications? : Trialing Behavior as a Predecessor of Switching Behavior
2018
Mobile application providers face high user losses because users can easily and often switch to an alternative application. Researchers have recently started to study information technology (IT) switching. However, no studies have concentrated on the unique context of mobile applications. Mobile application switching differs from the switching behavior related to many other IT products and services because of the highlighted role of alternatives, beta versions, updates, reviews, and users’ spontaneous behavior. To address this gap, we develop a mobile-specific model by using a qualitative research approach. As a theoretical contribution, we introduce trialing behavior as a predecessor of sw…
A Network-Based Framework for Mobile Threat Detection
2018
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase the diversity of malicious applications. Thus, there is a need for an intelligent system that copes with this issue. This paper proposes a machine learning (ML) based framework to counter rapid evolution of mobile threats. This model is based on flow-based features, that will work on the network side. This model is designed with adversarial input in mind. The model uses 40 timebased network flow features, extracted from the real-time traffic of malicious and…
Interactive map interface for controlling bridge crane automation A cognitive-affective approach
2016
This study outlines the development process of a new touch screen based user interface for controlling bridge crane automation in industrial environments. A user study of existing situation (n1 = 11) was used to develop an understanding of the cognitive and emotional design goals for crane operation. Conceptualization of these goals in the context of automation produced a set of requirements, which were used to develop a map-based touch screen user interface. Two field tests (n2 = 5, n3 = 5) revealed how bridge crane operators cognise and emotionally experience the increasing automation and how the user interface should be designed to support the operator’s spatial mental representation as …
How Do Mobile ICTs Enable Organizational Fluidity: Toward a Theoretical Framework
2017
Abstract The focus of this theoretical paper is to investigate how mobile information and communication technologies (ICTs) give rise to the notion of organizational fluidity. Drawing upon previous literature, five affordances of mobile ICTs − mobility, connectedness, interoperability, identifiability, and personalization − are discussed. Delving into the concept of organizational fluidity, the paper captures three dimensions of organizational fluidity, namely, team fluidity, task fluidity, and control fluidity. The paper then develops propositions on how different combinations of the mobile ICT affordances influence each of the dimensions of organizational fluidity. The contributions and i…
Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks
2015
The Sleeping Cell problem is a particular type of cell degradation in Long-Term Evolution (LTE) networks. In practice such cell outage leads to the lack of network service and sometimes it can be revealed only after multiple user complains by an operator. In this study a cell becomes sleeping because of a Random Access Channel (RACH) failure, which may happen due to software or hardware problems. For the detection of malfunctioning cells, we introduce a data mining based framework. In its core is the analysis of event sequences reported by a User Equipment (UE) to a serving Base Station (BS). The crucial element of the developed framework is an anomaly detection algorithm. We compare perfor…
Introduction to Innovation, Design, and Analytics Supported Development of ICT Enabled Services Minitrack
2013
Introduction to Innovation, Design, a Analytics Supported Development of ICT Enabled Services Minitrack.