Search results for "Information Systems"
showing 10 items of 1926 documents
A tale of two frames : Exploring the role of framing in the use discontinuance of volitionally adopted technology
2022
https://doi.org/10.1111/isj.12355 The discontinuance of volitional IS (i.e., information systems adopted, used and discontinued at will) has recently attracted remarkable attention from academics and practitioners alike. However, most research to date has been ahistorical. Ignoring the temporal progression can be problematic when the phenomenon under investigation is dynamic and evolving. To balance this, we adopt a stage modelling approach to understand the process ending with the technology use being discontinued by users of a popular crowdsourcing platform. Two questions guided our investigation: (1) Why do users discontinue using an IS they have volitionally adopted and used? (2) How do…
Does the law matter? An empirical study on the accessibility of Finnish higher education institutions’ web pages
2022
AbstractInformation and communication technology (ICT) has made higher education available to many students in a new way. The role of online learning in higher education institutions (HEIs) has grown to an unprecedented scale due to the COVID-19 pandemic. The diversity of higher education students has increased, and accessible solutions are needed. New European and national regulations support these trends. The research reported in this paper was conducted in Finland, which is one of the leading European countries in terms of high technology and digitalisation. The aim of this research is to explore the accessibility of all Finnish HEIs’ (N = 38) landing pages based on Web Content Accessibi…
On coincidence of feedback and global Stackelberg equilibria in a class of differential games
2021
This paper shows for a class of differential games that the global Stackelberg equilibrium (GSE) coincides with the feedback Stackelberg equilibrium (FSE), although the GSE assumes that the leader/regulator an- nounces at the initial time the regulatory instrument rule she will follow for the rest of the game, while in the FSE, the regulator at any time chooses the optimal level of the regulatory instrument rate. This coincidence is based on the fact that the FSE is calculated using dynamic programming what implies that although the regulator chooses the regulatory instrument rate level that maximizes social welfare, the first-order condition for the maximization of the right-hand side of t…
Learning by the Process of Elimination
2002
AbstractElimination of potential hypotheses is a fundamental component of many learning processes. In order to understand the nature of elimination, herein we study the following model of learning recursive functions from examples. On any target function, the learning machine has to eliminate all, save one, possible hypotheses such that the missing one correctly describes the target function. It turns out that this type of learning by the process of elimination (elm-learning, for short) can be stronger, weaker or of the same power as usual Gold style learning.While for usual learning any r.e. class of recursive functions can be learned in all of its numberings, this is no longer true for el…
DRESS: A Distributed RMS Evaluation Simulation Software
2020
Distributed environments consist of a huge number of entities that cooperate to achieve complex goals. When interactions occur between unknown parties, intelligent techniques for estimating agent reputations are required. Reputation management systems (RMS's) allow agents to perform such estimation in a cooperative way. In particular, distributed RMS's exploit feedbacks provided after each interaction and allow prediction of future behaviors of agents. Such systems, in contrast to centralized RMSs, are sensitive to fake information injected by malicious users; thus, predicting the performance of a distributed RMS is a very challenging task. Although many existing works have addressed some c…
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Information Abstraction from Crises Related Tweets Using Recurrent Neural Network
2016
Social media has become an important open communication medium during crises. The information shared about a crisis in social media is massive, complex, informal and heterogeneous, which makes extracting useful information a difficult task. This paper presents a first step towards an approach for information extraction from large Twitter data. In brief, we propose a Recurrent Neural Network based model for text generation able to produce a unique text capturing the general consensus of a large collection of twitter messages. The generated text is able to capture information about different crises from tens of thousand of tweets summarized only in a 2000 characters text.
Ranking-Oriented Collaborative Filtering: A Listwise Approach
2016
Collaborative filtering (CF) is one of the most effective techniques in recommender systems, which can be either rating oriented or ranking oriented. Ranking-oriented CF algorithms demonstrated significant performance gains in terms of ranking accuracy, being able to estimate a precise preference ranking of items for each user rather than the absolute ratings (as rating-oriented CF algorithms do). Conventional memory-based ranking-oriented CF can be referred to as pairwise algorithms. They represent each user as a set of preferences on each pair of items for similarity calculations and predictions. In this study, we propose ListCF, a novel listwise CF paradigm that seeks improvement in bot…
Capabilities and Affordances in the ICT4D Context
2019
Part 1: Pushing the Boundaries - New Research Methods, Theory and Philosophy in ICT4D; International audience; The paper examines two concepts that have been frequently used in Information and Communications Technologies for Development (ICT4D) research, capabilities and affordance. We seek to delineate their similarities, their differences, and their accurate application in ICT4D. Both concepts connote a space of opportunities, both are relational between artefact and human agency when applied in ICT4D, and both entail potential rather than actualisation of possibilities. By comparing the two at some length, we hope to generate a more refined understanding of both capabilities and affordan…
Customization Support in Computer-Based Technologies for Autism: A Systematic Mapping Study
2020
Autism Spectrum Disorder (ASD) is a neurodevelopmental condition characterized by social interaction and communication difficulties, along with narrow and repetitive interests. Being a spectrum dis...