Search results for "technology"
showing 10 items of 30343 documents
Business model scaling and growth hacking in digital entrepreneurship
2023
Creating an innovative product and validating an innovative business model may not be enough for digital startups to be competitive. To grow fast and expand globally, digital startups need to innovate their business model during the scaling phase. A pragmatic approach has recently been proposed to support digital entrepreneurs engaging in business-model innovation during the scaling phase (i.e., business-model scaling), a strategy known as growth hacking. However, we know little about its theoretical grounding and how effective growth hacking is, as businesses lack methodologies to assess its effectiveness before committing resources and investments. To fill this gap, we developed a method …
Contributions of mean and shape of blood pressure distribution to worldwide trends and variations in raised blood pressure: A pooled analysis of 1018…
2018
Background: Change in the prevalence of raised blood pressure could be due to both shifts in the entire distribution of blood pressure (representing the combined effects of public health interventions and secular trends) and changes in its high-blood-pressure tail (representing successful clinical interventions to control blood pressure in the hypertensive population). Our aim was to quantify the contributions of these two phenomena to the worldwide trends in the prevalence of raised blood pressure. Methods: We pooled 1018 population-based studies with blood pressure measurements on 88.6 million participants from 1985 to 2016. We first calculated mean systolic blood pressure (SBP), mean dia…
Information Integration, Coordination Failures, and Quality of Prescribing
2020
Poor information flows hamper coordination, potentially leading to suboptimal decisions in health care. We examine the effects of a nationwide policy of information integration on the quality of prescribing. We use the rollout of an electronic prescribing system in Finland and prescription-level administrative data. We find no effect on the probability of co-prescribing harmful drug combinations in urban regions. In rural regions, this probability reduces substantially, by 35 percent. The effect is driven by prescriptions from unspecialized physicians and from multiple physicians. Improving the local information environment thus enhances coordination and narrows differences in the quality o…
CERN IRRADIATION FACILITIES.
2017
CERN provides unique irradiation facilities for applications in dosimetry, metrology, intercomparison of radiation protection devices, benchmark of Monte Carlo codes and radiation damage studies to electronics.
Surrogate-assisted evolutionary multiobjective shape optimization of an air intake ventilation system
2017
We tackle three different challenges in solving a real-world industrial problem: formulating the optimization problem, connecting different simulation tools and dealing with computationally expensive objective functions. The problem to be optimized is an air intake ventilation system of a tractor and consists of three computationally expensive objective functions. We describe the modeling of the system and its numerical evaluation with a commercial software. To obtain solutions in few function evaluations, a recently proposed surrogate-assisted evolutionary algorithm K-RVEA is applied. The diameters of four different outlets of the ventilation system are considered as decision variables. Fr…
Supporting Cyber Resilience with Semantic Wiki
2016
Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…
Seeking Technical Debt in Critical Software Development Projects : An Exploratory Field Study
2016
In recent years, the metaphor of technical debt has received considerable attention, especially from the agile community. Still, despite the fact that agile practices are increasingly used in critical domains, to the best of our knowledge, there are no studies investigating the occurrence of technical debt in critical software development projects. The results of an exploratory field study conducted across several projects reveal that a variety of business and environmental factors cause the occurrence of technical debt in critical domains. Using Grounded Theory method, these factors are categorized as ambiguity of requirement, diversity of projects, inadequate knowledge management, and res…
Anomaly detection approach to keystroke dynamics based user authentication
2017
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previou…
Using a mobile application to support children's writing motivation
2013
PurposeThe purpose of this paper is to explore the use of the prototype of a mobile application for the enhancement of children's motivation for writing. The results are explored from students' and experts' perspectives.Design/methodology/approachThis study is based on a field trial and expert evaluations of a prototype of a mobile application. The field trial data consists of questionnaire data collected from elementary school students (n=25) who used the mobile prototype. The expert evaluations (n=8) of the prototype were conducted based on usability and pedagogical heuristics. The main research question is how the mobile application motivates children to learn creative writing.FindingsTh…
Citizens' Communication Habits and Use of ICTs During Crises and Emergencies
2014
In this article, citizens’ communication habits and use of information and communication technologies during crises and emergencies are discussed from the perspective of community resilience. The topic is approached qualitatively by exploring citizens’ perceptions, and the data were gathered by means of focus groups in storm-prone and flood-prone areas in Finland. The results indicate that citizens consider emergency communication to be mostly unidirectional: from authorities to the public. However, because crises are often complex and fast developing, cooperation among response organizations and citizen groups is needed to coproduce safety and in adapting to changing situations. Organizati…