Search results for "Information systems"
showing 10 items of 1926 documents
The editorial function of the territorial intelligence systems
2006
This communication makes an updating of our thinking about the editorial function of the systems of territorial intelligence. Computer science and information systems aim at increasing the communication between the human beings. A territorial intelligence system is an instrument at the service of the actors who ambition to control the development the equitable and sustainable development of their territory. Since the irruption of data processing, we led research activities to design friendly software, then to model the structure of a territorial information system that is at the service of a network of territorial actors, and more recently to integrate the data analysis functions. They led …
Unusual business or business as usual: An investigation of meeting support requirements in multilateral diplomacy
1993
Abstract The concept of supporting meetings at the same time and at the same place with computers raises the problem of how salient features of group behaviors are understood in meetings. In this paper we critically examine some aspects of meeting behaviors. We point out that the idea of small, cohesive business teams is not necessarily a valid starting point in thinking of all meeting support. In particular, beliefs that relate to user aspects, group features such as composition, structure and protocols, and task characteristics such as nature, importance, and goals in meetings may need deliberation in many group decision support systems (GDSS) interventions. To demonstrate the credibility…
Routing electric vehicles with a single recharge per route
2020
Networks : an international journal (2020). doi:10.1002/net.21964
Problematic internet use prior to and during the COVID-19 pandemic
2021
The health and socio-economic challenges arising from the COVID-19 pandemic have led to greater reliance on the internet to meet basic needs and responsibilities. Greater engagement in online activities may have negative mental and physical health consequences for some vulnerable individuals, particularly under mandatory self-isolation or ‘lockdown’ conditions. The present study investigated whether changes in levels of involvement in online activities during the COVID-19 pandemic (i.e., watching TV series,online sexual activities, video games, social networks, gambling, online shopping, and instant messaging) were associated with problematic internet use, as well as whether certain psychol…
The refugee entrepreneurship process from/in emerging economies
2021
The paper examines several refugee experiences in Mexico and presents their reasons for leaving their home countries. A gap in research is identifying the entrepreneurial process experienced by refugee entrepreneurs. We use the case study of 10 Latin American refugees in Mexico to propose a conceptual framework that describes the entrepreneurial process of refugee entrepreneurs. We have found that this process begins with the abandonment of the country of origin, followed by the traumatic experiences that caused flight and the difficulties they face in the pilgrimage to the host country. These events help shape the entrepreneurial intention of the refugees.
A Framework to Explain the Relation Between ICT and Development: Combining Affordances and the Capability Approach
2019
Part 1: Pushing the Boundaries - New Research Methods, Theory and Philosophy in ICT4D; International audience; In this paper, we suggest a framework to better explain the relation between ICT and development. The framework combines two theories: The Capability Approach and Affordances. The capability approach defines development as freedom of choice; and the affordances explains the relational aspects of people and technology. These two theories complement each other by connecting the means (technology) to the ends (development). A case study of ICT and study-circle education in rural areas of Kenya is used to illustrate the framework. Using the framework, the study revealed how actualizati…
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Watermarking for ontologies
2011
In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.
Intangible capital and business productivity in the hotel industry
2019
Intangible capital is a key factor of productivity growth. This paper analyses how the internal intangible capital of the company and external intangible capital influence its productivity. This contribution focuses on the hotel industry since it is a key industry of the Spanish economy, such that any increase in its productivity has an impact on the entire economy. Both, the intangible capital of the company and that of the region in which the company is located are considered as determinants of productivity. Likewise, the importance of other agglomeration economies in the productivity of hotel companies is taken into account. A model estimates firm level determinants of productivity, cont…
Robust Energy Scheduling in Vehicle-to-Grid Networks
2017
The uncertainties brought by intermittent renewable generation and uncoordinated charging behaviors of EVs pose great challenges to the reliable operation of power systems, which motivates us to explore the integration of robust optimization with energy scheduling in V2G networks. In this article, we first introduce V2G robust energy scheduling problems and review the stateof- the art contributions from the perspectives of renewable energy integration, ancillary service provision, and proactive demand-side participation in the electricity market. Second, for each category of V2G applications, the corresponding problem formulations, robust solution concepts, and design approaches are describ…