Search results for "Computer Networks"

showing 10 items of 860 documents

Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

2022

In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…

information security policy complianceComputer Networks and Communicationsohjeidenmukainen käyttäytyminentietoturvapolitiikkatietoturvadeterrent effectpelotteetpeloteteoriadeterrence theoryManagement Information Systemstietojärjestelmät
researchProduct

Information Systems Architecture and Technology: Proceedings of 38th International Conference on Information Systems Architecture and Technology – IS…

2018

This three-volume set of books presents advances in the development of concepts and techniques in the area of new technologies and contemporary information system architectures. It guides readers through solving specific research and analytical problems to obtain useful knowledge and business value from the data. Each chapter provides an analysis of a specific technical problem, followed by the numerical analysis, simulation and implementation of the solution to the problem. The books constitute the refereed proceedings of the 2017 38th International Conference “Information Systems Architecture and Technology,” or ISAT 2017, held on September 17–19, 2017 in Szklarska Poręba, Poland. The con…

information systems architectureCorrectnessbusiness.industryComputer scienceProcess (engineering)Multi-agent systemIntelligent decision support systeminformation systemscomputer.software_genrerisk managementAutomationExpert systemSystems engineeringComputer Aided DesignDesign processcomputer networks ISAT 2017businesscomputer
researchProduct

Design and Realization of a Bidirectional Full Bridge Converter with Improved Modulation Strategies

2020

In this paper a Full-Bridge Converter (FBC) for bidirectional power transfer is presented. The proposed FBC is an isolated DC-DC bidirectional converter, connected to a double voltage source&mdash

isolated DC-DC bidirectional converterComputer Networks and CommunicationsComputer science020209 energylcsh:TK7800-836002 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti Elettrici7. Clean energySettore ING-INF/01 - Elettronicafull-bridge converterlaw.inventionFull bridge converterlaw0202 electrical engineering electronic engineering information engineeringElectronic engineeringMaximum power transfer theoremElectrical and Electronic EngineeringTransformerfull-bridge converter; isolated DC-DC bidirectional converter; phase shift modulation; supercapacitorssupercapacitors020208 electrical & electronic engineeringlcsh:Electronicsphase shift modulationHardware and ArchitectureControl and Systems EngineeringSignal ProcessingVoltageElectronics
researchProduct

Consumer adoption of mobile technologies: a literature review

2015

Although the total number of mobile subscriptions reached 6.8 billion worldwide (ITU, 2013) confirming in the process that mobile technology is widespread, academic literature has so far focused only on explaining adoption of mobile technology and services. This literature review analyses 67 studies from the period 2005-2013 and finds the following: a) most studies are quantitative in nature and come from Asia; b) the Technology Acceptance Model is the most used theory; c) future research should also utilise qualitative methods and examine the behavioural outcomes of mobile adoption instead of simply adoption in consumer markets. peerReviewed

kirjallisuuskatsausliterature reviewComputer Networks and CommunicationsProcess (engineering)business.industrykuluttajan omaksuminenComputer Science Applicationsmobiili adoptiotechnology acceptancemobile adoptionMobile technologyTechnology acceptance modelBusinessMobile telephonyElectrical and Electronic EngineeringMarketingMobile deviceconsumer acceptanceteknologian hyväksyminenQualitative researchInternational Journal of Mobile Communications
researchProduct

Invited Article: Ultra-broadband terahertz coherent detection via a silicon nitride-based deep sub-wavelength metallic slit

2018

We present a novel class of CMOS-compatible devices aimed to perform the solid-state-biased coherent detection of ultrashort terahertz pulses, i.e., featuring a gap-free bandwidth at least two decades-wide. Such a structure relies on a 1-µm-wide slit aperture located between two parallel aluminum pads, embedded in a 1-µm-thick layer of silicon nitride, and deposited on a quartz substrate. We show that this device can detect ultra-broadband terahertz pulses by employing unprecedented low optical probe energies of only a few tens of nanojoules. This is due to the more than one order of magnitude higher nonlinear coefficient of silicon nitride with respect to silica, the nonlinear material emp…

lcsh:Applied optics. PhotonicsMaterials scienceComputer Networks and CommunicationsTerahertz radiationTerahertz radiationPhysics::Optics02 engineering and technology7. Clean energy01 natural scienceslaw.invention010309 opticschemistry.chemical_compoundlawSolid-state devicesElectric field0103 physical sciencesBroadbandDynamic rangebusiness.industrylcsh:TA1501-1820021001 nanoscience & nanotechnologyLaserAtomic and Molecular Physics and OpticsTerahertz detectorSilicon nitridechemistryOptoelectronics0210 nano-technologybusinessOrder of magnitudeVoltageAPL Photonics
researchProduct

Supercontinuum Generation and Intermodal Four-Wave Mixing in a Step-Index Few-Mode Fibre

2019

International audience; The complex spatiotemporal dynamics of nonlinear light propagation in multimode fibers (MMFs) has recently witnessed a renewed interest because of their experimental realization in emerging key areas of laser physics and fiber optics [1]. Specifically, MMFs have a number of linear and nonlinear optical properties that make them very attractive to investigate new spatiotemporal effects fundamentally different from standard single-mode fibers. These include the observation of multimode solitons [2], intermodal four-wave mixing (FWM) [3], geometric parametric instabilities [4], spatial beam self-cleaning [5], and the generation of supercontinuum (SC) light when pumping …

lcsh:Applied optics. Photonics[PHYS.PHYS.PHYS-OPTICS] Physics [physics]/Physics [physics]/Optics [physics.optics]Optical fiberMaterials scienceSilica fiber[SPI.OPTI] Engineering Sciences [physics]/Optics / PhotonicComputer Networks and CommunicationsPhysics::Optics02 engineering and technology01 natural scienceslaw.invention[SPI.MAT]Engineering Sciences [physics]/Materials010309 opticsFour-wave mixingsymbols.namesakelaw0103 physical sciences[PHYS.COND]Physics [physics]/Condensed Matter [cond-mat]010306 general physicsComputingMilieux_MISCELLANEOUS[PHYS.PHYS.PHYS-OPTICS]Physics [physics]/Physics [physics]/Optics [physics.optics]Multi-mode optical fiberSidebandbusiness.industrylcsh:TA1501-1820021001 nanoscience & nanotechnologyQ-switchingAtomic and Molecular Physics and OpticsSupercontinuumWavelengthPicosecondsymbols[SPI.OPTI]Engineering Sciences [physics]/Optics / PhotonicOptoelectronics[ SPI.OPTI ] Engineering Sciences [physics]/Optics / Photonic0210 nano-technologybusinessRaman scattering
researchProduct

A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions

2015

International audience; Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose A2Ba, a robust method to support instabilities caused by aerial images fusing different information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient di…

lcsh:Computer engineering. Computer hardwareComputer Networks and CommunicationsComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONKDElcsh:TK7885-7895lcsh:TA168Computer Science Applicationsbackground modelling[SPI]Engineering Sciences [physics]Image processinglcsh:Systems engineeringControl and Systems Engineeringunmanned aerial vehicleComputer visionArtificial intelligenceGMMmoving objectsbusinessmobile observerSimulationInformation Systemsbackground subtraction
researchProduct

Virtual Reality and Games

2018

The concept of Virtual Reality (VR) dates back to around 1930, where different technologies and concepts arise. For instance, in 1929 Edward Link created the Link Trainer (further patented in 1931), reported to be the first example of a commercial flight simulator, being entirely electromechanical. Also, in the 1930s, the visionary, science fiction writer Stanley G. Weinbaum brings a story (Pygmalion’s Spectacles) that introduces the early idea of a pair of goggles that makes the wearer experience a fictional world through holograms, smell, taste, and touch. Weinbaum describes uncanny experiences for those wearing the goggles, aligned with the modern experiences of VR. It is in the mid 1950…

lcsh:TComputer Networks and CommunicationsComputer science05 social sciencesNeuroscience (miscellaneous)050301 educationUNESCO::CIENCIAS ECONÓMICASVirtual reality:CIENCIAS ECONÓMICAS [UNESCO]lcsh:TechnologyComputer Science ApplicationsHuman-Computer Interactionn/aHuman–computer interactionvirtual realitylcsh:Q0501 psychology and cognitive scienceslcsh:Science0503 education050107 human factorsgamesMultimodal Technologies and Interaction
researchProduct

How perceived value drives the use of mobile financial services apps

2019

Mobile information services have revolutionized business models and service delivery methods by facilitating consumer access to information and order placement via mobile apps. In developed markets, mobile banking (m-banking) and mobile payment (m-payment) applications have replaced text-based mobile services. However, extant research has not addressed these mobile financial services apps (MFSAs) adequately from the perspective of consumer behavior. Thus, the present study developed and tested a series of hypotheses related to the antecedents of perceived value of MFSA use; it also examined how such use affects the development of customers’ overall relationships with banks. Our hypotheses w…

liiketoimintamallitComputer Networks and CommunicationsService delivery framework512 Business and management02 engineering and technologyLibrary and Information SciencesBusiness model020204 information systemsmobiilipalvelut0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systemMobile paymentmobiilisovelluksetMarketingConsumer behaviourMobile bankingbusiness.industry213 Electronic automation and communications engineering electronics05 social sciencesmobile information servicesOrder (business)New product development050211 marketingBusinessInformation Systems
researchProduct

Role of situational context in use continuance after critical exergaming incidents

2019

Use continuance is crucial in terms of information systems (IS) success. Previous research has shown that situational context can be central for IS use continuance but has paid limited attention to its specific characteristics. Furthermore, the link between situational context and use continuance has remained unexplored in the novel area of “exergames,” which are defined as digital games requiring physical effort from the player that determines the outcome of the game. Studying exergames is deemed important due to their potential in providing health benefits for users, revenues for providers, and well‐being for societies. However, their potential remains unreached because users tend to disc…

liikuntateknologiaComputer Networks and Communicationsdigital gamesApplied psychologyexergaminginformation systemsuse continuancecritical incident techniquesituational contextInformation systemContinuancePsychologyCritical Incident Techniquedigitaaliset pelitSoftwaretietojärjestelmätkäyttäjätutkimusInformation SystemsInformation Systems Journal
researchProduct