Search results for "Public"

showing 10 items of 12516 documents

L’OUTIL ET L’ETHOS

2015

On hésite à formuler cette évidence : le monde des organisations, en général, des marques, en particulier, constitue un univers permanent de signes et de sens, à la fois naturalisé et complexe. Rien d'étonnant, donc, à concevoir, dans le sillage exemplaire de Jean-­‐Marie Floch (1990), les relations logiques et partant, épistémologiques, entre sémiotique, marketing et communication, pour appréhender marques et organisations. Pour autant, à remonter aux sources, ces relations de solidarité ont connu un parcours au ralenti, parfois contrarié, souvent négligé, au profit d'autres champs d'application, de la sémiotique aux organisations, ou d'autres approches, de la communication des organisatio…

sémiotique publicitairesémiotique appliquéeexpertiseformations en sémiotiquesémiotique en entreprise[SHS.INFO] Humanities and Social Sciences/Library and information sciences
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

Citizens' Communication Habits and Use of ICTs During Crises and Emergencies

2014

In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…

ta113Community resilienceKnowledge managementSocial PsychologyEmergency managementlcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationInformation sharingInformation technologyPublic relationsFocus groupHuman-Computer Interactionemergency communicationInformation and Communications TechnologyICTPolitical sciencePublic participationSocial mediacitizen participationta518businessinformation and communication technologyHuman Technology
researchProduct

Replacing Project Managers in Information Technology Projects

2015

According to anecdotal evidence, project managers working on information technology (IT) projects are occasionally replaced, although the literature on information systems (IS) and project management (PM) makes little mention of it. With a view to narrowing this knowledge gap the authors examined the reasons behind the practice. The authors took an interpretive approach to the data gathering and analysis, and collected descriptions about replacing project managers (RPM) from interviews and questionnaires (n=43). The concept of contradiction served as a lens through which to identify the underlying reasons. Contradiction refers to statements asserting or expressing the opposite of another st…

ta113EngineeringKnowledge managementData collectionbusiness.industryIT project managementmedia_common.quotation_subjectContradictionsReplacementProject managerInformation technologyContext (language use)Public relationsTurnoverManagement of Technology and InnovationPhenomenonComputer Science (miscellaneous)Information systemContradictionProject managementbusinessta512Anecdotal evidencemedia_commonInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Collaborative EA Information Elicitation Method : The IEM for Business Architecture

2015

This study contributes to the enterprise architecture (EA) methodologies by suggesting a method for eliciting architecture requirements: gathering both the current architecture information, and the development needs and requirements for the business architecture (BA) dimension in EA planning. Most of all EA dimensions, the developing of the BA requires collaboration with various non-IT stakeholders. It presents thus challenges to the IT department, or the consultancy involved in EA related efforts. The contribution of the various stakeholder groups as informants is, however, crucial to well founded EA design decisions. The suggested method takes related IS development fields as starting poi…

ta113EngineeringKnowledge managementRequirements engineeringbusiness.industryrequirements elicitationComputingMethodologies_MISCELLANEOUSStakeholderEnterprise architectureInformation technologyRequirements elicitationpublic administrationBusiness process modelingKnowledge acquisitionmethodsmenetelmätenterprise architectureBusiness architecturejulkinen hallintokokonaisarkkitehtuuribusiness
researchProduct

Learnings from the Finnish Game Industry

2016

The motivation behind our research was the rapid growth and business wins of world-class Finnish game companies, like Supercell, as well as the success of other game companies in Finland. In particular, Supercell's growth is something that has not been heard of before and this raised the interest to research what game companies have been doing right. Supercell is not the only Finnish success. Rovio is also well known and has the roots for success from few years before. There are also other game companies in Finland that have succeeded and this motivated us to investigate what is happening behind the game industry and what could be learned from there that could be applied to other software i…

ta113Engineeringgame industry040301 veterinary sciencesbusiness.industryStar (game theory)0402 animal and dairy scienceContext (language use)Advertising04 agricultural and veterinary sciencesPublic relations040201 dairy & animal scienceMountain sheepNewspaper0403 veterinary scienceEntertainmentcvg.developerOrder (exchange)NarrativecvgGame DeveloperbusinessFinland
researchProduct

How and Why to Start and Run a SIGCHI Local Chapter

2015

There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.

ta113Human-Computer Interaction (HCI)ComputingMilieux_THECOMPUTINGPROFESSIONMultimediabusiness.industryField (Bourdieu)local communitiesVisibility (geometry)GlobePublic relationsSpecial Interest Groupcomputer.software_genreLocal communityspecial interest groupsInformationSystems_MODELSANDPRINCIPLESmedicine.anatomical_structurePolitical sciencemedicineInformationSystems_MISCELLANEOUSbusinesscomputerProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
researchProduct

Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies

2016

In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…

ta113Index (economics)Knowledge managementHigher educationbusiness.industrysulautuva opetusblended learningPublic relationseducational productivity paradoxlogistic growthBlended learningtrust in teachersInformation and Communications TechnologyPolitical scienceProductivity paradoxComputingMilieux_COMPUTERSANDEDUCATIONta516pedagogical loveDynamismDisengagement theorybusinessJournal of Technology Management for Growing Economies
researchProduct

Internet Adoption at the User Level: Empirical Evidence from The Gambia

2014

The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…

ta113VariablesPublic Administrationbusiness.industrymedia_common.quotation_subjectDevelopmentUnified theory of acceptance and use of technologyComputer Science ApplicationsPyramidCase study researchThe InternetMarketingPsychologyEmpirical evidencebusinessmedia_commonInformation Technology for Development
researchProduct

The Reform of Vocational Education and Training in Finland: Insights from Twitter

2018

This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …

ta113ammatillinen koulutussocial mediaTwittervocational educationsosiaalinen mediayleinen mielipide113 Computer and information sciencesammattikoulutuspublic opinionuudistukset516 Educational sciencesreform
researchProduct