Search results for "Network"
showing 10 items of 7718 documents
Applying the Capabilities Approach to Ecosystems
2017
The capabilities approach has attracted broad interest in environmental ethics. One very interesting application is the environmental or extended capabilities approach which promotes the notion of environmental capabilities that contribute to the flourishing of non-human beings and ecological systems. The approach however lacks any account of the capabilities of ecological systems. This essay applies the environmental capabilities approach at the ecosystem level and examines how the flourishing of an ecosystem can be understood in terms of capabilities. Ecosystem flourishing presumes the ability of a given system to maintain its characteristic functions, diversity and quality, and do so eve…
Book review: Proenza, F. J. (Ed.). (2015). Public Access ICT Across Cultures: Diversifying Participation in the Network Society
2017
Consumer adoption of mobile technologies: a literature review
2015
Although the total number of mobile subscriptions reached 6.8 billion worldwide (ITU, 2013) confirming in the process that mobile technology is widespread, academic literature has so far focused only on explaining adoption of mobile technology and services. This literature review analyses 67 studies from the period 2005-2013 and finds the following: a) most studies are quantitative in nature and come from Asia; b) the Technology Acceptance Model is the most used theory; c) future research should also utilise qualitative methods and examine the behavioural outcomes of mobile adoption instead of simply adoption in consumer markets. peerReviewed
Higher Education of Digitalized Accounting Benefits from Networked Cooperative Learning and Working Life Collaboration
2022
Cooperative learning is a structured way of small group working. The key elements are positive interdependence, individual accountability, promotive interaction, social skills and group processing. In this study, we create a new approach of networked cooperative learning, and examine how it contributes to the learning of digitalized accounting in real-life problem-solving cases. The interaction between digitalized accounting and cooperative learning has not been studied before. The data consist of qualitative and quantitative data. The qualitative data were gathered from group work, where accounting firms, their customers and students as well as teachers from two educational institutes work…
A bibliometric approach to finding fields that co-evolved with information technology
2020
Among the declining industries, for example music industry, some have been revived by information technology (IT). At the same time, in academic fields, some have expected co-evolutions between IT and other fields to cause the resurgence of either field. In this research, the clustering of citation networks with 14,438 academic papers resulted in the identification of 28 academic fields in the areas “Computer Science” or “Information Science and Library Science.” Co-evolutions between these 28 fields and citing fields to the 28 fields were evaluated by an investigation of contents; a methodology to search co-evolutions was also proposed. This paper proposes that pairs of academic fields (wi…
Structural Dynamics of Interfirm Knowledge Networks
2016
In this chapter, we investigate the drivers of interfirm network structural dynamics and their influence on knowledge creation and diffusion processes that occur in such networks over time. Interfirm knowledge networks are complex webs of linkages connecting a variety of idiosyncratic firms within and across industries. Aimed to contribute to answer the recent calls for a more dynamic and multilevel view to understand network structures and processes, we leverage the complex network research to formulate a multilevel theoretical framework that clarifies the structural dynamics and knowledge creation and diffusion potential of interfirm networks.
Communication of SJSC Riga International Airport on social networks "Facebook" and "Instagram" during the spread of covid-19
2022
Bakalaura darba “VAS starptautiskās lidostas “Rīga” komunikācija sociālajos tīklos “Facebook” un “Instagram” covid-19 izplatības laikā” mērķis ir noskaidrot VAS starptautiskās lidostas “Rīga” komunikāciju sociālajos tīklos “Facebook” un “Instagram” laikā, kad covid-19 pandēmijas dēļ tika ierobežota aviosatiksme. Darba teorētiskajā daļā tiek apskatīti tādi jēdzieni kā komunikācija, sociālie tīkli un sociālie mediji, sociālo tīklu platforma “Facebook”, sociālo tīklu platforma “Instagram”, mārketinga komunikācija sociālajos tīklos. Bakalaura darba pētījuma veikšanai tika izmantotas trīs pētniecības metodes: kontentanalīze, interneta aptauja, daļēji strukturēta intervija. Darbā iegūtie secināju…
On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples
2022
The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In …
Anomaly detection in wireless sensor networks
2016
Wireless Sensor Network can be defined as a network of integrated sensors responsible for environmental sensing, data processing and communication with other sensors and the base station while consuming low power. Today, WSNs are being used in almost every part of life. The cost effective nature of WSNs is beneficial for environmental monitoring, production facilities and security monitoring. At the same time WSNs are vulnerable to security breaches, attacks and information leakage. Anomaly detection techniques are used to detect such activities over the network that do not conform to the normal behavior of the network communication. Supervised Machine learning approach is one way to detect…