Search results for "Format"
showing 10 items of 24643 documents
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…
The Reform of Vocational Education and Training in Finland: Insights from Twitter
2018
This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …
An Approach for Network Outage Detection from Drive-Testing Databases
2012
A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…
Appraisal and Mental Contents in Human-Technology Interaction
2015
User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…
Turing's error-revised
2016
Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…
Context-aware data caching for 5G heterogeneous small cells networks
2016
In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…
Towards the cyber security paradigm of ehealth: Resilience and design aspects
2017
Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…
Transformation of the Forest-based Bioeconomy by Embracing Digital Solutions
2017
This paper attempts to explore a new insight to both industrialized and growing economies by demonstrating a digital-driven creative disruption in the forest-based bioeconomy which is beginning to replace its conventional and narrow concept of a forest-blinded economy. Notwithstanding the potential broad cross-sectoral benefits to both industrialized and growing economies, natural environments and locality constraints and the incessant challenge of distance have impeded balanced development of this economy. However, driven by digital solutions the economy has taken big steps forward in recent years. Digitalization has enabled real-time end-to-end supply chain visibility, improved delivery a…
Design science research genres : introduction to the special issue on exemplars and criteria for applicable design science research
2018
We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has increased to a point where reviewers and editors are unsure about which standards to apply to particular research submissions. For some researchers an artefact of value is a system or system component, while for others artefacts ought to be theories or theory components. Such differences are hard to reconcile and researchers often face criticism from diverse corners of the paradigm, where beliefs and standards are very different. We observed this diversity of views among …
Biased graph walks for RDF graph embeddings
2017
Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…