Search results for "Computer Networks"
showing 10 items of 860 documents
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
2022
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…
Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…
2018
This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…
Design and Realization of a Bidirectional Full Bridge Converter with Improved Modulation Strategies
2020
In this paper a Full-Bridge Converter (FBC) for bidirectional power transfer is presented. The proposed FBC is an isolated DC-DC bidirectional converter, connected to a double voltage source&mdash
Consumer adoption of mobile technologies: a literature review
2015
Although the total number of mobile subscriptions reached 6.8 billion worldwide (ITU, 2013) confirming in the process that mobile technology is widespread, academic literature has so far focused only on explaining adoption of mobile technology and services. This literature review analyses 67 studies from the period 2005-2013 and finds the following: a) most studies are quantitative in nature and come from Asia; b) the Technology Acceptance Model is the most used theory; c) future research should also utilise qualitative methods and examine the behavioural outcomes of mobile adoption instead of simply adoption in consumer markets. peerReviewed
Invited Article: Ultra-broadband terahertz coherent detection via a silicon nitride-based deep sub-wavelength metallic slit
2018
We present a novel class of CMOS-compatible devices aimed to perform the solid-state-biased coherent detection of ultrashort terahertz pulses, i.e., featuring a gap-free bandwidth at least two decades-wide. Such a structure relies on a 1-µm-wide slit aperture located between two parallel aluminum pads, embedded in a 1-µm-thick layer of silicon nitride, and deposited on a quartz substrate. We show that this device can detect ultra-broadband terahertz pulses by employing unprecedented low optical probe energies of only a few tens of nanojoules. This is due to the more than one order of magnitude higher nonlinear coefficient of silicon nitride with respect to silica, the nonlinear material emp…
Supercontinuum Generation and Intermodal Four-Wave Mixing in a Step-Index Few-Mode Fibre
2019
International audience; The complex spatiotemporal dynamics of nonlinear light propagation in multimode fibers (MMFs) has recently witnessed a renewed interest because of their experimental realization in emerging key areas of laser physics and fiber optics [1]. Specifically, MMFs have a number of linear and nonlinear optical properties that make them very attractive to investigate new spatiotemporal effects fundamentally different from standard single-mode fibers. These include the observation of multimode solitons [2], intermodal four-wave mixing (FWM) [3], geometric parametric instabilities [4], spatial beam self-cleaning [5], and the generation of supercontinuum (SC) light when pumping …
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
2015
International audience; Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose A2Ba, a robust method to support instabilities caused by aerial images fusing different information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient di…
Virtual Reality and Games
2018
The concept of Virtual Reality (VR) dates back to around 1930, where different technologies and concepts arise. For instance, in 1929 Edward Link created the Link Trainer (further patented in 1931), reported to be the first example of a commercial flight simulator, being entirely electromechanical. Also, in the 1930s, the visionary, science fiction writer Stanley G. Weinbaum brings a story (Pygmalion’s Spectacles) that introduces the early idea of a pair of goggles that makes the wearer experience a fictional world through holograms, smell, taste, and touch. Weinbaum describes uncanny experiences for those wearing the goggles, aligned with the modern experiences of VR. It is in the mid 1950…
How perceived value drives the use of mobile financial services apps
2019
Mobile information services have revolutionized business models and service delivery methods by facilitating consumer access to information and order placement via mobile apps. In developed markets, mobile banking (m-banking) and mobile payment (m-payment) applications have replaced text-based mobile services. However, extant research has not addressed these mobile financial services apps (MFSAs) adequately from the perspective of consumer behavior. Thus, the present study developed and tested a series of hypotheses related to the antecedents of perceived value of MFSA use; it also examined how such use affects the development of customers’ overall relationships with banks. Our hypotheses w…
Role of situational context in use continuance after critical exergaming incidents
2019
Use continuance is crucial in terms of information systems (IS) success. Previous research has shown that situational context can be central for IS use continuance but has paid limited attention to its specific characteristics. Furthermore, the link between situational context and use continuance has remained unexplored in the novel area of “exergames,” which are defined as digital games requiring physical effort from the player that determines the outcome of the game. Studying exergames is deemed important due to their potential in providing health benefits for users, revenues for providers, and well‐being for societies. However, their potential remains unreached because users tend to disc…