Search results for "käyttäjät"
showing 10 items of 72 documents
Cost-efficiency assessments of marine monitoring methods lack rigor—a systematic mapping of literature and an end-user view on optimal cost-efficienc…
2021
Global deterioration of marine ecosystems, together with increasing pressure to use them, has created a demand for new, more efficient and cost-efficient monitoring tools that enable assessing changes in the status of marine ecosystems. However, demonstrating the cost-efficiency of a monitoring method is not straightforward as there are no generally applicable guidelines. Our study provides a systematic literature mapping of methods and criteria that have been proposed or used since the year 2000 to evaluate the cost-efficiency of marine monitoring methods. We aimed to investigate these methods but discovered that examples of actual cost-efficiency assessments in literature were rare, contr…
Utilizing User Stories to Bring AI Ethics into Practice in Software Engineering
2022
AI ethics is a research area characterized by a prominent gap between research and practice. With most studies in the area being conceptual in nature or focused on technical ML (Machine Learning) solutions, the link between AI (Artificial Intelligence) ethics and SE (Software Engineering) practice remains thin. Establishing this link, we argue, is vital going forward. While conceptual discussion is required to define AI ethics, much progress has already been made in this regard. Similarly, though technical ML solutions are also required for practical implementation, ML systems are ultimately still software, and thus SE cannot be forgotten. In this paper, we propose one way of bringing AI et…
A tale of two frames : Exploring the role of framing in the use discontinuance of volitionally adopted technology
2022
https://doi.org/10.1111/isj.12355 The discontinuance of volitional IS (i.e., information systems adopted, used and discontinued at will) has recently attracted remarkable attention from academics and practitioners alike. However, most research to date has been ahistorical. Ignoring the temporal progression can be problematic when the phenomenon under investigation is dynamic and evolving. To balance this, we adopt a stage modelling approach to understand the process ending with the technology use being discontinued by users of a popular crowdsourcing platform. Two questions guided our investigation: (1) Why do users discontinue using an IS they have volitionally adopted and used? (2) How do…
Harnessing User Values to Understand Value Co-Creation and Co-Destruction in Augmented Reality Mobile Games
2021
This paper explores the phenomena of value co- creation and co-destruction in augmented reality (AR) mobile games. More specifically, we aim to achieve an in-depth understanding of value co-creation and co- destruction occurring in Pokémon GO and the user values underlying these occurrences. Service-dominant (S-D) logic provides our study with a lens for understanding users as active co-creators, co- destroyers, and determinants of value. Further, the means-end theory establishes users’ personal values and goals as the basis for service value determination. We uncover key values highlighted in users’ positive and negative gaming experiences through a qualitative content analysis of 43 in-de…
The use of e-government services and the Internet: The role of socio-demographic, economic and geographical predictors
2013
This article explores the use of e-government services from the perspective of digital divides. First, it aims to find out which socio-demographic, economic and geographical factors predict the use of e-government services. Second, the article aims to show whether these factors moderate the way in which the time spent on the Internet is associated with the use of e-government services. The article is based on survey data (N=612) collected in Finland in May–June 2011 and is analysed by using a logistic regression modelling. Results show that gender and income moderate the link between the Internet and e-government service use. The more that women use the Internet, the more they use the gover…
Protection Motivation Theory in Information Systems Security Research
2021
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new roa…
NewSQL Database Management System Compiler Errors : Effectiveness and Usefulness
2022
Modern database management is often faced with a high number of concurrent end-users, and the need for database distribution to ensure fault tolerance and high throughput. To flexibly address these challenges, many modern database management systems (DBMS) provide highly automated and effortless, i.e., highly usable database distribution, deployment, and maintenance. However, the usability considerations are yet to extend from the aforementioned DBMS features to query language compilers. In this study, based on participant answers (N = 157), we compare the error message qualities of four modern DBMSs (CockroachDB, SingleStore, NuoDB, and VoltDB) using one objective and three subjective metr…
Information Technology–Supported value Co-Creation and Co-Destruction via social interaction and resource integration in service systems
2022
The paper develops a conceptual framework to study the constructs of information technology (IT)-supported value co-creation and co-destruction through shared processes of social interaction and resource integration as mediated by IT and embedded in interactive value formation practices. In particular, the elements of social interaction and resource integration are identified, and the role of IT is discussed. We conduct a systematic literature review and analyze the data using the service system perspective. Our research contributes by identifying the constructs of value-creating phenomena enabled by IT from the service system perspective and presenting a research agenda for further studies…
Sustainable solutions for last mile Internet access in developing countries : critical success factors
2015
Individual and shared digital repertoires : older adults managing digital services
2023
The rise of public and other non-recreational digital services is based on the idea of catering to the daily needs of the citizens cost-efficiently and with ease. Previous research has approached the use of digital services mainly from the perspective of an individual, while the significance of shared practices of use has attracted only a little attention. In this article, we (1) examine the incentives and limitations associated with the use of non-recreational digital services, which either encourage or discourage older adults to use them. Based on the first question, we then ask (2) how older adults in this study manage those non-recreational digital services they have chosen to use. Our …