Search results for "RELATION"

showing 10 items of 10542 documents

Systematic conformational search analysis of the SRR and RRR epimers of 7-hydroxymatairesinol

2010

An extensive and systematic conformational search was performed on the two epimers of the natural lignan 7-hydroxymatairesinol (HMR), by means of a home-made Systematic Conformational Search Analysis (SCSA) code, designed to select more and more stable conformers through sequential geometry optimization of trial structures at increasing levels of calculation theory. In the present case, the starting molecular structures were selected by the semi-empirical AM1 method and filtered – i.e. decreased in number by choosing the more stable species – on the basis of their energy calculated by the HF method and the 6-31G(d) basis set. The geometries obtained were further refined by performing densit…

systematic conformational search analysiSettore CHIM/03 - Chimica Generale E Inorganica7-hydroxymatairesinol quantum chemical studyDFT calculationstructure–reactivity relationship
researchProduct

Employees’ adherence to information security policies: An exploratory field study

2014

The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from the Protection Motivation Theory, the Theory of Reasoned Action, and the Cognitive Evaluation Theory. We validated the model by using a sample of 669 responses from four corporations in Finland. The SEM-based results showed that perceived severity of potential information security threats, employees' belief as to whether they can apply and adhere to information security policies, perceived vulnerability to potential security threats, employees…

ta113Cognitive evaluation theoryInformation Systems and Managementbusiness.industryInformation securityPublic relationsSecurity policyManagement Information SystemsThreatTheory of reasoned actionInformation security managementInformation security standardsSecurity managementBusinessMarketingInformation SystemsInformation & Management
researchProduct

Citizens' Communication Habits and Use of ICTs During Crises and Emergencies

2014

In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…

ta113Community resilienceKnowledge managementSocial PsychologyEmergency managementlcsh:T58.5-58.64business.industrylcsh:Information technologyCommunicationInformation sharingInformation technologyPublic relationsFocus groupHuman-Computer Interactionemergency communicationInformation and Communications TechnologyICTPolitical sciencePublic participationSocial mediacitizen participationta518businessinformation and communication technologyHuman Technology
researchProduct

A novel heuristic memetic clustering algorithm

2013

In this paper we introduce a novel clustering algorithm based on the Memetic Algorithm meta-heuristic wherein clusters are iteratively evolved using a novel single operator employing a combination of heuristics. Several heuristics are described and employed for the three types of selections used in the operator. The algorithm was exhaustively tested on three benchmark problems and compared to a classical clustering algorithm (k-Medoids) using the same performance metrics. The results show that our clustering algorithm consistently provides better clustering solutions with less computational effort.

ta113Determining the number of clusters in a data setBiclusteringClustering high-dimensional dataDBSCANComputingMethodologies_PATTERNRECOGNITIONTheoretical computer scienceCURE data clustering algorithmCorrelation clusteringCanopy clustering algorithmCluster analysisAlgorithmMathematics2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)
researchProduct

Replacing Project Managers in Information Technology Projects

2015

According to anecdotal evidence, project managers working on information technology (IT) projects are occasionally replaced, although the literature on information systems (IS) and project management (PM) makes little mention of it. With a view to narrowing this knowledge gap the authors examined the reasons behind the practice. The authors took an interpretive approach to the data gathering and analysis, and collected descriptions about replacing project managers (RPM) from interviews and questionnaires (n=43). The concept of contradiction served as a lens through which to identify the underlying reasons. Contradiction refers to statements asserting or expressing the opposite of another st…

ta113EngineeringKnowledge managementData collectionbusiness.industryIT project managementmedia_common.quotation_subjectContradictionsReplacementProject managerInformation technologyContext (language use)Public relationsTurnoverManagement of Technology and InnovationPhenomenonComputer Science (miscellaneous)Information systemContradictionProject managementbusinessta512Anecdotal evidencemedia_commonInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Learnings from the Finnish Game Industry

2016

The motivation behind our research was the rapid growth and business wins of world-class Finnish game companies, like Supercell, as well as the success of other game companies in Finland. In particular, Supercell's growth is something that has not been heard of before and this raised the interest to research what game companies have been doing right. Supercell is not the only Finnish success. Rovio is also well known and has the roots for success from few years before. There are also other game companies in Finland that have succeeded and this motivated us to investigate what is happening behind the game industry and what could be learned from there that could be applied to other software i…

ta113Engineeringgame industry040301 veterinary sciencesbusiness.industryStar (game theory)0402 animal and dairy scienceContext (language use)Advertising04 agricultural and veterinary sciencesPublic relations040201 dairy & animal scienceMountain sheepNewspaper0403 veterinary scienceEntertainmentcvg.developerOrder (exchange)NarrativecvgGame DeveloperbusinessFinland
researchProduct

A modelling framework for social media monitoring

2013

This paper describes a hierarchical, three-level modelling framework for monitoring social media. Immediate social reality is modelled through the first level of the models. They represent various virtual communities at social media sites and adhere to the social world models of the sites, i.e., the "site ontologies". The second-level model is a temporal multirelational graph that captures the static and dynamic properties of the first-level models from the perspective of the monitoring site. The third-level model consists of a temporal relational database scheme that models the temporal multirelational graph within the database. The models are specified and instantiated at the monitoring s…

ta113Graph databaseComputer Networks and Communicationsbusiness.industryComputer scienceRelational databaseSocial realitySchematiccomputer.software_genreTemporal databaseHardware and ArchitectureGraph (abstract data type)The InternetSocial mediaData miningbusinesscomputerInformation SystemsInternational Journal of Web Engineering and Technology
researchProduct

A Generic Architecture for a Social Network Monitoring and Analysis System

2011

This paper describes the architecture and a partial implementation of a system designed for the monitoring and analysis of communities at social media sites. The main contribution of the paper is a novel system architecture that facilitates long-term monitoring of diverse social networks existing and emerging at various social media sites. It consists of three main modules, the crawler, the repository and the analyzer. The first module can be adapted to crawl different sites based on ontology describing the structure of the site. The repository stores the crawled and analyzed persistent data using efficient data structures. It can be implemented using special purpose graph databases and/or …

ta113Graph databaseDatabaseRelational databaseComputer scienceSystems architectureGraph (abstract data type)Persistent data structureOntology (information science)computer.software_genreSoftware architectureData structurecomputer2011 14th International Conference on Network-Based Information Systems
researchProduct

How and Why to Start and Run a SIGCHI Local Chapter

2015

There is a vast and increasing interest towards local HCI communities around the globe and in particular on geographical areas in which HCI has only recently started to gain increasing interest by local industries as well as academic institutions. A SIGCHI Local Chapter is one of the ways a local HCI community can organize and get visibility and support for their activities. However, many active volunteers in this field might not be aware of this possibility. The main goal of the Chapters' SIG in CHI'15 is to inform interested parties of SIGCHI Local Chapters and to find ways in which SIGCHI could better support local HCI communities with their various needs all over the world.

ta113Human-Computer Interaction (HCI)ComputingMilieux_THECOMPUTINGPROFESSIONMultimediabusiness.industryField (Bourdieu)local communitiesVisibility (geometry)GlobePublic relationsSpecial Interest Groupcomputer.software_genreLocal communityspecial interest groupsInformationSystems_MODELSANDPRINCIPLESmedicine.anatomical_structurePolitical sciencemedicineInformationSystems_MISCELLANEOUSbusinesscomputerProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems
researchProduct

Co-evolution between Trust in Teachers and Higher Education Enabled by ICT Advancement – A Suggestion to ICT Growing Economies

2016

In light of the increasing significance of trust-based higher education towards digitally-rich learning environments, co-evolution dynamism between trust in teachers and higher education enabled by ICT advancement was analyzed. Using the rate of trust in teachers for good education in the Global Teacher Status Index, together with statistics on higher education level and ICT advancement, an empirical numerical analysis of 20 countries was attempted. It was identified that while ICT advanced countries have constructed a co-evolution between ICT, higher education and trust, ICT growing countries have not succeeded due to a vicious cycle between ICT and trust. Finland’s educational success can…

ta113Index (economics)Knowledge managementHigher educationbusiness.industrysulautuva opetusblended learningPublic relationseducational productivity paradoxlogistic growthBlended learningtrust in teachersInformation and Communications TechnologyPolitical scienceProductivity paradoxComputingMilieux_COMPUTERSANDEDUCATIONta516pedagogical loveDynamismDisengagement theorybusinessJournal of Technology Management for Growing Economies
researchProduct