Search results for "Public"
showing 10 items of 12516 documents
L’OUTIL ET L’ETHOS
2015
On hésite à formuler cette évidence : le monde des organisations, en général, des marques, en particulier, constitue un univers permanent de signes et de sens, à la fois naturalisé et complexe. Rien d'étonnant, donc, à concevoir, dans le sillage exemplaire de Jean-‐Marie Floch (1990), les relations logiques et partant, épistémologiques, entre sémiotique, marketing et communication, pour appréhender marques et organisations. Pour autant, à remonter aux sources, ces relations de solidarité ont connu un parcours au ralenti, parfois contrarié, souvent négligé, au profit d'autres champs d'application, de la sémiotique aux organisations, ou d'autres approches, de la communication des organisatio…
Employees’ adherence to information security policies: An exploratory field study
2014
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…
Citizens' Communication Habits and Use of ICTs During Crises and Emergencies
2014
In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…
Replacing Project Managers in Information Technology Projects
2015
According to anecdotal evidence, project managers working on information technology (IT) projects are occasionally replaced, although the literature on information systems (IS) and project management (PM) makes little mention of it. With a view to narrowing this knowledge gap the authors examined the reasons behind the practice. The authors took an interpretive approach to the data gathering and analysis, and collected descriptions about replacing project managers (RPM) from interviews and questionnaires (n=43). The concept of contradiction served as a lens through which to identify the underlying reasons. Contradiction refers to statements asserting or expressing the opposite of another st…
Collaborative EA Information Elicitation Method : The IEM for Business Architecture
2015
This study contributes to the enterprise architecture (EA) methodologies by suggesting a method for eliciting architecture requirements: gathering both the current architecture information, and the development needs and requirements for the business architecture (BA) dimension in EA planning. Most of all EA dimensions, the developing of the BA requires collaboration with various non-IT stakeholders. It presents thus challenges to the IT department, or the consultancy involved in EA related efforts. The contribution of the various stakeholder groups as informants is, however, crucial to well founded EA design decisions. The suggested method takes related IS development fields as starting poi…
Learnings from the Finnish Game Industry
2016
The motivation behind our research was the rapid growth and business wins of world-class Finnish game companies, like Supercell, as well as the success of other game companies in Finland. In particular, Supercell's growth is something that has not been heard of before and this raised the interest to research what game companies have been doing right. Supercell is not the only Finnish success. Rovio is also well known and has the roots for success from few years before. There are also other game companies in Finland that have succeeded and this motivated us to investigate what is happening behind the game industry and what could be learned from there that could be applied to other software i…
How and Why to Start and Run a SIGCHI Local Chapter
2015
There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.
Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies
2016
In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…
Internet Adoption at the User Level: Empirical Evidence from The Gambia
2014
The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…
The Reform of Vocational Education and Training in Finland: Insights from Twitter
2018
This paper aims to analyse and describe relationships and communication in Twitter in relation to vocational education and training reform in Finland. Data were collected during the early implementation phase of the reform from January 2018 to early June 2018. The data included 2400 tweets containing the hashtag #amisreformi (VET reform). Social network analysis was utilised to study the network and communities. The main themes of the tweets were analysed using thematic analysis, and automated sentiment analysis was used to examine the tones of the tweets and public opinion. The study showed that the official actors were central influencers in the network that lacked connectivity. Overall, …