Search results for "Communications"
showing 10 items of 3827 documents
What Drives Negative Electronic Word-of-Mouth Online?
2018
The online environment has highlighted the role of negative experiences and emotions by enabling fast and widespread publicity. Recent research has introduced both word-of-mouth and engagement as central concepts relating to negative communication online. In the field of public relations, the previous literature has mostly addressed negative engagement through individual topics such as reputation and crisis communication, but there has been little attention to the different forms it takes. By utilizing recent literature on word-of-mouth (WOM), negative word-of-mouth (nWOM), and electronic word-of-mouth (eWOM) communication, we propose negative electronic word-of-mouth (neWOM) as a rising ph…
Crystal structure of
2017
The synthesis and crystal structure of the complex trans-[dichlorido-bis(N-(4,5-dihydro-5,5-dimethyl-3H-pyrrol-2-yl)acetamide)]palladium(II) dihydrate is described.
Problem Talk in Management Group Meetings
2019
This naturalistic study focuses on problem talk (PT) in hospital management group meetings. The study aims to understand how PT constitutes the hospital organization through the different uses of PT within the meetings, and, therefore, to understand the organizing role of these meetings. The communication as constitutive of organization (CCO) perspective forms the theoretical background of the research. The results of the qualitative analysis show that PT comprises many intertwined tasks that aim to perform the meetings, enhance problem solving, and maintain the relational level of group life. Thus, PT is much more than merely solving problems. In PT, problems are discussed from the viewpo…
Deadlock in corporate governance: Finding a common strategy for private telephone companies, 1978–1998
2017
This paper looks at how a group of small, incumbent private telephone companies complied with the international convergence of market structures. The existing research has mainly focused on large national incumbents, assuming a transition to multinational enterprise. This development process is often associated with privatisation policies and various institutional factors. The article tests these assumptions using a case study of the network of Finnish local telephone companies. It looks at the development of an interfirm network, its perspectives on the different phases of the deregulation process, and how the network tried to regenerate itself but failed to form a unified corporate struct…
Academic Journal Publishing and Open Access
2015
Human Technology: An Interdisciplinary Journal on Humans in ICT Environments started in 2005 as an open-access, peer-reviewed academic journal, published only online. At that time, the traditional printed journal model of publishing houses was quite dominant and largely uncontested. Now open-access journal publishing is growing rapidly (Bjork & Solomon, 2014) and providing important alternative routes to researchers’ access to the literature in many disciplines. This editorial only discusses the gold model of open-access publishing, not the green model (traditional journal publishing and a parallel repository). 1
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Estimating Programming Exercise Difficulty using Performance Factors Analysis
2020
This Work in Progress Paper studies student and exercise modelling based on pass/fail log data gathered from an introductory programming course. Contemporary education capitalizes on the communications technology and remote study. This can create distance between the teacher and students and the resulting lack of awareness of the difficulties students encounter can lead to low student satisfaction, dropout and poor grades. In many cases, various technological solutions are used to collect individual exercise submissions, but there are little resources for indexing or modelling the exercises in depth. Exercise specific feedback from students may not be easily obtainable either. In the presen…
Insights into Finnish first-year pre-service teachers’ twenty-first century skills
2016
This study focuses on Finnish pre-service teachers’ perceptions of their twenty-first century skills, especially their learning strategies, collaboration and teamwork, as well as knowledge and attitudes related to ICT in education. The target group consist of 263 first-year pre-service teachers from three universities. The results outline how pre-service teachers perceive their twenty-first century skills, the relationships between different areas of these skills, and the differences among pre-service teachers in terms of perceived skills. The results indicate that the pre-service teachers perceive themselves as skilled learners in terms of learning strategies used as well as collaboration …
Self-Directed Learning as a Practice of Workplace Learning: Interpretative Repertoires of Self-Directed Learning in ICT Work
2019
Changing technologies and competition in the field of information and communication technology (ICT) are challenging the learning of individual workers and teams alongside and through work. Organisations call for employees’ autonomy and self-directedness executed by agile operations and low hierarchies, where learning is also increasingly the responsibility of the individuals and teams themselves and occurs in practice without strong control of the organisation. Therefore, the multidimensional concept of self-directed learning becomes essential in the context of learning at work. In this study, we examine how employees in the ICT sector describe self-directed learning practices in the conte…
Designing and Implementing a CSCL-based Course on the Data Security of a Wireless Learning Environment
2012
This article reports on a design-based research (DBR) process for designing and implementing a computer-supported collaborative learning (CSCL) course on the data security of wireless learning environments. The study focuses on examining how university students practice data security when learning on a wireless campus, how data security aspects appear in this study and how students perceive the role of data security in CSCL. The research subjects included six pilot students and eight students enrolled in the course. To promote the reliability of the findings, various kinds of data were used. The data was analysed following the grounded theory approach. The results suggest that data security…