Search results for "Information System"
showing 10 items of 2404 documents
The state of research on software engineering competencies: A systematic mapping study
2022
Considering the critical role of software in modern societies, we face an urgent need to educate more competent software professionals. Software engineering competencies (SEC) are considered the backbone of successfully developing software products. Consequently, SEC has become a hotspot for software engineering research and practice. Although scientific literature on SEC is not lacking, to our knowledge, a comprehensive overview of the current state of SEC research is missing. To that end, we conducted an extensive and systematic review of the SEC literature. We provide an overview of the current state of research on SEC, with a particular focus on common SEC research areas. In addition to…
Does openness and open access policy relate to the success of universities?
2013
This study takes a closer look at the Ranking Web of Universities and Ranking Web of Repositories rankings and tries to examine if there is a connection between these two rankings. Study is done by analyzing the success of University of Jyväskylä and the institutional repository JyX of the University in these rankings. Comparison shows that the JyX archive plays an important role in University’s success especially when analyzing the presence and openness of the University. By analyzing the success of eight European countries in these rankings and cross reading these findings with the development of relative citation impact shown in a report by the Finnish Academy, some interesting common tr…
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Student agency analytics: learning analytics as a tool for analysing student agency in higher education
2020
This paper presents a novel approach and a method of learning analytics to study student agency in higher education. Agency is a concept that holistically depicts important constituents of intentional, purposeful, and meaningful learning. Within workplace learning research, agency is seen at the core of expertise. However, in the higher education field, agency is an empirically less studied phenomenon with also lacking coherent conceptual base. Furthermore, tools for students and teachers need to be developed to support learners in their agency construction. We study student agency as a multidimensional phenomenon centring on student-experienced resources of their agency. We call the analyt…
Critical Exploration of Flexible Delivery
2020
This work-in-progress research article presents an introductory qualitative study on students' perceptions of a flexibly delivered, modular computer science course. Many contemporary approaches to education rely in various ways on flexible delivery of course content. This is often done to capitalize on modern technology and the web, and to put the student ‘in the center.' However, it is becoming manifest that these approaches may challenge both the students and the equity between them, making it important to understand the effects of flexible delivery in terms of the students. In the voice of our students, flexible delivery was seen as a largely positive approach, reducing stress, promoting…
Organizational Learning from Cybersecurity Performance: Effects on Cybersecurity Investment Decisions
2023
AbstractIS literature has identified various economic, performance, and environmental factors affecting cybersecurity investment decisions. However, economic modeling approaches dominate, and research on cybersecurity performance as an antecedent to investments has taken a backseat. Neglecting the role of performance indicators ignores real-world concerns driving actual cybersecurity investment decision-making. We investigate two critical aspects of cybersecurity performance: breach costs and breach identification source, as antecedents to cybersecurity investment decisions. We use organizational learning to theorize how performance feedback from these two aspects of cybersecurity breaches …
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…
Enablers of and constraints on employees' information sharing on enterprise social media
2020
PurposeThe purpose of this study is to investigate the various enablers of and constraints on employees' information sharing on an enterprise social media platform. It draws on two theoretical perspectives, communication privacy management theory and the technology affordance framework, as well as on empirical data in an attempt to paint a comprehensive picture of the factors shaping employees' decisions to share or not share information on enterprise social media.Design/methodology/approachThis qualitative field study is based on semi-structured interviews and enterprise social media review data from a large Nordic media organization.FindingsOn an enterprise social media platform, privacy …
Integrated Administration of the Organizations Informational Resources
2007
Organizations grow and develop continuosly and information volume grows in the same rythm, which makes from improvement or changing the old counting systems an imperative. More and more companies, instead of continuing to invest in small applications choose integrated informational solutions, which are adapted to the user’s daily needsfrom, all decisional levels. Although apparently profitable from the costs point of view, small applications assure only the simple economical solutions between clients, partners, furnisors, and employees. For high business volume companies, this kind of applications become useless in a short time, fact that involves extra sustained investitions
User Participation in Consulting Projects: Client and Provider Role Profiles
2005
This study presents a variation scheme of participation roles in consulting projects. Typical consulting assignments in the area known as IS planning involve strategic planning and information systems management, enterprise architecture, information management or information technology governance. Participation is a crucial issue in consulting on these issues. In the literature on participation, different roles and tasks have been found, but it is not always specified, on what types of projects or systems the results are based. The literature on consulting suggests some models for work division. In a two-phase qualitative study, we first collect possible tasks in ICT consulting projects, an…