Search results for "Information Systems"

showing 10 items of 1926 documents

External managerial networking in meta-organizations. Evidence from regional councils in Norway

2019

Municipalities increasingly engage in cooperation with other municipalities to realize economies of scale and scope, to solve ‘wicked problems’ and to manage border crossing challenges. Often, such...

Scope (project management)business.industry05 social sciencesPublic sector0506 political scienceManagement Information SystemsEconomies of scaleManagement of Technology and Innovation0502 economics and business050602 political science & public administrationRegional scienceBusiness050203 business & managementBorder crossingPublic Management Review
researchProduct

Map of the visibility and search engine positioning of the main Spanish media groups

2020

Este trabajo analiza la visibilidad y posicionamiento en buscadores de los sitios web de los principales grupos de comunicación españoles. Se compara su visibilidad web y su presencia en los resultados de búsqueda de Google a través de programas de análisis SEO y una metodología propia que se ha denominado Índice de Visibilidad Agregada. Se ha realizado un análisis comparativo de los grupos Atresmedia, COPE, Godó, Hearst Magazines, Henneo, Imagina Media Audiovisual, Intereconomía Corporación, Joly, Mediaset España Comunicación, Planeta, Prensa Ibérica, Prisa, Unidad Editorial, Vocento y Zeta. Se ha podido establecer que Unidad Editorial es el grupo con mayor tráfico web proveniente de búsqu…

Search engine positioningEmpresas de mediosMedios de comunicaciónVisibilidad webEspañaMedia ownershipCommunication groupsGrupos mediáticosLibrary and Information SciencesPosicionamiento en buscadoresMedia companiesGoogleMedia groupsSEOSpainMitjans de comunicació de massaWeb visibilityGrupos de comunicaciónMedios digitalesInformation SystemsMass mediaDigital media
researchProduct

The Cyberspace Threats and Cyber Security Objectives in the Cyber Security Strategies

2013

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives…

Security analysisInformation Systems and ManagementComputer Networks and Communicationsbusiness.industryInternet privacyComputer securitycomputer.software_genreHardware and ArchitectureNational Strategy to Secure CyberspaceCyber-attackBusinessSafety Risk Reliability and QualityCyberspaceSafety ResearchcomputerComputingMilieux_MISCELLANEOUSSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Executives' Commitment to Information Security

2020

Two aspects of decision-making on information security spending, executives' varying preferences for how proposals should be presented and the framing of the proposals, are developed. The proposed model of executives' commitment to information security is an interaction model (in addition to the cost of a security solution, and the risk and the potential loss of a security threat) consisting of the interaction between an executive's preferred subordinate influence approach (PSIA), rational or inspirational, and the framing, positive or negative, of a security proposal. The interaction of these two constructs affects the executive's commitment to an information security proposal. The model i…

Security solutionComputer Networks and Communications05 social sciencesInformation securityCognitive biasManagement Information SystemsProspect theoryFraming (construction)0502 economics and businessResource allocationNormative050211 marketingBusinessMarketing050203 business & managementACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Time-Frequency Filtering for Seismic Waves Clustering

2014

This paper introduces a new technique for clustering seismic events based on processing, in time-frequency domain, the waveforms recorded by seismographs. The detection of clusters of waveforms is performed by a k-means like algorithm which analyzes, at each iteration, the time-frequency content of the signals in order to optimally remove the non discriminant components which should compromise the grouping of waveforms. This step is followed by the allocation and by the computation of the cluster centroids on the basis of the filtered signals. The effectiveness of the method is shown on a real dataset of seismic waveforms.

SeismometerInformation Systems and ManagementBasis (linear algebra)Computer sciencebusiness.industryComputationEarthquakes clusteringCentroidWaveforms clusteringComputer Science Applications1707 Computer Vision and Pattern RecognitionPattern recognitionInformation SystemSeismic noiseTime-frequency filteringwaveforms clustering earthquakes clustering time-frequency filteringSeismic wavePhysics::GeophysicsComputingMethodologies_PATTERNRECOGNITIONWaveformArtificial intelligenceSettore SECS-S/01 - StatisticaCluster analysisbusinessAnalysis
researchProduct

Adding sensor-free intention-based affective support to an Intelligent Tutoring System

2017

Abstract Emotional factors considerably influence learning and academic performance. In this paper, we validate the hypothesis that learning platforms can adjust their response to have an effect on the learner’s pleasure, arousal and/or dominance, without using a specific emotion detection system during operation. To this end, we have enriched an existing Intelligent Tutoring System (ITS) by designing a module that is able to regulate the level of help provided to maximize valence, arousal or autonomy as desired. The design of this module followed a two-stage methodology. In the first stage, the ITS was adapted to collect data from several groups of students in primary education, by providi…

Self-assessmentInformation Systems and ManagementComputer sciencemedia_common.quotation_subjectPrimary education02 engineering and technologyMachine learningcomputer.software_genreAffect (psychology)Intelligent tutoring systemManagement Information SystemsPleasureArousalArtificial Intelligence0202 electrical engineering electronic engineering information engineeringValence (psychology)media_commonbusiness.industry05 social sciences050301 education020201 artificial intelligence & image processingArtificial intelligencebusiness0503 educationcomputerSoftwareAutonomyKnowledge-Based Systems
researchProduct

The effects of self-efficacy on computer usage

1995

Abstract This paper examines the effect of self-efficacy, belief in one's capabilities of using a computer in the accomplishment of specific tasks, on computer usage. It introduces an extended technology acceptance model (TAM) that explicitly incorporates self-efficacy and its determinants (experience and organizational support) as factors affecting computer anxiety, perceived ease of use, perceived usefulness and the use of computer technology. A survey of 450 microcomputer users in Finland found strong support for the conceptual model. In accordance with TAM, perceived usefulness had a strong direct effect on usage, while perceived ease of use had indirect effect on usage through perceive…

Self-efficacyInformation Systems and ManagementKnowledge managementbusiness.industryComputer ApplicationsStrategy and ManagementConceptual model (computer science)UsabilityManagement Science and Operations ResearchComputer usageCultural diversityTechnology acceptance modelbusinessPsychologyComputer technologyOmega
researchProduct

Self-organizing maps could improve the classification of Spanish mutual funds

2006

In this paper, we apply nonlinear techniques (Self-Organizing Maps, k-nearest neighbors and the k-means algorithm) to evaluate the official Spanish mutual funds classification. The methodology that we propose allows us to identify which mutual funds are misclassified in the sense that they have historical performances which do not conform to the investment objectives established in their official category. According to this, we conclude that, on average, over 40% of mutual funds could be misclassified. Then, we propose an alternative classification, based on a double-step methodology, and we find that it achieves a significantly lower rate of misclassifications. The portfolios obtained from…

Self-organizing mapInformation Systems and ManagementGeneral Computer ScienceComputer scienceManagement Science and Operations Researchcomputer.software_genreInvestment (macroeconomics)Industrial and Manufacturing EngineeringClusteringStock exchangeModeling and SimulationSelf-organizing map (SOM)EconometricsInvestment analysisAsset (economics)Data miningMutual fundscomputerFinanceEmpresa
researchProduct

A Layered Architecture for Sentiment Classification of Products Reviews in Italian Language

2017

The paper illustrates a system for the automatic classification of the sentiment orientation expressed into reviews written in Italian language. A proper stratification of linguistic resources is adopted in order to solve the lacking of an opinion lexicon specifically suited for the Italian language. Experiments show that the proposed system can be applied to a wide range of domains.

Sentiment analysis Text Classification of ReviewsSettore INF/01 - InformaticaComputer scienceOrientation (computer vision)business.industryMultitier architectureItalian languageSentiment analysis02 engineering and technologyLexiconcomputer.software_genreRange (mathematics)020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerNatural language processing
researchProduct

Compressive biological sequence analysis and archival in the era of high-throughput sequencing technologies

2013

High-throughput sequencing technologies produce large collections of data, mainly DNA sequences with additional information, requiring the design of efficient and effective methodologies for both their compression and storage. In this context, we first provide a classification of the main techniques that have been proposed, according to three specific research directions that have emerged from the literature and, for each, we provide an overview of the current techniques. Finally, to make this review useful to researchers and technicians applying the existing software and tools, we include a synopsis of the main characteristics of the described approaches, including details on their impleme…

Sequence analysisComputer sciencebusiness.industryComputational BiologyHigh-Throughput Nucleotide SequencingContext (language use)Data CompressionBioinformaticsData scienceDNA sequencingSoftwareSequence analysis Data compressionMetagenomicsState (computer science)businessSequence AlignmentMolecular BiologyAlgorithmsSoftwareInformation SystemsData compressionBriefings in Bioinformatics
researchProduct