Search results for "information and communication technology"

showing 10 items of 345 documents

A Research Review on Building Information Modeling in Construction―An Area Ripe for IS Research

2012

Published version of article of an article in the journal: Communications of the Association for Information Systems. Also available from the publisher : http://http://aisel.aisnet.org/cais/vol31/iss1/10/ This article presents a review of the research on Building Information Modeling (BIM) in construction, with the aim of identifying areas in this domain where IS research can contribute. The concept of BIM comprises an infrastructure of IT tools supporting collaborative and integrated design, assembly, and operation of buildings. This integrated construction approach, with all stakeholders editing or retrieving information from commonly shared models, requires major changes to well-establis…

Construction managementEngineeringKnowledge managementbusiness.industryAssociation (object-oriented programming)It innovationVDP::Technology: 500::Information and communication technology: 550GeneralLiterature_MISCELLANEOUSPeer reviewBuilding information modelingInformation systemVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessInformation SystemsResearch review
researchProduct

A User-Centric Approach for Personalized Service Provisioning in Pervasive Environments

2011

Published version of an article published in Wireless Personal Communications (2011). Also available from the publisher at http://dx.doi.org/10.1007/s11277-011-0387-3 The vision of pervasive environments is being realized more than ever with the proliferation of services and computing resources located in our surrounding environments. Identifying those services that deserve the attention of the user is becoming an increasingly-challenging task. In this paper, we present an adaptive multi-criteria decision making mechanism for recommending relevant services to the mobile user. In this context, "Relevance" is determined based on a user-centric approach that combines both the reputation of the…

Context-aware pervasive systemsService (systems architecture)Pervasive computing service recommendation unobtrusive applicationsUbiquitous computingComputer sciencemedia_common.quotation_subjectVDP::Technology: 500::Information and communication technology: 550020206 networking & telecommunicationsContext (language use)02 engineering and technologyComputer Science ApplicationsTask (project management)World Wide Web0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRelevance (information retrieval)Electrical and Electronic EngineeringUser-centered designReputationmedia_commonWireless Personal Communications
researchProduct

Towards an integrated approach to emergency management: interdisciplinary challenges for research and practice

2015

This article presents an interdisciplinary vision for large-scale integrated emergency management that has been inspired by the transition from platform centric to integrated operations in the oil and gas fields, which uses remote emergency control centres collaborating virtually with local responders. The article discusses some of the most salient research challenges for integrated emergency management, including the role of mobile technology, human-centred sensing, citizen participation and social media, and the socio-cultural determinants of disaster management. The purpose of this article is to frame an integrated emergency management approach that adopts a multi-disciplinary approach, …

Cultural StudiesKnowledge managementsocial media0211 other engineering and technologieslcsh:A02 engineering and technologyemergency managementIntegrated operationsArts and Humanities (miscellaneous)020204 information systems0202 electrical engineering electronic engineering information engineeringInformation systemSocial mediaMobile technologyinformation and communication technologyComputingMilieux_MISCELLANEOUSvirtual collaboration021110 strategic defence & security studiesEmergency managementdisaster vulnerabilitybusiness.industryEnvironmental resource managementsmart phonesdisaster perceptionIntegrated OperationDevelopment studiesDisasterVirtual collaborationInformation and Communications Technology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Anthropologyad hoc networksintegrated operationslcsh:General Worksbusinesshuman-centred sensingCulture Unbound: Journal of Current Cultural Research
researchProduct

Trust-aware RBAC

2012

Published version of a chapter in the book: Computer Network Security. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-33704-8_9 In this paper we propose a trust-aware enhancement of RBAC (TA-RBAC) that takes trustworthiness of users into consideration explicitly before granting access. We assume that each role in the framework is associated with an expression that describe trustworthiness of subjects required to be able to activate the role, and each subject (user) has assigned trustworthiness level in the system. By adding trustworthiness constraints to roles we enhance system, for example, with more flexible ability to delegate roles, to control reading/updating…

DelegateTrustworthinessComputer scienceReading (process)media_common.quotation_subjectControl (management)Role-based access controlVDP::Technology: 500::Information and communication technology: 550Computer securitycomputer.software_genrecomputerExpression (mathematics)media_common
researchProduct

How Quickly Can We Predict Users’ Ratings on Aesthetic Evaluations of Websites? Employing Machine Learning on Eye-Tracking Data

2020

This study examines how quickly we can predict users’ ratings on visual aesthetics in terms of simplicity, diversity, colorfulness, craftsmanship. To predict users’ ratings, first we capture gaze behavior while looking at high, neutral, and low visually appealing websites, followed by a survey regarding user perceptions on visual aesthetics towards the same websites. We conduct an experiment with 23 experienced users in online shopping, capture gaze behavior and through employing machine learning we examine how fast we can accurately predict their ratings. The findings show that after 25 s we can predict ratings with an error rate ranging from 9% to 11% depending on which facet of visual ae…

DesignArtificial IntelligenceMachine learningAestheticsVDP::Technology: 500::Information and communication technology: 550E-commerceEye-trackingArticle
researchProduct

A formal proof of the ε-optimality of absorbing continuous pursuit algorithms using the theory of regular functions

2014

Published version of an article from the journal: Applied Intelligence. Also available on Springerlink: http://dx.doi.org/10.1007/s10489-014-0541-1 The most difficult part in the design and analysis of Learning Automata (LA) consists of the formal proofs of their convergence accuracies. The mathematical techniques used for the different families (Fixed Structure, Variable Structure, Discretized etc.) are quite distinct. Among the families of LA, Estimator Algorithms (EAs) are certainly the fastest, and within this family, the set of Pursuit algorithms have been considered to be the pioneering schemes. Informally, if the environment is stationary, their ε-optimality is defined as their abili…

Discrete mathematicsDiscretizationLearning automataAbsorbing CPAComputer scienceEstimatorMonotonic functionVDP::Technology: 500::Information and communication technology: 550Mathematical proofFormal proofCPAArbitrarily largeArtificial Intelligenceε-optimalityMartingale (probability theory)Pursuit algorithmsAlgorithm
researchProduct

A non-stationary MIMO vehicle-to-vehicle channel model based on the geometrical T-junction model

2009

©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Article also available from publisher: http://dx.doi.org/10.1109/WCSP.2009.5371438 In this paper, we derive a non-stationary multiple-input multiple-output (MIMO) vehicle-to-vehicle (V2V) channel model from the geometrical T-junction model. The propagation environment is assumed to be extremely non-isotropic. The proposed channel model takes into account double…

Distribution (mathematics)Computer scienceScatteringMIMOAutocorrelationTransmitterVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Function (mathematics)Communications systemTopologySimulationComputer Science::Information Theory
researchProduct

Fornøyd med litt men ønsker seg likevel mer : gir nye versjoner av EPJ-system i helse- og omsorgssektoren i kommunene kontinuerlig forbedring?

2016

Masteroppgave i helse- og sosialinformatikk- Universitetet i Agder, 2016 Continuous development in health- and care services leads to the electronic patient record (EPR) systems to become more complex. It is important for municipalities to have systems that work, and acts as a support for workflows of everyday life, so that information regarding the patients are easily accessible and accurate. It is therefore important that new versions of EPR systems are delivered with good quality. This study focuses on municipalities' challenges with developing, testing and implementing new versions of old EPR system in health- and caregiving services. A qualitative study is conductet, with interviews of…

EPJelektronisk pasientjournalHSI500VDP::Technology: 500::Information and communication technology: 550EPRElectronic Pasient Records
researchProduct

The Developmental Contribution From Mobile Phones Across the Agricultural Value Chain in Rural Africa

2011

Published version of an article from the journal: The Electronic Journal of Information Systems in Developing Countries. Also available fro the publisher: http://www.ejisdc.org/Ojs2/index.php/ejisdc/article/viewFile/849/377 The most widespread information and communication technology (ICT) in developing countries today is the mobile phone. The majority of people in the least developed countries still live in rural areas and their livelihood depends on the primary industries. This study investigates the use of mobile phones among farmers in rural Tanzania in order to supply empirical data on the developmental role of this technology. The results show that the improved access to communication…

Economic growthVDP::Social science: 200::Economics: 210Developing countryVDP::Technology: 500::Information and communication technology: 550LivelihoodVDP::Agriculture and fishery disciplines: 900::Agriculture disciplines: 910Mobile phoneInformation and Communications TechnologyPrimary sector of the economyAgricultural value chainBusinessRural areaInformation SystemsLeast Developed CountriesThe Electronic Journal of Information Systems in Developing Countries
researchProduct

Aggregate uncertainty and sectoral productivity growth: The role of credit constraints

2016

Abstract We show that an increase in aggregate uncertainty—measured by stock market volatility—reduces productivity growth more in industries that depend heavily on external finance. The mechanism at play is that during periods of high uncertainty, firms that are credit constrained switch the composition of investment by reducing productivity-enhancing investment—such as on ICT capital—which is more subject to liquidity risks (Aghion et al., 2010). The effect is larger during recessions, when financing constraints are more likely to be binding, than during expansions. Our statistical method—a difference-in-difference approach using productivity growth of 25 industries from 18 advanced econo…

Economics and Econometricsmedia_common.quotation_subjectMonetary economicsRecession0502 economics and businessEconomicsEconometrics050207 economicsTotal factor productivityProductivityGeneral Environmental Sciencemedia_commonInformation and communication technology investmentReverse causality050208 finance05 social sciencesInstrumental variableAggregate (data warehouse)UncertaintySettore SECS-P/02 Politica EconomicaOmitted-variable biasInvestment (macroeconomics)Fiscal policyMarket liquidityEconometric modelFinancial dependenceProductivity growthOutput gapGeneral Earth and Planetary SciencesStock marketFinance
researchProduct