Search results for "Computer network"

showing 10 items of 1634 documents

Online Academic Networks as Knowledge Brokers: The Mediating Role of Organizational Support

2018

Placing online academic networks in the framework of social, cultural and institutional “deterritorialization,” the current paper aims at investigating the functionality of these new forms of transnational and trans-organizational aggregations as knowledge brokers. The emphasis is laid on the influence of human collective intelligence and consistent knowledge flows on research innovation, considering the role of organizational support within higher education systems. In this respect, the research relied on a questionnaire-based survey with 140 academics from European emerging countries, the data collected being processed via a partial least squares structural equation modelling technique. E…

Information Systems and ManagementKnowledge managementHigher educationComputer Networks and Communicationsmedia_common.quotation_subjectbrokerageStructural equation modelingLiteracylcsh:TA168Deterritorializationlcsh:Technology (General)0502 economics and businessdeterritorializationAgoraknowledge brokersSociologyEmerging marketsknowledge brokers; brokerage; online academic networks; organizational support; deterritorializationCompetence (human resources)media_commoncomputer.programming_languageknowledge brokerbusiness.industry05 social sciencesorganizational supportCollective intelligenceonline academic networkonline academic networkslcsh:Systems engineeringControl and Systems EngineeringModeling and Simulationlcsh:T1-995050211 marketingbusinessSettore SECS-P/08 - Economia E Gestione Delle Impresecomputer050203 business & managementSoftware
researchProduct

Dealing with Multi-Level Governance and Wicked Problems in Urban Transportation Systems: The Case of Palermo Municipality

2015

Italian New Public Management (NPM) has been mainly characterized by a political orientation toward power decentralization to local governments and privatization of public companies. Nowadays, local utilities in Italy are often run by joint stock companies controlled by public agencies such as Regional and Municipal Administrations. Due to this transformation, these companies must comply with a set of diverse expectations coming from a wide range of stakeholders, related to their financial, competitive and social performance. Such fragmented governance increases the presence of “wicked” problems in the decision-making sphere of these entities. Given this multi-level governance structure, ho…

Information Systems and ManagementMulti-level governancemulti-level governance; performance management; wicked problems; system dynamicsPerformance managementComputer Networks and CommunicationsPublic administrationDecentralizationlcsh:TA168Settore SECS-P/07 - Economia Aziendalelcsh:Technology (General)performance managementwicked problemsCorporate governanceMulti-level governance performance management wicked problems system dynamicslcsh:Systems engineeringMulti-level governanceControl and Systems EngineeringNew public managementModeling and Simulationlcsh:T1-995wicked problemsystem dynamicsCorporate social responsibilityPerformance indicatorBusinessJoint-stock companySoftwareSystems
researchProduct

A framework for a network-level performance measurement system in SME networks

2008

The present study aims to present a theoretical framework for a network-level performance measurement system. The suggested framework for the performance measurement system is composed of the factors that enable and cause the productivity and profitability of the network form of organisation. The framework developed in this study can be divided into six subdimensions: (1) network culture, (2) resources and competences, (3) models of action, (4) internal processes, (5) customer perspective and (6) financial indicators of the network. We argue that this framework provides research opportunities to study the performance of the network form of organisation; but even more importantly, it provide…

Information Systems and ManagementProcess managementComputer Networks and CommunicationsComputer scienceStrategy and ManagementCustomer perspectiveResearch opportunitiesComputer Science ApplicationsAction (philosophy)Network levelProfitability indexOperations managementPerformance measurementProductivityLevel measurementInternational Journal of Networking and Virtual Organisations
researchProduct

Diffusion of theories and theoretical models in the Ibero‐American research on information behavior

2021

Ibero-American research on information behavior (IB) lacks the visibility typical of other parts of the world, and little is known about it in countries outside the area. The objective of this paper has therefore been to analyze the way in which Ibero-American research incorporates various theoretical references to empirical research on IB. The results point to the existence of different focuses of research in the past 10 years, in the sense of a reduced empirical approach and a moderate to minimal use of theories in the design of such research. Furthermore, the most cited theories and models of IB at an international level are those most widely applied in this geographical area, and the us…

Information behaviorInvestigacióInformation Systems and ManagementComputer Networks and CommunicationsTheoretical modelsInformacióSociologyStatistical physicsLibrary and Information SciencesDiffusion (business)Information SystemsJournal of the Association for Information Science and Technology
researchProduct

The serendipitous impact of COVID-19 pandemic: A rare opportunity for research and practice

2020

Highlights • The Covid-19 pandemic is a rare opportunity to examine some fundamental aspects of IM and IS research and practice. • There are at least three areas where the pandemic has impacted practice: information management, work practices and design of technologies. • The IS discipline has appropriate methods and theories to study the design of technologies and social interactions. • Concepts such as “social distancing” that has emerged in the pandemic need to be studied through philosophical premises. • The IM practices that emerge after the pandemic is over, will be shaped by how well we seize the opportunity to learn from the pandemic.

Information managementCoronavirus disease 2019 (COVID-19)Computer Networks and Communications02 engineering and technologyLibrary and Information SciencesArticleDesign research020204 information systemsPolitical scienceResearch community0502 economics and businessPandemic0202 electrical engineering electronic engineering information engineeringInformation systemDialecticsAffordanceCorporeityDialecticbusiness.industry05 social sciencesSocial interaction practicesPublic relationsWork (electrical)050211 marketingbusinessAffordancesInformation SystemsInternational Journal of Information Management
researchProduct

Implementing IT Service Management: A systematic literature review

2013

Author's version of an article in the journal: International Journal of Information Management. Also available from the publisher at: http://dx.doi.org/10.1016/j.ijinfomgt.2013.01.004 This article provides a systematic review of existing research related to the implementation of IT Service Management (ITSM) and the Information Technology Infrastructure Library (ITIL). The review's main goals are to support research; to facilitate other researchers' search for relevant studies; and to propose areas for future studies within this area. In addition, we provide IT managers with useful information on ITSM and ITIL, based on research-based knowledge of their implementation. The review results sug…

Information managementKnowledge managementITILliterature reviewComputer Networks and Communicationsbusiness.industryComputer scienceIT service managementLibrary and Information SciencesPeer reviewInformation Technology Infrastructure LibraryIT Service ManagementSystematic reviewInformation Technology Infrastructure LibraryITSMVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessInformation SystemsInternational Journal of Information Management
researchProduct

Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions

2016

In the last few decades, there have been significant efforts in integrating information and communication technologies (ICT) into healthcare practices. This new paradigm commonly identified as electronic healthcare (e-health) allows provisioning of healthcare services at an affordable price to its consumers. However, there have been questions raised about the security of the sensitive information such as health records as well as the privacy of involving parties raising doubts on the minds of the general public. Thus, it is important to understand the potential security challenges in e-health systems and successfully resolve them by taking adequate measures to ensure fair utilization of suc…

Information privacy020205 medical informaticsPrivacy by DesignComputer Networks and Communicationsbusiness.industryPrivacy softwareComputer scienceInternet privacyAccess controlProvisioning02 engineering and technologyLibrary and Information SciencesComputer securitycomputer.software_genreInformation sensitivityInformation and Communications Technology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerPersonally identifiable informationInformation SystemsInternational Journal of Information Management
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Privacy and temporal aware allocation of data in decentralized online social networks

2017

Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…

Information privacyComputer sciencePrivacy policyControl (management)02 engineering and technologyInterval (mathematics)Computer securitycomputer.software_genreAvailability predictionTheoretical Computer ScienceSet (abstract data type)0202 electrical engineering electronic engineering information engineeringFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData availabilityOrder (business)Computer ScienceDecentralized online social networkDecentralized online social networks020201 artificial intelligence & image processingbusinesscomputerData privacyComputer network
researchProduct

Discovery privacy threats via device de-anonymization in LoRaWAN

2021

LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their data toward network gateways or access points that, in their turn, redirect data to application servers. While several security issues have been addressed in the LoRaWAN specification v1.1, there are still some aspects that may undermine privacy and security of the interconnected IoT devices. In this paper, we tackle a privacy aspect related to LoRaWAN device identity. The proposed approach, by monitoring the network traffic in LoRaWAN, is able to derive, in a probabilistic way, the unique identifier of the IoT device from…

Information privacyIoTDe-anonymizationde-anonymizationsComputer scienceEmerging technologiesComputer Networks and CommunicationsInternet of ThingsDevice identificationcomputer.software_genreComputer securityprivacyLoRaSecurity and privacyUnique identifierDe-anonymizationLoRaWAN; Security; privacy; de-anonymizationsLorawanApplication serverNetwork packetProbabilistic logicIdentification (information)internet of things; lora; lorawan; security; privacy; network optimizationSecuritycomputerNetwork optimizationComputer Communications
researchProduct