Search results for "Information Systems."
showing 10 items of 1545 documents
Customers' Perceived Risk and Trust in Using Mobile Money Services—an Empirical Study of Ghana
2019
Although mobile money (MM) has been explored in the existing literature, the roles of trust and risk in MM use have received little attention from researchers. Furthermore, many of the existing studies have treated these constructs as unidimensional. The extant literature also shows that perceived risk has received little attention from researchers who have conducted studies on MM. Thus, the objective of this study is to examine the roles of trust and perceived risk in customers' intent to adopt MM services in Ghana. Both trust and perceived risk were broken down into various dimensions. The study involved 671 respondents who were selected via an intercept approach and an online survey. Str…
About time
2019
Purpose The purpose of this paper seeks to develop a motivation-based complementary framework for temporally dynamic user preferences to facilitate optimal timing in web personalisation. It also aims to highlight the benefits of considering user motivation when addressing issues in temporal dynamics. Design/methodology/approach Through theory, a complementary framework and propositions for motivation-based temporal dynamics for further testing are created. The framework is validated by feeding back findings, whereas some of the propositions are validated through an experiment. Findings The suggested framework distinguishes two ways (identifying/learning and shifting) of using a motive-base…
Explaining Causes Behind SQL Query Formulation Errors
2020
This Full Research Paper presents the most prominent query formulation errors in Structured Query Language (SQL), and maps these errors to their cognitive explanations. Understanding query formulation errors is a key to teaching SQL. more effectively. However, studies on what kind of errors novices struggle with are relatively scarce when compared to, for example, programming languages. Although committing errors is a crucial part in learning, some errors are relatively easy to fix, and their commonness is not necessarily an indication of their difficulty. Other errors, however, halt the learning process, and are never fixed by the query writer. Using a previously established error taxonomy…
OPTEER, un dispositif de connaissance et d’analyse territoriale par et pour les acteurs de la transition énergétique
2018
International audience; The aim of this article is to illustrate, through the implementation and exploitation of the OPTEER platform (Territorial Energy Observation and Prospective at the Regional scale), how the various tools made available to territorial actors and what collective uses of geographic information have developed. Based on his experience of more than 10 years, around which crystallized operational developments and research experiments, are also evoked the new needs related to the requirements of the implementation of energy transition and the tracks of research,development and porting envisaged to guarantee the durability of the device.; Cet article a pour objectif d’illustre…
Software Complexity and Organization of Firms’ Offshoring Activities
2017
How does software complexity shape software providers’ offshoring tasks, and how do such firms organize their offshoring activity? These questions are important, since the global software development market is growing rapidly, offering new opportunities for software managers and entrepreneurs to distribute their activities geographically. Based on a multi-site case study of 12 software firms, we study connections between software complexity and the offshoring strategies selected. Our findings suggest that software firms select a variety of organizational structures for their offshoring activity, and that the selection is shaped by the complexity of the software in question. peerReviewed
Does openness and open access policy relate to the success of universities?
2013
This study takes a closer look at the Ranking Web of Universities and Ranking Web of Repositories rankings and tries to examine if there is a connection between these two rankings. Study is done by analyzing the success of University of Jyväskylä and the institutional repository JyX of the University in these rankings. Comparison shows that the JyX archive plays an important role in University’s success especially when analyzing the presence and openness of the University. By analyzing the success of eight European countries in these rankings and cross reading these findings with the development of relative citation impact shown in a report by the Finnish Academy, some interesting common tr…
Hypervisor-Based White Listing of Executables
2019
We describe an efficient system for ensuring code integrity of an operating system (OS), both its own code and application code. The proposed system can protect from an attacker who has full control over the OS kernel. An evaluation of the system's performance suggests the induced overhead is negligible. peerReviewed
Student agency analytics: learning analytics as a tool for analysing student agency in higher education
2020
This paper presents a novel approach and a method of learning analytics to study student agency in higher education. Agency is a concept that holistically depicts important constituents of intentional, purposeful, and meaningful learning. Within workplace learning research, agency is seen at the core of expertise. However, in the higher education field, agency is an empirically less studied phenomenon with also lacking coherent conceptual base. Furthermore, tools for students and teachers need to be developed to support learners in their agency construction. We study student agency as a multidimensional phenomenon centring on student-experienced resources of their agency. We call the analyt…
Critical Exploration of Flexible Delivery
2020
This work-in-progress research article presents an introductory qualitative study on students' perceptions of a flexibly delivered, modular computer science course. Many contemporary approaches to education rely in various ways on flexible delivery of course content. This is often done to capitalize on modern technology and the web, and to put the student ‘in the center.' However, it is becoming manifest that these approaches may challenge both the students and the equity between them, making it important to understand the effects of flexible delivery in terms of the students. In the voice of our students, flexible delivery was seen as a largely positive approach, reducing stress, promoting…
Expectations and Experiences of Implementing a Mobile Secure Communication Application
2020
The privacy and security of communication in corporations and governmental organizations has increased enormously over the years. At the same time, a growing amount of technological solutions to support this have emerged. This study examines user expectations before and use experiences during the implementation phase of a mobile secure communication application. These are investigated from the expectation–confirmation perspective and its influence on continued adoption. The study has an exploratory approach for this investigation. To guide the investigation, the study draws from the expectation–confirmation theory (ECT) and the unified theory of acceptance and use of technology (UTAUT). Emp…