Search results for "Information System"
showing 10 items of 2404 documents
A Cognitive Architecture for Robotic Hand Posture Learning
2005
This paper deals with the design and implementation of a visual control of a robotic system composed of a dexterous hand and video camera. The aim of the proposed system is to reproduce the movements of a human hand in order to learn complex manipulation tasks or to interact with the user. A novel algorithm for robust and fast fingertips localization and tracking is presented. A suitable kinematic hand model is adopted to achieve a fast and acceptable solution to an inverse kinematics problem. The system is part of a cognitive architecture for posture learning that integrates the perceptions by a high-level representation of the scene and of the observed actions. The anthropomorphic robotic…
Moving RTS/CTS to the frequency domain: an efficient contention scheme for 802.11ax networks
2019
In this paper, we propose a contention mechanism based on the execution of multiple contention rounds in the frequency domain (ReCHo), which is designed to offer high throughput performance and robustness with respect to imperfect carrier sensing. The main idea is using narrow tones as signalling messages for performing channel access contentions and allowing the Access Point (AP) to echo these signals, in order to extend the sensing capabilities to all the stations associated to the AP. In particular, we refer to the emerging IEEE 802.11ax standard, showing how our scheme can boost performance of random access with respect to the current version of IEEE 802.11ax OFDMA Back-Off (OBO), even …
Effects of menu structure and touch screen scrolling style on the variability of glance durations during in-vehicle visual search tasks.
2011
The effects of alternative navigation device display features on drivers' visual sampling efficiency while searching forpoints of interest were studied in two driving simulation experiments with 40 participants. Given that the number of display items was sufficient, display features that facilitate resumption of visual search following interruptions were expected to lead to more consistent in-vehicle glance durations. As predicted, compared with a grid-style menu, searching information in a list-style menu while driving led to smaller variance in durations of in-vehicle glances, in particular with nine item displays. Kinetic touch screen scrolling induced a greater number of very short in-v…
Dual Information Systems : A Review Of Factors Affecting Their Use
2019
More and more information systems (IS) are designed to address a blend of hedonic and utilitarian purposes, and hence become what information system scholars call today “dual systems.” The aim of this research is chiefly to provide a holistic perspective for research done regarding dual IS (i.e., what factors affect users’ adoption and post-adoption of these systems) in order to assess the state of knowledge in this area and to provide a reference point for system designers. To achieve this goal, we started out with a systematic literature review (35 articles), and analyzed the articles in terms of their theoretical background, constructs and findings. The results suggest that there is an i…
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions
2022
In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the field of criminology to explain information security behaviors (or intention). Today, DT is among the most commonly used theories in IS security research. Our review of IS research applying DT highlights that many fundamental assumptions of DT are unrecognized and therefore unexamined. This may have resulted in misunderstandings and conceptual confusions regarding some of the basic concepts of DT. For example, some IS studies confuse general deterrence with specific deterrence or do not recognize the difference between the two. Moreover, these fundamental assumptions, when directly examined, may provide importan…
A Knowledge Interface System for Information and Cyber Security Using Semantic Wiki
2018
Resilience against information and cyber security threats has become an essential ability for organizations to maintain business continuity. As bulletproof security is an unattainable goal, organizations need to concentrate to select optimal countermeasures against information and cyber security threats. Implementation of cyber risk management actions require special knowledge and resources, which especially small and medium-size enterprises often lack. Information and cyber security risk management establish knowledge intensive business processes, which can be assisted with a proper knowledge management system. This paper analyzes how Semantic MediaWiki could be used as a platform to assis…
Age Differences in Technology Readiness and Its Effects on Information System Acceptance and Use : The Case of Online Electricity Services in Finland
2017
Although technology readiness (TR) has been found to influence the acceptance and use of information systems (IS), little is known about how TR varies in terms of different demographic variables and how these demographic variables moderate the effects of TR on IS acceptance and use. In this study, we aim to address this gap in prior research by examining the potential age differences in the four technology readiness index (TRI) constructs as well as their effects on IS use intention and its two main antecedents hypothesised in the technology acceptance model (TAM): perceived usefulness and perceived ease of use. The examination is conducted in the context of online electricity services and …
The Role of Anticipatory Emotions and their Contagiousness in an IS Project
2020
The previous research has shown increasing interest in understanding anticipatory emotions and their contagion, which can happen in dyads or groups as well as in other settings in organizations. The role of anticipatory emotions and their behavioral effects remain unexplored in IS projects. To address the research gap, we conducted a qualitative and longitudinal case study in order to understand what arethe role and consequences of the anticipatory emotions in IS project work, and how their contagiousness emerges over time. Adopting a model of group emotional contagion as a theoretical lens provided us with an opportunity to explain the relationship between anticipatory emotions and emotion…
Nytt og nyttig, men er det nyttiggjort? : erfaring med implementering av Lifecare eRom i kommuner
2016
Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 We are both working in a municipality where a nursing home has procured Lifecare eRom, which is a module in the electronic medical record solution Gerica. The purpose of eRom is to provide quick access to a patient’s treatment plan, as well as the possibility to create documentation on touch screens site in the patient’s room. After six months we found that the system was not in use. Furthermore, we were under the impression that there had been some challenges with the implementation. Based on this, we formulated the following issue for exploration: What success factors and barriers have municipalities experienced duri…
The determinants affecting on the investment proposals adoption
2016
Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical stud…