Search results for "Cryptography"
showing 10 items of 657 documents
"Table 8" of "Freeze-out radii extracted from three-pion cumulants in pp, p-Pb and Pb-Pb collisions at the LHC"
2014
Gaussian radii and intercept parameters in pp collisions versus Nch at low KT3.
Digital Inequalities: A Review of Contributing Factors and Measures for Crossing the Divide
2019
Part 8: Digital Divide and Social Inclusion; International audience; This literature review focuses on the digital divide in contemporary technologically and economically advanced societies. Prior research shows that the digital divide entails more than physical accessibility and points to issues of technology acceptance and actual use. Recurring digital divide factors outside socioeconomic characteristics were identified in the articles reviewed. These factors relate to personality traits, motivation and digital skills. The factors can be used as the basis for a personality model for understanding acceptance and use of technology complementing models related to economic and social resource…
Formal Project Organization and Informal Social Networks: Regional Advantages in the Emergent Animation Industry in Oslo, Norway
2011
This article focuses on the social networks that facilitate projects based activities in one particular part of cultural industries. Cultural industries are dependent on flexible ways of organizing their work because they operate in unpredictable markets. However, the organization of work in temporary projects challenges some key assumptions when it comes to the need for long-term, stable relationships for innovative and effective organizations. A key question is thus how firms that do not have a formal organization that creates stable relationships manage to create continuity in what they do. The study is based on semi-structured interviews with core firms that operate within the animation…
Social support for collaboration and group awareness in life science research teams
2019
Background Next-generation sequencing (NGS) technologies have revolutionarily reshaped the landscape of ’-omics’ research areas. They produce a plethora of information requiring specific knowledge in sample preparation, analysis and characterization. Additionally, expertise and competencies are required when using bioinformatics tools and methods for efficient analysis, interpretation, and visualization of data. These skills are rarely covered in a single laboratory. More often the samples are isolated and purified in a first laboratory, sequencing is performed by a private company or a specialized lab, while the produced data are analyzed by a third group of researchers. In this scenario, …
Risky choices in strategic environments: An experimental investigation of a real options game
2019
Managers frequently make decisions under conditions of fundamental uncertainty due the stochastic nature of the outcomes and competitive rivalry. In this study, we experimentally test a theoretical model under fundamental uncertainty and competitive rivalry by designing a sequential interaction game between two players. The first mover can decide either to choose a sure outcome that assigns a risky outcome to the second mover or to pass the decision to the second mover. If the second player gets the chance to decide, she can choose between a sure outcome, conditioned by the assignment of a risky payoff to the first mover, or the sharing of the risky outcome with the first mover. We then int…
Exploring the relationships between tangible and intangible resources in a learning alliance dynamics: comment on the paper by Kapmeier
2008
Kapmeier (2008) focuses his research on common learning and firms’ opportunistic behaviour in learning alliances. A strategic alliance, as clearly stated by Gulati (1998, p. 293) is a voluntary arrangement between firms to exchange and share knowledge as well as resources with the intent of developing processes, products or services. This is a relevant topic not only for those firms that operate in industries characterized typically by high RD Larsson et al., 1998). Furthermore, this literature essentially takes a static view and it often neglects the postformation dynamics of alliances (Koza and Lewin, 2000; Das and Teng, 2001). Some key questions not yet profoundly investigated are: how c…
Key Information Systems Management Issues in Estonia for the 2000s and A Comparative Analysis
2006
AbstractThis study reports key information system (IS) management issues in Estonia, for a second time since 1993. The study enlists the views of knowledgeable practitioners from both the information technology (IT) and non-IT (business managers) fields. The primary objective was to compare and contrast the findings in the previous study with the present effort. Other secondary objectives included investigating the views across professional classifications and sectors. Further, a comparison between Estonia (an emerging economy) and Norway (a developed country) was made. The findings of the study indicate the following: 1) the past decade has produced salient changes in the ranking of key IS…
Strategic leadership in cyber security, case Finland
2020
Cyber security has become one of the biggest priorities for businesses and governments. Streamlining and strengthening strategic leadership are key aspects in making sure the cyber security vision is achieved. The strategic leadership of cyber security implies identifying and setting goals based on the protection of the digital operating environment. Furthermore, it implies coordinating actions and preparedness as well as managing extensive disruptions. The aim of this article is to define what is strategic leadership of cyber security and how it is implemented as part of the comprehensive security model in Finland. In terms of effective strategic leadership of cyber security, it is vital t…
Distributed Coverage of Ego Networks in F2F Online Social Networks
2016
Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …
Internet of things and privacy preserving technologies
2009
In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.