Search results for "Computer network"
showing 10 items of 1634 documents
Online Academic Networks as Knowledge Brokers: The Mediating Role of Organizational Support
2018
Placing online academic networks in the framework of social, cultural and institutional “deterritorialization,” the current paper aims at investigating the functionality of these new forms of transnational and trans-organizational aggregations as knowledge brokers. The emphasis is laid on the influence of human collective intelligence and consistent knowledge flows on research innovation, considering the role of organizational support within higher education systems. In this respect, the research relied on a questionnaire-based survey with 140 academics from European emerging countries, the data collected being processed via a partial least squares structural equation modelling technique. E…
Dealing with Multi-Level Governance and Wicked Problems in Urban Transportation Systems: The Case of Palermo Municipality
2015
Italian New Public Management (NPM) has been mainly characterized by a political orientation toward power decentralization to local governments and privatization of public companies. Nowadays, local utilities in Italy are often run by joint stock companies controlled by public agencies such as Regional and Municipal Administrations. Due to this transformation, these companies must comply with a set of diverse expectations coming from a wide range of stakeholders, related to their financial, competitive and social performance. Such fragmented governance increases the presence of “wicked” problems in the decision-making sphere of these entities. Given this multi-level governance structure, ho…
A framework for a network-level performance measurement system in SME networks
2008
The present study aims to present a theoretical framework for a network-level performance measurement system. The suggested framework for the performance measurement system is composed of the factors that enable and cause the productivity and profitability of the network form of organisation. The framework developed in this study can be divided into six subdimensions: (1) network culture, (2) resources and competences, (3) models of action, (4) internal processes, (5) customer perspective and (6) financial indicators of the network. We argue that this framework provides research opportunities to study the performance of the network form of organisation; but even more importantly, it provide…
Diffusion of theories and theoretical models in the Ibero‐American research on information behavior
2021
Ibero-American research on information behavior (IB) lacks the visibility typical of other parts of the world, and little is known about it in countries outside the area. The objective of this paper has therefore been to analyze the way in which Ibero-American research incorporates various theoretical references to empirical research on IB. The results point to the existence of different focuses of research in the past 10 years, in the sense of a reduced empirical approach and a moderate to minimal use of theories in the design of such research. Furthermore, the most cited theories and models of IB at an international level are those most widely applied in this geographical area, and the us…
The serendipitous impact of COVID-19 pandemic: A rare opportunity for research and practice
2020
Highlights • The Covid-19 pandemic is a rare opportunity to examine some fundamental aspects of IM and IS research and practice. • There are at least three areas where the pandemic has impacted practice: information management, work practices and design of technologies. • The IS discipline has appropriate methods and theories to study the design of technologies and social interactions. • Concepts such as “social distancing” that has emerged in the pandemic need to be studied through philosophical premises. • The IM practices that emerge after the pandemic is over, will be shaped by how well we seize the opportunity to learn from the pandemic.
Implementing IT Service Management: A systematic literature review
2013
Author's version of an article in the journal: International Journal of Information Management. Also available from the publisher at: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.004 This article provides a systematic review of existing research related to the implementation of IT Service Management (ITSM) and the Information Technology Infrastructure Library (ITIL). The review's main goals are to support research; to facilitate other researchers' search for relevant studies; and to propose areas for future studies within this area. In addition, we provide IT managers with useful information on ITSM and ITIL, based on research-based knowledge of their implementation. The review results sug…
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions
2016
In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…
Distributed Coverage of Ego Networks in F2F Online Social Networks
2016
Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …
Privacy and temporal aware allocation of data in decentralized online social networks
2017
Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…
Discovery privacy threats via device de-anonymization in LoRaWAN
2021
LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…