Search results for "information system"

showing 10 items of 2404 documents

Perceived value of advanced mobile messaging services: A cross-cultural comparison of Greek and Spanish users

2017

PurposeThe purpose of this paper is to analyse the role of perceived value on post-acceptance behaviour for users of advanced mobile messaging services (AMMS). The paper also compares differences in the influence of perceived value on satisfaction and of satisfaction on loyalty to AMMS in Spain and Greece, to test the moderating effect of culture.Design/methodology/approachPartial least squares path modelling is used to test the model. Perceived value is modelled as a multidimensional reflective construct with four dimensions. Culture is studied at a national level. Differences between countries are tested using the multigroup analysis approach proposed by Henseleret al.(2009).FindingsPerce…

Uncertainty avoidancemedia_common.quotation_subject05 social sciencesLibrary and Information SciencesCross-cultural studiesComputer Science ApplicationsTest (assessment)Mobile phoneOrder (business)0502 economics and businessLoyalty050211 marketingPsychologyConstruct (philosophy)Social psychologyValue (mathematics)050203 business & managementInformation Systemsmedia_common
researchProduct

Najnowsze technologie i zarządzanie granicami zewnętrznymi Unii Europejskiej

2020

Artykuł koncentruje się na normatywnym, instytucjonalnym i operacyjnym projekcie Unii Europejskiej jako obszarze, w którym znaczna część bezpieczeństwa wewnętrznego jest zapewniana właśnie przez najnowsze technologie i wielkoskalowe systemy informacyjne. Następnie przechodzi się do analizy wyzwań prawnych wynikających z tworzenia systemu tzw. inteligentnych granic (ang. smart borders), tj. granic opartych na zautomatyzowanej kontroli granicznej oraz interoperacyjności wszystkich wielkoskalowych systemów informatycznych. W artykule stawia się dwa zasadnicze pytania badawcze. Po pierwsze, jak te nowe zjawiska wpływają na skuteczne zarządzanie granicami zewnętrznymi w UE? Po drugie, czy istnie…

Unia Europejskaintegrated management of external bordersinteroperacyjnośćsmart borderszintegrowane zarządzanie granicami zewnętrznymiinteroperabilityEuropean Unionnew technologiesinteligentne granicelarge-scale information systemsnowe technologiewielkoskalowe systemy informacyjneKrytyka prawa.Niezależne studia nad prawem
researchProduct

Interoperacyjność unijnych systemów informacyjnych w zakresie bezpieczeństwa, ochrony granic i zarządzania migracjami

2019

Unia Europejskaprzestrzeń wolnościochrona granic zewnętrznychsystemy informacyjneinteroperacyjnośćarea of freedomsecurity and justiceInformation systemsprotection of external bordersinteroperabilityEuropean Unionbezpieczeństwa i sprawiedliwościKWARTALNIK KOLEGIUM EKONOMICZNO-SPOŁECZNEGO STUDIA I PRACE
researchProduct

Automatic Reengineering in MDA Using Rewriting Logic as Transformation Engine

2005

Legacy systems are information systems that have been developed by means of methods, tools and database management systems that have become obsolete, but they are still being used due to their reliability. As time goes on, the maintenance of this software becomes more complex, expensive and painful. The MOMENT framework supports automatic formal model transformations in MDA. This model transformation approach is based on the algebraic specification of models and benefits from mature term rewriting system technology to perform model transformation using rewriting logic. In this paper, we present how we apply this formal transformation mechanism to recover a legacy relational database, obtain…

Unified Modeling LanguageComputer scienceRelational databaseProgramming languageModel transformationLegacy systemInformation systemAlgebraic specificationSoftware maintenanceRewritingcomputer.software_genrecomputercomputer.programming_languageNinth European Conference on Software Maintenance and Reengineering
researchProduct

Intruder Pattern Identification

2008

This paper considers the problem of intrusion detection in information systems as a classification problem. In particular the case of masquerader is treated. This kind of intrusion is one of the more difficult to discover because it may attack already open user sessions. Moreover, this problem is complex because of the large variability of user models and the lack of available data for the learning purpose. Here, flexible and robust similarity measures, suitable also for non-numeric data, are defined, they will be incorporated on a one-class training K N N and compared with several classification methods proposed in the literature using the Masquerading User Data set (www.schonlau.net) repr…

UnixSimilarity (geometry)Settore INF/01 - Informaticabusiness.industryComputer scienceIntrusion detection systemSimilarity measurecomputer.software_genreMachine learningPattern identificationData setIntrusionOne class calssifier Masquerader detection Intrusion detection systemsInformation systemData miningArtificial intelligencebusinesscomputer
researchProduct

Contingent reward leader behaviour: Where does it come from?

2010

As many academics have pointed out, while researchers have learned a great deal about the effects of contingent reward (CR) leader behaviour, relatively little is known about its genesis. CR transactional leadership is traditionally viewed as an independent variable which exerts influence downstream. However, if we are to understand how to influence, improve or modify these downstream effects, we need to shift our focus upstream towards the study of transactional leadership as a dependent variable. In line with this reasoning, we put forward the hypothesis that a contextual variable (organizational learning capability) and a subordinate's characteristic (employability) are antecedents of CR…

Upstream (petroleum industry)Information Systems and ManagementVariablesbusiness.industryStrategy and Managementmedia_common.quotation_subjectGeneral Social SciencesSample (statistics)EmployabilityTransactional leadershipContextual variableOrganizational learningbusinessPsychologySocial psychologyDownstream (petroleum industry)media_commonSystems Research and Behavioral Science
researchProduct

How value and trust influence loyalty in wireless telecommunications industry

2012

Despite making significant investments in enhancing the customer service experience, long-term customer loyalty remains an elusive dream for many service providers. Particularly in the telecommunications industry, switching providers even from within continuous contract relationships is easy and companies struggle to retain their customers. Trust and value are considered cornerstones of long-term relationships, so it is perhaps surprising that previous research on how relationship age and usage level actually affect value, trust and loyalty is inconclusive. The current research is set in the telecommunications services field and draws on a large-scale survey undertaken in Finland. The findi…

Usage levellojaaliusEconomics and Econometricsmedia_common.quotation_subjectTelecommunications serviceLibrary and Information SciencesManagement Monitoring Policy and LawkäyttöAffect (psychology)Management Information SystemsLoyalty business modelPerceived valueLoyaltyWireless servicesMarketingSet (psychology)ta512uskollisuusmedia_commonbusiness.industryCommunicationService providerKoettu arvolangattomat palvelutluottamusValue (economics)Relationship ageMobile telephonyasiakassuhteen kestobusinessInformation SystemsTelecommunications Policy
researchProduct

Latent Class Approach to Estimate the Willingness to Pay for Transit User Information

2012

The aim of analysis is to understand how unreliable information influences user behaviour and how much it discourages public transport use. For this purpose, a Stated Preference Survey was carried out in order to know the preferences of public transport users relating to information needs and uncertainty on the information provided by Advanced Traveller Information System (ATIS). The perceived uncertainty is defined as information inaccuracy. In our study, we consider- ed the difference between forecasted or scheduled waiting time at the bus stop and/or metro station provided by ATIS, and that experienced by user, to catch the bus and/or metro. A questionnaire was submitted to an appropriat…

User informationeducation.field_of_studyLatent Class ModelOperations researchbusiness.industryPopulationUncertaintySample (statistics)Information needsLatent class modelPreference HeterogeneitySettore ICAR/05 - TrasportiWillingness to payPublic transportEconomicsInformation systemWillingness to PayPerceived InformationMarketingbusinesseducationJournal of Transportation Technologies
researchProduct

A new project management approach for R&D software projects in the automotive industry - continuous V-model

2017

Most current work activities in R&D centres are innovative and dynamic, with project management acting as the discipline that governs them. The improvement of PM methods has become a necessity due to the following main factors: classical methodologies are increasingly difficult to apply, cutbacks in project duration are requested by organisations and customers, demands for product quality are continuously expanding. The paper examines how PM concepts are used in developed R&D projects, based on the V-model approach. It also introduces an enhanced new approach called Continuous V-model - CVM, based on agile concepts. The model has been applied on a real automotive R&D project and the resulte…

V-ModelComputer Networks and Communicationsbusiness.industryComputer science05 social sciences0211 other engineering and technologies02 engineering and technologyManufacturing engineeringProject planningHardware and Architecture021105 building & construction0502 economics and businessPerformance indicatorProject managementProject portfolio managementbusinessSoftware engineering050203 business & managementSoftware project managementInformation SystemsAgile software developmentProject management triangleInternational Journal of Web Engineering and Technology
researchProduct

APPLICATION OF ADAPTIVE WAVELET NETWORKS FOR VIBRATION CONTROL OF BASE ISOLATED STRUCTURES

2010

Accepted version of an article from the journal: International Journal of Wavelets, Multiresolution & Information Processing. Official version article published as International Journal of Wavelets, Multiresolution & Information Processing, 2010 8(5), 773-791. doi: 10.1142/s0219691310003778 © World Scientific Publishing Company http:// http://www.worldscinet.com/ijwmip/ This paper presents an application of wavelet networks (WNs) in identification and control design for a class of structures equipped with a type of semiactive actuators, which are called magnetorheological (MR) dampers. The nonlinear model is identified based on a WN framework. Based on the technique of feedback linearizatio…

VDP::Mathematics and natural science: 400::Mathematics: 410::Applied mathematics: 413Information retrievalComputer scienceApplied MathematicsVDP::Technology: 500::Mechanical engineering: 570Vibration controlSystem identificationInformation processingBase (topology)Adaptive waveletWaveletControl theorySignal ProcessingScientific publishingInformation SystemsInternational Journal of Wavelets, Multiresolution and Information Processing
researchProduct