Search results for "Format"

showing 10 items of 24643 documents

A Novel Model for Cybersecurity Economics and Analysis

2017

In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…

ta113Value (ethics)Computer sciencemedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTING020207 software engineering02 engineering and technologyBusiness activitiesComputer securitycomputer.software_genrecybersecurity economicscyber fraudadvanced cyber threatstaloudelliset vaikutuksetcost-benefit model020204 information systemsCyber-security regulation0202 electrical engineering electronic engineering information engineeringResearch developmentkyberturvallisuuscomputercybersecurity impactReputationmedia_common2017 IEEE International Conference on Computer and Information Technology (CIT)
researchProduct

The Reform of Vocational Education and Training in Finland: Insights from Twitter

2018

This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …

ta113ammatillinen koulutussocial mediaTwittervocational educationsosiaalinen mediayleinen mielipide113 Computer and information sciencesammattikoulutuspublic opinionuudistukset516 Educational sciencesreform
researchProduct

An Approach for Network Outage Detection from Drive-Testing Databases

2012

A data-mining framework for analyzing a cellular network drive testing database is described in this paper. The presented method is designed to detect sleeping base stations, network outage, and change of the dominance areas in a cognitive and self-organizing manner. The essence of the method is to find similarities between periodical network measurements and previously known outage data. For this purpose, diffusion maps dimensionality reduction and nearest neighbor data classification methods are utilized. The method is cognitive because it requires training data for the outage detection. In addition, the method is autonomous because it uses minimization of drive testing (MDT) functionalit…

ta113cellular network drive testing databaseDowntimeArticle SubjectDatabaseComputer Networks and CommunicationsComputer scienceDimensionality reductionData classificationDiffusion mapcomputer.software_genrelcsh:QA75.5-76.95Base stationHandoverCellular networklcsh:Electronic computers. Computer scienceData miningtiedonlouhintacomputerInformation SystemsTest dataJournal of Computer Networks and Communications
researchProduct

Appraisal and Mental Contents in Human-Technology Interaction

2015

User experience has become a key concept in investigating human-technology interaction. Therefore it has become essential to consider how user experience can be explicated using psychological concepts. Emotion has been widely considered to be an important dimension of user experience, and one obvious link between modern psychology and the analysis of user experience assumes the analysis of emotion in interaction processes. In this paper, the focus is on the relationship between action types and elicited emotional patterns. In three experiments including N = 40 participants each, it is demonstrated that the types of emotions experienced when people evaluate and use technical artefacts differ…

ta113cognitionbusiness.industryfrustrationcompetenceemotionCognitionhuman-technology interactionuser psychologyHuman-Computer InteractionUser experience designuser experienceactionPsychologybusinessCompetence (human resources)Social psychologyta515Information SystemsCognitive psychologyInternational Journal of Technology and Human Interaction
researchProduct

Turing's error-revised

2016

Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…

ta113computationClass (set theory)modelformal language02 engineering and technologyconsciousnessArgumentation theoryEpistemologyTuring machineTuring machinesymbols.namesake020204 information systemsFormal language0202 electrical engineering electronic engineering information engineeringsymbolsSelection (linguistics)020201 artificial intelligence & image processingSociologyConstruct (philosophy)TuringcomputermindNatural languagecomputer.programming_languageInternational Journal of Philosophy Study
researchProduct

Context-aware data caching for 5G heterogeneous small cells networks

2016

In this work, we investigate the problem of context-aware data caching in the heterogeneous small cell networks (HSCNs) to provide satisfactory to the end-users in reducing the service latency. In particular, we explore the storage capability of base stations (BSs) in HSCNs and propose a data caching model consists of edge caching elements (CAEs), small cell base stations (SBSs), and macro cell BS (MBS). Then, we concentrate on how to efficiently match the data contents to the different cache entities in order to minimize the overall system service latency. We model it as a distributed college admission (CA) stable matching problem and tackle this issue by utilizing contextual information t…

ta113context awareta213Computer sciencebusiness.industryQuality of servicematching05 social sciences050801 communication & media studies020206 networking & telecommunicationssmall cell networks02 engineering and technologycontent cachingSmart CacheBase station0508 media and communicationsServer0202 electrical engineering electronic engineering information engineeringLeverage (statistics)CacheSmall cellbusinessComputer network
researchProduct

Towards the cyber security paradigm of ehealth: Resilience and design aspects

2017

Digital technologies have significantly changed the role of healthcare clients in seeking and receiving medical help, as well as brought up more cooperative policy issues in healthcare cross-border services. Citizens continue to take a more co-creative role in decisions about their own healthcare, and new technologies can enable and facilitate this emergent trend. In this study, healthcare services have been intended as a critical societal sector and therefore healthcare systems are focused on as critical infrastructures that ought to be protected from all types of fears, including cyber security threats and attacks. Despite continual progress in the systemic risk management of cyber domain…

ta113e-healthcareEmerging technologiesbusiness.industrycyber securityComputer securitycomputer.software_genreAnticipation (artificial intelligence)Critical information infrastructureHealth careSystemic riskeHealthBusinessteleterveydenhuoltoResilience (network)kyberturvallisuuscomputerHealthcare system
researchProduct

Transformation of the Forest-based Bioeconomy by Embracing Digital Solutions

2017

This paper attempts to explore a new insight to both industrialized and growing economies by demonstrating a digital-driven creative disruption in the forest-based bioeconomy which is beginning to replace its conventional and narrow concept of a forest-blinded economy. Notwithstanding the potential broad cross-sectoral benefits to both industrialized and growing economies, natural environments and locality constraints and the incessant challenge of distance have impeded balanced development of this economy. However, driven by digital solutions the economy has taken big steps forward in recent years. Digitalization has enabled real-time end-to-end supply chain visibility, improved delivery a…

ta113forest-based bioeconomyStock leveltransformationLocalityBusiness activitiesAmazon business modelSupply chain visibilityComputingMilieux_GENERALDigital ecosystemTransparency (graphic)Demand planningBusinessdigital solutionscreative disruption platformEconomic systemta512Journal of Technology Management for Growing Economies
researchProduct

Design science research genres : introduction to the special issue on exemplars and criteria for applicable design science research

2018

We propose the definition of genres in IS design science research (DSR). In recent years DSR has become a well-accepted research paradigm within IS; however, now the diversity of purpose, methodology, and mental models has increased to a point where reviewers and editors are unsure about which standards to apply to particular research submissions. For some researchers an artefact of value is a system or system component, while for others artefacts ought to be theories or theory components. Such differences are hard to reconcile and researchers often face criticism from diverse corners of the paradigm, where beliefs and standards are very different. We observed this diversity of views among …

ta113genresComputer scienceManagement sciencemedia_common.quotation_subject05 social sciencesgenret02 engineering and technologyLibrary and Information Sciencesinformation systemsdesign science research020204 information systems0502 economics and business0202 electrical engineering electronic engineering information engineeringInformation systemDesign science research050203 business & managementInformation SystemsDiversity (politics)media_common
researchProduct

Biased graph walks for RDF graph embeddings

2017

Knowledge Graphs have been recognized as a valuable source for background information in many data mining, information retrieval, natural language processing, and knowledge extraction tasks. However, obtaining a suitable feature vector representation from RDF graphs is a challenging task. In this paper, we extend the RDF2Vec approach, which leverages language modeling techniques for unsupervised feature extraction from sequences of entities. We generate sequences by exploiting local information from graph substructures, harvested by graph walks, and learn latent numerical representations of entities in RDF graphs. We extend the way we compute feature vector representations by comparing twel…

ta113graph embeddingsGraph kernelComputer scienceVoltage graphComparability graphdata mining02 engineering and technologycomputer.software_genre020204 information systemsyhdistetty avoin tietolinked open data0202 electrical engineering electronic engineering information engineeringTopological graph theoryGraph (abstract data type)020201 artificial intelligence & image processingData miningtiedonlouhintaGraph propertyNull graphLattice graphavoin tietocomputerProceedings of the 7th International Conference on Web Intelligence, Mining and Semantics
researchProduct