Search results for "Information technology"
showing 10 items of 480 documents
Emotions toward cognitive enhancement technologies and the body – Attitudes and willingness to use
2020
While technological development is becoming more integrated into our surrounding environments, it is also moving closer towards the human body. In fact, numerous examples can be seen in which information technology (IT) is being designed not just for use on the body, but also inside it. Technologies dominating this domain can be described as ‘cognitive enhancement technologies’ (CETs). These technologies are intended to enhance people's cognitive capabilities, and can be viewed in the forms of implants, lens, drugs, and then moving outward, smart clothing, watches and physical environments to name some. The present study focused on measuring peoples’ (N=104) emotions towards and willingness…
Immersion revisited:A review of existing definitions of immersion and their relation to different theories of presence
2016
The term immersion continues to be applied inconsistently within and across different fields of research connected with the study of virtual reality and interactive media. Moreover, immersion is oftentimes used interchangeably with the terms presence and engagement. This article details a review of existing definitions of immersion originating within the study of video games, virtual environments, and literary works of fiction. Based on this review, a three-dimensional taxonomy of the various conceptualizations of immersion is proposed. That is, the existing definitions of immersion may be broadly divided into three categories, each representing a dimension of the taxonomy: immersion as a p…
The determinants affecting on the investment proposals adoption
2016
Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical stud…
IT Negotiators : What’s your approach?
2017
The IT and software industries appear to be collaborative in projects in house and among organizations as they plan and negotiate for mutual benefit. Yet individual negotiators do not always proceed with the same thought patterns or even with success. This article sheds some light on how skilled, aware negotiators can better match up their thinking to avoid communication and process failures. The research behind this article shows that those with greater decision making authority and experience have more ways of thinking about negotiation than others. nonPeerReviewed
Knowledge mining of unstructured information: application to cyber domain
2023
Funding Information: TT, KB, ML and KK acknowledge research project funding from Cyberwatch Finland. AC is the CEO of the company. PJ and AC are founders and partners in the company. KK and ML are on the advisory board of the company. Funding Information: TT, KB, ML and KK acknowledge research project funding from Cyberwatch Finland. TT acknowledges funding from the Vilho, Yrjö and Kalle Väisälä Foundation of the Finnish Academy of Science and Letters. Publisher Copyright: © 2023, The Author(s). Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous open online sources. However, processing large volumes and streams of data is a challenging task for…
eHealth Services and Technology : Challenges for Co-Development
2007
The promises of ICT have been poorly redeemed in health care; many projects have failed. This article conceptualizes the co-construction of services and technologies in order to help future practitioners in the field to understand and find solutions to the challenges in ICT-enhanced service change. The conceptualization is created by structuring the findings of a case study with the help of theoretical concepts. The conceptualization then is implemented in another case to study its potential for finding challenges and suggesting solutions. Both cases demonstrate challenges for codevelopment that contributed to poor project outcomes. Participants in eHealth projects need a better understandi…
IT-supported international outsourcing of software production
2002
Actual and Potential Pedagogical Use of Tablets in Schools
2013
This study reviews the potential of tablet technology for teaching and learning. In autumn 2012, we conducted a focused survey comprising quantitative and qualitative questions with Finnish teachers (N = 171, from 54 schools). We focused on perceived pedagogical opportunities and the actualized pedagogical potential of tablets at schools. The survey results indicate that the actual usefulness of tablets in schools was significantly less than what teachers perceived as the pedagogical potential. However, the results demonstrate the positive impact these devices are having on teaching and learning, as well as prompting changes in pedagogical perspectives. Teachers stated that tablets can dive…
Building sustainable contextual ambidexterity through routines: a case study from information technology firms
2020
The purpose of this paper is to explain the role that routines play in achieving sustainable organisational ambidexterity in information technology (IT) firms. Our exploratory analysis of four case studies reveals the key importance of routines in setting the context for sustainable ambidexterity. Companies build up contextual ambidexterity through routines derived from normalization of processes, normalization of skills, and normalization of results. The findings of the study show that routines support IT professionals to decide whether to exploit or explore in each particular case. Firstly, the enabling character of explicit routines as a result of the normalisation of work processes and …
Systemic Management of Architectural Decisions in Enterprise Architecture Planning. Four Dimensions and Three Abstraction Levels
2006
This paper presents a process model for the management of architectural decisions in enterprise architecture planning. First, decisions are made at the enterprise level, with strategic business considerations on the enterprise information, systems and technology strategy and governance issues. The next step is to define the domains, to then go on with domain architecture decisions. At the systems level, the enterprise and domain architecture decisions are collected and converted into architecture descriptions accurate in precision, form and detail to be given as input to the information systems development process, following the architectural planning. The model is derived from previous wor…