Search results for "Information technology"

showing 10 items of 480 documents

Emotions toward cognitive enhancement technologies and the body – Attitudes and willingness to use

2020

While technological development is becoming more integrated into our surrounding environments, it is also moving closer towards the human body. In fact, numerous examples can be seen in which information technology (IT) is being designed not just for use on the body, but also inside it. Technologies dominating this domain can be described as ‘cognitive enhancement technologies’ (CETs). These technologies are intended to enhance people's cognitive capabilities, and can be viewed in the forms of implants, lens, drugs, and then moving outward, smart clothing, watches and physical environments to name some. The present study focused on measuring peoples’ (N=104) emotions towards and willingness…

ihmisen ja tietokoneen vuorovaikutusasenteetHuman Factors and ErgonomicsEducationEnhancement Technologiestunteetbusiness.industrySignificant differenceGeneral EngineeringInformation technologyCognitionHuman bodykognitiiviset prosessitClothingHuman-Computer InteractionScholarshipWillingness to useälytuotteetHardware and Architectureteknologiaälytekniikkaetiikkacognitive enhancementbusinessPsychologySoftwareCognitive psychologyInternational Journal of Human-Computer Studies
researchProduct

Immersion revisited:A review of existing definitions of immersion and their relation to different theories of presence

2016

The term immersion continues to be applied inconsistently within and across different fields of research connected with the study of virtual reality and interactive media. Moreover, immersion is oftentimes used interchangeably with the terms presence and engagement. This article details a review of existing definitions of immersion originating within the study of video games, virtual environments, and literary works of fiction. Based on this review, a three-dimensional taxonomy of the various conceptualizations of immersion is proposed. That is, the existing definitions of immersion may be broadly divided into three categories, each representing a dimension of the taxonomy: immersion as a p…

immersionSocial Psychologylcsh:T58.5-58.64Computer sciencelcsh:Information technologyCommunication05 social sciencesComputingMilieux_PERSONALCOMPUTINGvideo gamesVirtual realitycomputer.software_genre050105 experimental psychologyHuman-Computer Interaction03 medical and health sciences0302 clinical medicineVirtual machinevirtual environmentsComputer graphics (images)Immersion (virtual reality)virtual reality0501 psychology and cognitive sciencespresencecomputer030217 neurology & neurosurgery
researchProduct

The determinants affecting on the investment proposals adoption

2016

Tietoturvallisuuden tutkimuksessa ei ole kyetty tunnistamaan tekijöitä, jotka vaikuttavat tietoturvallisuusaloitteiden onnistumiseen. Teoreettinen tutkimus lähestyy haastetta tarkastelemalla olemassa olevia tietotekniikan ja tietojärjestelmien tutkimusta yritysympäristössä. Aloitteiden hyväksymiseen vaikuttavat tekijät määritettiin kolmeksi kategoriaksi. Tietoturvallisuusaloitteisiin vaikuttavien tekijöiden tunnistamisen ohella tutkimusmenetelmän vaikutus tuloksiin on käsitelty. Useita suosituksia ilmiön jatkotutkimukselle sekä tutkimusmenetelmän kehittämiselle on esitetty. Information security field lacks of understanding of how to succeed with in-vestments proposals. This theoretical stud…

information systeminformation technologyinformation securityKirjallisuuskatsausinvestment proposalstheoretical researchsystematic literature reviewTeoreettinen tutkimustietoturvatietotekniikkaadoptioninvestoinnittietojärjestelmät
researchProduct

IT Negotiators : What’s your approach?

2017

The IT and software industries appear to be collaborative in projects in house and among organizations as they plan and negotiate for mutual benefit. Yet individual negotiators do not always proceed with the same thought patterns or even with success. This article sheds some light on how skilled, aware negotiators can better match up their thinking to avoid communication and process failures. The research behind this article shows that those with greater decision making authority and experience have more ways of thinking about negotiation than others. nonPeerReviewed

information technology industryneuvottelutnegotiatorsohjelmistoteollisuus
researchProduct

Knowledge mining of unstructured information: application to cyber domain

2023

Funding Information: TT, KB, ML and KK acknowledge research project funding from Cyberwatch Finland. AC is the CEO of the company. PJ and AC are founders and partners in the company. KK and ML are on the advisory board of the company. Funding Information: TT, KB, ML and KK acknowledge research project funding from Cyberwatch Finland. TT acknowledges funding from the Vilho, Yrjö and Kalle Väisälä Foundation of the Finnish Academy of Science and Letters. Publisher Copyright: © 2023, The Author(s). Information on cyber-related crimes, incidents, and conflicts is abundantly available in numerous open online sources. However, processing large volumes and streams of data is a challenging task for…

information technologylaskennallinen tiedecomputational sciencecomputer sciencetietojenkäsittelytieteettietotekniikka
researchProduct

eHealth Services and Technology : Challenges for Co-Development

2007

The promises of ICT have been poorly redeemed in health care; many projects have failed. This article conceptualizes the co-construction of services and technologies in order to help future practitioners in the field to understand and find solutions to the challenges in ICT-enhanced service change. The conceptualization is created by structuring the findings of a case study with the help of theoretical concepts. The conceptualization then is implemented in another case to study its potential for finding challenges and suggesting solutions. Both cases demonstrate challenges for codevelopment that contributed to poor project outcomes. Participants in eHealth projects need a better understandi…

information technologyorganizational learningeHealthcodevelopment
researchProduct

IT-supported international outsourcing of software production

2002

information technologyoutsourcingdiffusion of innovationinternational software productioninternational outsourcingsubcontracting
researchProduct

Actual and Potential Pedagogical Use of Tablets in Schools

2013

This study reviews the potential of tablet technology for teaching and learning. In autumn 2012, we conducted a focused survey comprising quantitative and qualitative questions with Finnish teachers (N = 171, from 54 schools). We focused on perceived pedagogical opportunities and the actualized pedagogical potential of tablets at schools. The survey results indicate that the actual usefulness of tablets in schools was significantly less than what teachers perceived as the pedagogical potential. However, the results demonstrate the positive impact these devices are having on teaching and learning, as well as prompting changes in pedagogical perspectives. Teachers stated that tablets can dive…

innovative pedagogylcsh:T58.5-58.64Social Psychologylcsh:Information technology4. EducationCommunicationTeaching methodtablets05 social sciences050301 educationSurvey resultmobile learningHuman-Computer InteractionInformation and Communications TechnologyICTPedagogyComputingMilieux_COMPUTERSANDEDUCATION0501 psychology and cognitive sciencessustaining practicesPsychology0503 educationIndependent learning050107 human factorsstudent-centered educationHuman Technology: An Interdisciplinary Journal on Humans in ICT Environments
researchProduct

Building sustainable contextual ambidexterity through routines: a case study from information technology firms

2020

The purpose of this paper is to explain the role that routines play in achieving sustainable organisational ambidexterity in information technology (IT) firms. Our exploratory analysis of four case studies reveals the key importance of routines in setting the context for sustainable ambidexterity. Companies build up contextual ambidexterity through routines derived from normalization of processes, normalization of skills, and normalization of results. The findings of the study show that routines support IT professionals to decide whether to exploit or explore in each particular case. Firstly, the enabling character of explicit routines as a result of the normalisation of work processes and …

it firmsKnowledge managementComputer scienceGeography Planning and DevelopmentTJ807-830Management Monitoring Policy and LawTD194-195exploration:CIENCIAS ECONÓMICAS [UNESCO]Renewable energy sources0502 economics and businesscapabilitiesGE1-350AmbidexterityEnvironmental effects of industries and plantsRenewable Energy Sustainability and the Environmentbusiness.industry05 social sciencesInformation technologyUNESCO::CIENCIAS ECONÓMICASBuilding and ConstructionambidexterityEnvironmental sciences050211 marketingbusinessroutines050203 business & managementexploitation
researchProduct

Systemic Management of Architectural Decisions in Enterprise Architecture Planning. Four Dimensions and Three Abstraction Levels

2006

This paper presents a process model for the management of architectural decisions in enterprise architecture planning. First, decisions are made at the enterprise level, with strategic business considerations on the enterprise information, systems and technology strategy and governance issues. The next step is to define the domains, to then go on with domain architecture decisions. At the systems level, the enterprise and domain architecture decisions are collected and converted into architecture descriptions accurate in precision, form and detail to be given as input to the information systems development process, following the architectural planning. The model is derived from previous wor…

järjestelmäarkkitehtuuriEnterprise architecture frameworkProcess managementEA projectArchitecture domainComputer sciencepäätöksentekoyritysstrategiatSolution architecturearchitecture decisionsEnterprise integrationEnterprise architectureFunctional software architectureEnterprise systemEnterprise architecture managementEnterprise life cyclearchitecture managementBusiness architectureInformation systemEnterprise information systemView modelNIST Enterprise Architecture ModelProject managementEnterprise resource planningEnterprise planning systemStrategic planningEnterprise systems engineeringbusiness.industryCorporate governanceTechnology strategyInformation technologyEnterprise information security architectureService-oriented modelingTechnology managementApplications architecturearchitecture processArchitectural planData architecturekokonaisarkkitehtuuribusinessEnterprise softwareProceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)
researchProduct