hh.sePublications
Change search
Refine search result
12345 151 - 200 of 242
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    A Two Level Approach to the Design of Software for Cooperating Embedded Systems2009In: 7th IEEE International Conference on Industrial Informatics, 2009. INDIN 2009, IEEE Press, 2009, p. 721-728Conference paper (Refereed)
    Abstract [en]

    This paper proposes an architecture concept to the design of software, for embedded systems and cooperating embedded systems, aimed to simplify not only design but also reuse and reconfigurability. The concept is targeted at software for recurring signal processing and control tasks common in industrial embedded supervision and control applications. An important part of the architecture concept is that the design work is partitioned and described at two major levels. The first level is focused on definition of data structures and reentrant data mapping functions to be supported by a restricted use of an existing programming language. The second level, i.e. the system level, focuses on structural and behavioral concerns including: component encapsulation, connection of actions and components via ports. This level, also handling delays, triggers and actors, is supported by a system modeling language. The thus partitioned approach makes the different design and engineering concerns well separated which simplifies both analysis and verification of functional and time behavioral correctness, compared to if they are mixed and intertwined into each other. Another gain with the proposed architecture concept is that the number of operating system (OS) threads and associated overhead needed to share the processor or a set of processors in a distributed or multi-core case is minimized.

  • 152.
    Libäck Harder, Josefin
    et al.
    Halmstad University, School of Information Technology.
    Ferenc, Katarzyna
    Halmstad University, School of Information Technology.
    Utmaningar inom KM-processer: En studie av två IT-konsult SME2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The increased use of knowledge within organizations has contributed to the development of Knowledge Management (KM). The processes of KM are developed for larger organizations. This creates problems when they are directly applied on a SME (Small and Medium Enterprises), which is characterized by a lack of resources and standardization. Additional problems arise within consulting organizations when work towards the customer is prioritized above organizational-development. This study focuses on consulting SMEs and the issues that arise through their KM- development.

    Abstract

    Through a literature-review we identified three problematic areas for KM-processes within consulting SMEs. The areas are codification, organizational structure and creation of a knowledge-friendly environment. Within each problematic area there were additional challenges that later was studied empirically. This study was done at two consulting-SMEs, both working within the field of IT. The empirical study contributed with new challenges that will be presented during the discussion 

  • 153.
    Lind, Louise
    et al.
    Halmstad University, School of Business, Engineering and Science.
    Thörn, Carolina
    Halmstad University, School of Business, Engineering and Science.
    Utvärdering av målsättningar: En studie om organisationers arbete med attutvärdera målen med införandet av ett Affärssystem2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    När organisationer inför ett nytt affärssystem i verksamheten behöver organisationerna kunna bedöma effekterna av införandet. Effekterna kan bedömas genom att utvärdera de mål som definierats inför projektet. Det finns utmaningar gällande arbetet med att utvärdera målsättningar med ett affärssystemsinförande. Organisationer misslyckas med att realisera definierade mål med projektet och processen att utvärdera målsättningarna ses som komplex. En litteraturstudie har genomförts för att beskriva organisationers arbete med att definiera och utvärdera mål med ett affärssystemsinförande. Empiriskt underlag har samlats in genom en kvalitativ intervjustudie för att få kunskap och bidra till förståelse för hur organisationer i praktiken arbetar med utvärdering av målsättningar efter systeminförandet. Studien syftar till att bidra med kunskap och skapa ökad förståelse för hur organisationer faktiskt arbetar med att definiera mål vid införanden av affärssystemoch hur organisationer utvärderar målen. Studiens resultat visar att organisationer inte arbetar med att definiera mål och utvärdering av målen enligt litteraturens metoder och tillvägagångssätt. Därmed presenteras organisationers alternativaarbetssätt för att bedöma ett affärssystemsinförande.

  • 154.
    Lindberg, Susanne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ethics of User Involvement in Sensitive Design Situations2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    While this era of digital technology brings great possibilities for improving the lives of many people with digital healthcare services, the design of these services in turn present challenges that are ethical in nature. Participatory Design (PD) values user involvement in design from a democratic, empowerment and ethical perspective. However, the design of digital healthcare services constitutes sensitive design situations, that is, situations that have the potential to negatively impact the participants. As a consequence, participation in these design situations involves risks, causing ethical dilemmas. The ethical dilemmas that designers face in sensitive design situations are situated, dynamic, diverse, unpredictable, and occur in-action. Yet, it is a complex field with little in situ support for designers who intend to involve users in sensitive design situations, and high complexity and risk increase the need to understand ethics in these situations. Consequently, this thesis intends to answer the question: How can users be involved in sensitive design situations?

    The research question has emerged from the study of two design projects and is addressed through a Design Research (DR) approach. Both projects aimed at designing Digital Peer Support (DPS); one designs DPS for children between 8-12 cured from cancer, and the other designs DPS for people diagnosed with schizophrenia. The DR approach enables the study of de facto design situations in the two design projects. The thesis consists of a collection of five papers and a cover paper.

    The results show that, in sensitive design situations it can be challenging to uphold the fundamental ethical commitments of PD: that participation is a democratic right, the user is the expert, design should enhance, and design is situated. Based on the empirical study, I propose four principles for ethics in sensitive design situations that aim to support the upholding of these ethical commitments: (I) the principle of enhancement; (II) the principle of acknowledgement; (III) the principle of advocacy; and (IV) the principle of accommodation.

    The research contributes to the discourse on ethics in PD by expanding the understanding of ethical values of user involvement. Ethical guidelines must be dynamic and responsive, and participation should be carried out using methods for continuous critical reflection. The research contributes to practice by providing practical guidance for those who intend to involve users in sensitive design situations, ethical review boards who review PD, and for training of future PD researchers.

  • 155.
    Lindberg, Susanne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Participatory design workshops with children with cancer: lessons learned2013In: Proceedings of the 12th International Conference on Interaction Design and Children, New York, N.Y.: ACM Press, 2013, p. 332-335Conference paper (Refereed)
    Abstract [en]

    The design and development of information technology for use in health services presents a complex and sensitive situation. It includes not only managing differing interests and situations, but does so in a context that might give rise to negative emotions among the participating users. When the future users are children, this design process becomes even more complex. Participatory design is considered suitable for design with children. The premise for the participation of the children in this study was that they were, or had been treated for cancer. Therefore, their participation could awaken negative emotions, and make the situation difficult for them to handle. How participatory design with children can be conducted in such a sensitive context is therefore explored, grounded in the experience from six design workshops. The workshops evolved around the concept of comics as a way to allow the children to express themselves with familiar means. Three main lessons were learned from the workshops: working in pairs promotes an efficient work situation and the possibility to keep an eye on the children's wellbeing; proxies need to be distanced from the participating children; and the scenarios in the comics set the level of realism of the result. Copyright 2013 ACM.

  • 156.
    Lindberg, Susanne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Properties of Participatory Approaches for Designing with Children in a Health Related Context2013In: / [ed] Judith Molka-Danielsen, Tone Bratteteig and Espen Skorve, Trondheim, Norge: Akademika forlag, 2013, p. 153-166Conference paper (Other academic)
    Abstract [en]

    Information technology in health services has an increasingly important role in people’s lives. However, the design of this constitutes a complex situation in a sensitive context. The complexity further increases when the users are children. Participatory approaches are beneficial for design with children, but there is limited research on how to design with children and how existing methods can be made to suit a health related context. This paper aims identifying common properties of participatory design methods when performed in a health related context. The identified properties of design methods were found to relate to three different categories: activities, designers and participants. To these were added properties of research methods with children in health contexts, where a majority related to the category of designers. This indicates the designers’ responsibilities are particularly important when designing with children in a sensitive, health related context. 

  • 157.
    Lindberg, Susanne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Wickedness in Design for People Diagnosed with Schizophrenia2018In: Scandinavian Journal of Information Systems, ISSN 0905-0167, E-ISSN 1901-0990, Vol. 30, no 1, p. 47-77, article id 2Article in journal (Refereed)
    Abstract [en]

    With the digitisation of society, e-health technology increasingly supports new design situations that extend those traditional to Information Systems, and therefore need to be better understood. In design for complex, new and sensitive design situations, it is not possible to apply known methods and solutions without a deeper situational understanding. These design situations are fraught with wicked problems that are contradictory and complex. This paper intends to answer how the wickedness of the design situation when designing e-health technology for people diagnosed with schizophrenia can be understood and what consequences the design situation has for the design process. The paper presents a grounded theory analysis of stakeholder interviews and focus group interviews with people diagnosed with schizophrenia. Four wicked problems are identified: struggle of dependence, contradiction of social interaction, contradiction of trust and counteracting improvement behaviour. The problems are interrelated and have consequences for the design, acceptance, use and user involvement in design of e-health technology for people diagnosed with schizophrenia. The paper also shows the viability of using grounded theory for studying and describing situational wickedness. © Scandinavian Journal of Information Systems, 2018.

  • 158.
    Lindberg, Susanne
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Wickedness in Design of e-Health Systems for People Diagnosed with Schizophrenia2017In: Nordic Contributions in IS Research: 8th Scandinavian Conference on Information Systems, SCIS 2017, Halden, Norway, August 6–8, 2017, Proceedings / [ed] Susanne Stigberg, Joackim Karlsen, Harald Holone, Cathrine Linnes, Cham: Springer, 2017, p. 125-139Conference paper (Refereed)
    Abstract [en]

    With the digitisation of society, e-health systems support new contexts that are different from traditional Information Systems contexts, and therefore need to be better understood. In design for complex, new and sensitive contexts, it is not possible to apply known methods and solutions without deeper contextual understanding. The paper intends to answer how the wickedness of the design context when designing digital services for people diagnosed with schizophrenia can be understood – a context that is contradictory and complex, that is, a wicked design context. The paper presents a grounded theory analysis of stakeholder interviews and focus group interviews with people diagnosed with schizophrenia. Four wicked problems are identified: struggle of dependence, contradiction of social interaction, contradiction of trust and counteracting improvement behaviour. The paper also shows the viability of the use of grounded theory for uncovering and describing contextual wickedness. © Springer International Publishing AG 2017

  • 159.
    Lindberg, Susanne
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Thomsen, Michel
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Åkesson, Maria
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Designing Online Peer Support for Children with Cancer: Research Considerations and Ethical Implications2012Conference paper (Other academic)
    Abstract [en]

    Social support is essential for a person's capacity to live with a disease. For children, who do not have the same ability as adults to understand and deal with their disease, contact with other children with similar experiences can help them understand their own situation. In this paper we present an ongoing research project with a participatory approach. The challenge is to design online peer support (OPS) for children who have been diagnosed with cancer. The aim of this paper is to identify and shed light on ethical implications and related research considerations when designing a research approach for this sensitive context. Our literature review indicates that there is an apparent lack of research on OPS for supporting children with cancer. It also shows that there is knowledge on considerations to make when designing with children. However, the children in this category are suffering from physical and psychological consequences of their illness. Finally we discuss relevant ethical considerations, of which we highlight sensitivity and respect as most important and comprehensive.

  • 160.
    Lindberg, Susanne
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Thomsen, Michel
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Åkesson, Maria
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ethics in Health Promoting PD: Designing Digital Peer Support with Children Cured from Cancer2014In: PDC 2014: Reflecting connectedness: Proceedings of the 13th Participatory Design Conference: Volume 1: Research Papers / [ed] Ole Sejer Iversen, Heike Winschiers-Theophilus, Vincenzo D'Andrea, Andrew Clement, Andrea Botero, Keld Bødker, New York, NY: ACM Press, 2014, p. 91-100Conference paper (Refereed)
    Abstract [en]

    Innovative design targets new user groups and application areas. One example is health promoting digital services. In such design contexts it is essential to take social and ethical challenges into consideration. In this paper we report from an on-going design research project aimed at designing digital peer support (DPS) for children cured from cancer. Peer support can meet the children’s imperative need for social support. However, the design context is sensitive and gives rise to ethical challenges and considerations. We illustrate how participatory design (PD) activities can be designed to handle ethical challenges when designing for and with children. We present lessons learned, including using familiar activities, using personas and including healthy children when possible. Further, we reflect on the need to proactively design an ethical perspective into the entire design process, introducing the concept Ethics in Design. Copyright 2014 ACM.

  • 161.
    Lindberg, Susanne
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Wärnestål, Pontus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Nygren, Jens
    Halmstad University, School of Health and Welfare, Centre of Research on Welfare, Health and Sport (CVHI).
    Svedberg, Petra
    Halmstad University, School of Health and Welfare, Centre of Research on Welfare, Health and Sport (CVHI).
    Designing digital peer support for children: design patterns for social interaction2014In: IDC '14 Proceedings of the 2014 conference on Interaction design and children, [S.l.]: ACM Press, 2014, p. 47-56Conference paper (Refereed)
    Abstract [en]

    Children who have survived a life-threatening disease like cancer benefit from social support from other children with a similar background. However, these children are often geographically dispersed and have little opportunity to meet. We investigate the design and development of Digital Peer Support Services (DPS), which may overcome this problem. Peer support is a kind of social support that brings together peers with similar experiences to help their adjustment to a disease. The aim of this paper is to develop design patterns for social interaction that can be implemented in a DPS for children surviving cancer. We conducted four sets of design workshops with children, from which emerged clusters relating to peer support and friendship that were broken down into triads. From these, six design patterns for social interaction were developed. The patterns delineate different aspects of social interaction for children and are illustrated with examples from DPS prototypes and concepts. The patterns are organized into a hierarchy, comprising the beginning of a design pattern language for social interaction for children. An essential aspect of the patterns is providing users with transparency and control of the extent to which their social interaction is public or private. Copyright © 2014 ACM.

  • 162.
    Lindroth, Tomas
    et al.
    Department of Media, University West, Trollhättan, Sweden.
    Bergquist, Magnus
    Department of Applied Information Technology, University of Gothenburg, Göteborg, Sweden.
    Laptopers in an educational practice: Promoting the personal learning situation2010In: Computers and education, ISSN 0360-1315, E-ISSN 1873-782X, Vol. 54, no 2, p. 311-320Article in journal (Refereed)
    Abstract [en]

    In this article an ethnographical study of laptopers' activities during lectures in a university milieu is analyzed as different kinds of involvements. Through interviews and observations we have focused on how these involvements influence the laptopers' alignment towards the educational practice. The analysis shows the importance of separating the educational practice and the personal learning situation. Studying students' learning intentions, rather than certain laptop related activities, we get a deeper understanding of the role the laptop can take during learning activities. Five general characteristics of laptoping are found. Negotiating the laptops' different roles in the educational practice opens up for an understanding of the students personal learning situation as being more than just listening to a lecturer. Additionally, competent integration of digital tools into the learning situation extends the dimensions of the lecture beyond the lecturing hours and personal note taking. Such knowledge is vital for creating foundations for digital competency in a digitized society. © 2009 Elsevier Ltd. All rights reserved.

  • 163.
    Lindström Ingfeldt, Sabine
    et al.
    Halmstad University, School of Information Technology.
    Pira Kriborg, Elin
    Halmstad University, School of Information Technology.
    Barn och strömmande media: Hur påverkar barns kognitiva färdigheter deras sätt att interagera med strömmande media?2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Young children are becoming more frequent users of digital services such as on-demand services, which requires that services intended for them are customized according to their circumstances and abilities. Children differ cognitively from adults since they usually have not had time to experience as much. This means that children have different needs than adults to interact with on-demand services. This paper examines how different cognitive abilities affect children’s interaction with on-demand services. Initially interaction design, usability, usability for children and cognitive skills are presented since they are head topics of this essay. Furthermore, through an empirical study, this paper maps children’s cognitive skills from a design prespective and a user perspective. Thereafter we compare the theories from the literature section with our empiricism and we find that children's cognitive skills complement, strengthen and restrict each other. Finally we suggest some practical contributions for future development of useful on-demand services for children that are 1) a unified and clear design; 2) a bearable waiting; 3) feedback and larger buttons and 4) a combination of different media.

  • 164.
    Lund, Jesper
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Activities to Address Challenges in Digital Innovation2014In: Information Systems and Global Assemblages. (Re)Configuring Actors, Artefacts, Organizations: IFIP WG 8.2 Working Conference on Information Systems and Organizations, IS&O 2014, Auckland, New Zealand, December 11-12, 2014. Proceedings / [ed] Bill Doolin, Eleni Lamprou, Nathalie Mitev, Laurie McLeod, Heidelberg: Springer, 2014, p. 115-131Conference paper (Refereed)
    Abstract [en]

    Based on a literature review, this paper identifies four socio-technical challenges relating to innovation actor's interactions in digital innovation. Furthermore, the paper explores how these challenges can be addressed. The challenges are investigated in a case study of digital innovation. The study is based on a two year long research and development project where an e-newspaper concept and a demonstrator based on e-paper technology was developed. Based on empirical findings, the paper presents eight activities which address the identified socio-technical challenges with digital innovation. The activities are: 1) support transparent digital ecosystem relationships, 2) facilitate cross-organizational communication, 3) create digital value blueprints, 4) translate heterogeneous knowledge, 5) involve all relevant user groups, 6) identify, design for, and authenticate digital user values, 7) design for multiple contexts of use, and 8) prototype iteratively. © IFIP International Federation for Information Processing 2014

  • 165.
    Lund, Jesper
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab). University of Gothenburg, Gothenburg, Sweden.
    Digital Innovation: Orchestrating Network Activities2015Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Digitization of analogue everyday artifacts, i.e. when physical products are equipped with digital capabilities, has a profound impact on today’s society. Some examples of these digital innovations aimed at consumer markets are the “connected” car, the digitized television set, and in the near future, digitized IKEA furniture. Digital innovation provides endless opportunities for providing value adding products and services. However, in digital innovation there is a need to find new ways of organizing network activities, i.e. activities such as e.g. production and translation of knowledge and enrollment of actors. These activities need to embrace and build on the networked aspects and the complexity inherent to digital innovation. This requires network activities that can overcome challenges with the ambiguous and messy characteristics of digital innovation. In this thesis, I propose that the theoretical perspective of network orchestration can enlighten fruitful ways to address challenges that are encountered when organizing network activities in digital innovation. Inspired by practical challenges with digital innovation, as well as contemporary calls for research within IS, this thesis investigates: How can network activities be orchestrated in digital innovation? Two cases of digital innovation aimed at consumer markets are studied. The first case concerns the digitization of the newspaper. The second case regards the digitization of door locks. Literature about digital innovation is used to understand the context of the studied phenomenon. Furthermore, theories about network orchestration as well as activities in innovation are used as a theoretical framework to help answer the research question. The thesis is based on an interpretative perspective where a multi-method approach has been applied to address the research question. The contribution is divided into two different parts. The first part presents four categories of empirically derived network activities that address socio-technical challenges with organizing digital innovation. The second part is a proposed model detailing orchestration of network activities in digital innovation. The model is based around the four suggested categories of network activities: (1) Supporting flexible innovation networks, (2) Production and translation of layered architectural knowledge, (3) Addressing heterogeneous user communities, and (4) Harnessing generativity to leverage value. The categories of network activities can be viewed as building blocks for the orchestration process. By emphasizing both a proactive and a reactive way of orchestrating digital innovation, the model proposes a means for organizations to address the ambiguity and complexity of digital innovation.

  • 166.
    Lund, Jesper
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Ebbesson, Esbjörn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Understanding Digital Innovation from a Layered Architectural Perspective2019In: Technology Innovation Management Review, ISSN 1927-0321, E-ISSN 1927-0321, Vol. 9, no 2, p. 51-63Article in journal (Refereed)
    Abstract [en]

    Managing successful digital innovation processes is a challenging task, especially when it involves heterogeneous actors with different sets of knowledge. By gaining a better understanding of how different architectural layers of digital technology interplay with digital innovation, we can be better prepared for managing the complex and messy processes that often arise when working with digital innovation. In this article, we therefore ask: How does the layered architecture of digital technology interplay with digital innovation processes? A case study approach was selected to studied events involving multiple actors in an innovation and development project called the Smart Lock project. The theoretical basis for our study is digital innovation from the perspective of knowledge exchange and relationships. A temporal bracketing strategy was used to support a process analysis of the case data. The article primarily contributes to the body of research concerning digital innovation and provides an example to practitioners of how digital innovation processes can be coordinated and managed based on the innovation at hand.

  • 167.
    Lundgren, Linus
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Axelsson, Chris
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    DEN DIGITALA PERSONLIGA SFÄREN I SOCIALA NÄTVERK2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    

    Detta är en kandidatuppsats i Informatik skriven vid Högskolan i Halmstad och behandlar vilken information användare av det sociala nätverket Facebook delar med sig av samt om det finns begränsningar gällande vem de delar med sig av denna information till. Detta ställs i relation till den personliga sfären som presenterar ett sätt att hantera vilken grad av förtroende en person ges beroende vilken relation denna har till individen. Fokus har även varit att undersöka hur den personliga sfären återspeglas i digitala miljöer i form av den digi-tala personliga sfären.Den empiriinsamling som genomfördes för denna uppsats var först en förstudie i form av en indirekt obser-vation på Facebook för att undersöka antalet statusuppdateringar som går att härleda till en användares geografiska position. Vi gick sedan vidare med en enkätundersökning vid Högskolan i Halmstad som hante-rade ämnen som varför respondenterna använde sociala nätverk, om vänskaper stärkts på grund av sociala nätverk, vilken information respondenterna inte har några problem att dela med sig av i sociala nätverk samt diverse frågor gällande vilka personer de kunde tänka sig att dela med sig av viss typ av information till.Vi tar i denna uppsats fram modeller som kopplas till hur den personliga sfären representeras inom sociala nätverk som exempelvis Facebook. Även kopplingar mellan den digitala personliga sfären och den icke-digitala personliga sfären förs fram.

    

    

  • 168.
    Magnusson, Roberth
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Rydkvist, Rikard
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    IT-säkerhet i små organisationer2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    IT and information security is a recurring theme. IT security in smallorganizations appear to be an under-researched area. To make a survey of thework on risk, threat and security might look like in small organizations, weconducted an exploratory interview with representatives of small organizationsabout their work with IT and information security. We also conducted interviewswith experts in the field to get a broader perspective. The interpretation andanalysis of the interview responses have been carried out by first interpret theresponses based Security Controls, and then analyze the responses on fivethematic areas which we found in the material. We will then continue with adiscussion of how we have found that the studied organizations, look at threats,risk and safety and how they work with the Security Controls seen through thethree security dimensions. Finally, we suggest further research in this area.

  • 169.
    Malis, Johanna
    et al.
    Halmstad University.
    Falck, Josette
    Halmstad University.
    Informationssäkerhetspolicy och Säkerhetsmedvetenhet: En undersökning av kommunala förvaltningars praktiska arbete med att uppnå informationsäkerhet2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 170.
    Malmgren, Sara
    et al.
    Halmstad University, School of Information Technology.
    Edling, Emma
    Halmstad University, School of Information Technology.
    Postimplementering av affärssystem: En studie om hur företag genomför arbetet med ständig förbättring av affärssystem under postimplementationen2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The implementation of an ERP-system can be seen as the start of a long journey. After companies have implemented an ERP-system, they are in the post-implementation phase. Since it is both costly and time consuming to replace the ERP-system with a new one, companies usually choose to maintain their current ERP-system and instead continuous improve it as much as possible. As society changes rapidly and business grows, the ERP-system needs to constantly improve to support the changing requirements and conditions that arise. This study focuses on continuous improvement of ERP-systems, such as add-on functions, upgrades, or customizations, during the post-implementation phase. The purpose of the study is to investigate how businesses work with continuous improvement of ERP-systems in the post-implementation phase. This study shows that companies work with continuous improvement, but there may be difficulties in distinguishing between improvements in the ERP-system or in the processes. It also appears that the top management has a major impact on the improvement work and that continued user education is important in post implementation phase. The result of the study shows that companies today does not have any clear planning about the work with continuous improvements.

  • 171.
    Mansour, Osama
    et al.
    Jönköping University, Jönköping, Sweden.
    Ghazawneh, Ahmad
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). IT University of Copenhagen Copenhagen, Denmark.
    Value Creation in Digital Service Platforms2017In: The 28th Australasian Conference on Information Systems: ACIS2017, Hobart, Australia, 2017, article id 95Conference paper (Refereed)
    Abstract [en]

    Value creation is increasingly relevant for owners of digital service platforms (DSPs). These owners have two vital goals: increase their service base and sustain their service offerers. A key element in continuously accommodating these goals is value creation. While the literature on DSPs is growing, there is a paucity of knowledge on the value creation process in these platforms. Drawing on a qualitative study of Uber drivers in Denmark and Sweden, we synthesize Schumpeter’s theory of value creation to develop an understanding of the value creation process in DSPs from the perspective of service offerers. As such, our study proposes and contributes a value creation framework for DSPs that identifies 8 value sources and highlights resource combination and exchange in the process of value creation.

  • 172.
    Marklind, Anton
    et al.
    Halmstad University, School of Information Technology.
    Marklind, Simon
    Halmstad University, School of Information Technology.
    Relay-attacker: Utnyttjande av trådlösa bilnycklar2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    On a daily basis the car is frequently used, and a lot of people arein need of their cars. New technologies are developed to make it easierfor car owners to unlock the car and drive away without making theeffort of using the car keys. A technology called “keyless” car keys areimplemented in modern cars, the car keys sends out radio frequenciesin an interval on a couple of seconds.But is a complete wireless key system secure enough? The radiosignals are open to whoever wants to listen to them, and that couldhave devastating consequences. If it is open to everyone, then it shouldalso be possible to record these signals and send them out using a radiotransmitter. It’s called a relay attack and the purpose of this report isto get broader perspective of how an attack like that works and howeasy it is to execute the attack. The experiment was performed ondifferent types of cars and their keys with varying frequencies.

  • 173.
    Mathiassen, Lars
    et al.
    Center for Process Innovation, J. Mack Robinson College of Business, Georgia State University, PO Box 5029, Atlanta, GA 30302-5029, United States.
    Ngwenyama, Ojelanki K.
    School of Information Technology Management, Ryerson University, 350 Victoria St., Toronto, Ont. M5B 2K3, Canada.
    Aen, Ivan
    Dept. of Computer Science, Aalborg University, Fredrik Bajersvej 7E, DK9220 Aalborg, Denmark.
    Managing Change in Software Process Improvement2005In: IEEE Software, ISSN 0740-7459, E-ISSN 1937-4194, Vol. 22, no 6, p. 84-91Article in journal (Refereed)
    Abstract [en]

    Software process improvement has become the primary approach to improving software quality and reliability, employee and customer satisfaction, and return on investment. Although the literature acknowledges that SPI implementation faces various problems, most published cases report success, detailing dramatic improvements. Such best-practice cases are a great benefit when learning how to effectively implement SPI. However, it's equally important to critically examine the less glamorous cases of organizations that struggle to sustain STI benefits. 

    On the basis of experiences from SPI initiatives and insights into organizational-change management, we offer the following advice for successful SPI implementation: software managers must appreciate that each SPI initiative is unique and carefully negotiate the context of change. Managers must also understand the elements of change involved. SPI can't succeed without managerial commitment and a mastery of appropriate change tactics.

  • 174.
    Mirza, Asif
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Arshad, Faique Bin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Performance Analysis of Cyclostationary Sensing in Cognitive Radio Networks2011Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Cognitive radio is one of the modern techniques for wireless communication systems to utilize the unused spread spectrum effectively. This novel paradigm makes wireless communication possible with less interference. In our work we have investigated one of the functions of cogni- tive radio called spectrum sensing. We have specifically used the method of Cyclostationary fea- ture detection. Spectrum sensing is also a very effective method to detect spectrum holes and to utilize them. We have implemented spectrum sensing technique in these experiments. A signal is randomly generated which could be Binary shift phase keying (BPSK) or Quadrature phase shift keying (QPSK), then this modulated signal is passed through Additive white Gaussian noise (AWGN), The output signal of AWGN is then passed to cyclostationary detector, various func- tions are pre-implemented inside cyclostationary detector and this includes Fast Fourier trans- form (FFT), Auto correlation, Sliding window to identify that signal. Finally we have demon- strated the results of signal to noise ratio to show the performance evaluation of our experiments. The results have shown a decreasing trend in the probability of incorrect detection by increasing signal to noise ratio.

  • 175.
    Morawczynski, Olga
    et al.
    University of Edinburgh.
    Ngwenyama, Ojelanki K.
    The Institute for Innovation and Technology Management, Ryerson University, Canada.
    Unraveling the Impact of Investments in ICT, Education and Health on Development: An Analysis of Archival Data of Five West African Countries Using Regression Splines2007In: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, E-ISSN 1681-4835, Vol. 29, no 5, p. 1-15Article in journal (Refereed)
    Abstract [en]

    For more than a decade African nations have been investing in Information and Communication Technologies (ICTs) as a strategy for fostering development. Under the auspices of international development agencies such as the United Nations (UN), and World Bank these nations have been constituting and implementing technology strategies that aim to bring ‘digital opportunities’ to all constituents—especially those who are impoverished and living in remote communities. These strategies have put new demands on national governments to invest both human and financial resources into the expansion of telecommunications infrastructure and the training of new users. Such investments, however, have received some scrutiny as some claim that developing nations should focus their limited financial resources on the improvement of education or healthcare. Others argue that these ICT investments are vital for development, but should be synergized with others such as education and healthcare. In this study we will employ Multivariate Adaptive Regression Splines (MARS) to explore the interaction amongst investments in ICT, education and healthcare. We further analyze how each class of investments impacts human development measures in five West African nations: Benin, Cameroon, Senegal, Ivory Coast and Niger. With such an analysis we illustrate the interdependencies amongst the three classes of investments and conclude that investments in ICTs alone are not enough to significantly impact human development. Complementary investments in education and healthcare must be given equal consideration.

  • 176.
    Naqvi, Syed Hasan Yousuf
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Multi-channel MAC Protocol for Wireless Real-Time Communication2010Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    Embedded systems have become more complex and it is hard to predict the behavior of networkdue to its dynamic nature. Several devices can interact to perform highly sophisticated real-timetasks while having the demand of interaction and sharing of resources. The interactingcomponents in these systems have strict timing constraints which require time criticalcommunication.We have designed the DCC-EDF protocol for wireless communication using the motivation fromthe research done in optical communication. We have chosen dedicated control channel protocolbecause it does not require time synchronization. To provide real-time services, we will use theEarly Deadline First scheduling algorithm (EDF) because of its optimality and efficiency. Theperformance for the soft real-time traffic is analyzed through simulation.

  • 177.
    Nazar, Arbab
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Evaluation of VoIP Codecs over 802.11 Wireless Networks: A Measurement Study2009Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Voice over Internet Protocol (VoIP) has become very popular in recent days andbecome the first choice of small to medium companies for voice and data integration inorder to cut down the cost and use the IT resources in much more efficient way. Anotherpopular technology that is ruling the world after the year 2000 is 802.11 wirelessnetworks. The Organization wants to implement the VoIP on the wireless network. Thewireless medium has different nature and requirement than the 802.3 (Ethernet) andspecial consideration take into account while implementing the VoIP over wirelessnetwork.One of the major differences between 802.11 and 802.3 is the bandwidthavailability. When we implement the VoIP over 802.11, we must use the availablebandwidth is an efficient way that the VoIP application use as less bandwidth as possiblewhile retaining the good voice quality. In our project, we evaluated the differentcompression and decompression (CODEC) schemes over the wireless network for VoIP.To conduct this test we used two computers for comparing and evaluatingperformance between different CODEC. One dedicated system is used as Asterisk server,which is open source PBX software that is ready to use for main stream VoIPimplementation. Our main focus was on the end-to-end delay, jitter and packet loss forVoIP transmission for different CODECs under the different circumstances in thewireless network. The study also analyzed the VoIP codec selection based on the MeanOpinion Score (MOS) delivered by the softphone. In the end, we made a comparisonbetween all the proposed CODECs based on all the results and suggested the one Codecthat performs well in wireless network.

  • 178.
    Ngwenyama, Ojelanki K.
    et al.
    Institute for Research on Technology Management and Organizational Learning, Ryerson University, Toronto, Canada.
    Andoh-Baidoo, F. K.
    Virginia Commonwealth University, Richmond, Virginia, USA.
    Bollou, F.
    Institute for Research on Technology Management and Organizational Learning, Ryerson University, Toronto, Canada.
    Morawczynski, O.
    Brussels School of International Studies, University of Kent at Brussels, 109 Boulevard du Triomphe, 1160 Bruxelles, Belgium.
    Is There a Relationship Between ICT, Health, Education and Development?: An Empirical Analysis of five West African Countries from 1997-20032006In: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, Vol. 23, no 5, p. 1-11Article in journal (Refereed)
  • 179.
    Ngwenyama, Ojelanki K.
    et al.
    Ryerson University, Toronto, Canada.
    Andoh-Baidoo, F.K.
    Virginia Commonwealth University, Richmond, Virginia, United States.
    SSM Approach to Emancipatory Ideals in ERP Implementation2005In: 11th Americas Conference on Information Systems (AMCIS 2005): A Conference on a Human Scale, Vol 2 / [ed] Romano, N., Northampton, Mass.: Curran Associates, Inc., 2005, p. 935-942Conference paper (Refereed)
  • 180.
    Ngwenyama, Ojelanki K.
    et al.
    Institute for Research on Technology Management, Ryerson University, Toronto, Canada.
    Bollou, Felix
    Institute for Research on Technology Management, Ryerson University, Toronto, Canada.
    Morawczynski, Olga
    Institute for Research on Technology Management, Ryerson University, Toronto, Canada.
    The Impact of Investments in ICT, Health and Education on Development: A DEA Analysis of Five African Countries from 1993-19992006In: 14th European Conference on Information Systems: 2006 ECIS Göteborg; Göteborg, June 12-14, 2006; proceedings / [ed] Jan Ljungberg & Magnus Andersson, Göteborg: IT University of Göteborg , 2006, p. Paper 35-Conference paper (Refereed)
  • 181.
    Ngwenyama, Ojelanki K.
    et al.
    School of Information Technology Management, Institute for Research on Technology Management, Ryerson University, 350 Victoria Street, Toronto, Canada.
    Guergachi, Aziz
    School of Information Technology Management, Institute for Research on Technology Management, Ryerson University, 350 Victoria Street, Toronto, Canada.
    McLaren, Tim
    School of Information Technology Management, Institute for Research on Technology Management, Ryerson University, 350 Victoria Street, Toronto, Canada.
    Using the Learning Curve to Maximize IT Productivity: A Desicion Analysis Model for Timing Software Upgrades2007In: International Journal of Production Economics, ISSN 0925-5273, E-ISSN 1873-7579, Vol. 105, no 2, p. 524-535Article in journal (Refereed)
    Abstract [en]

    Information technology managers often feel pressure from stakeholders to continually upgrade their firm's software as soon as the software vendor releases a new version. However, this may not be ideal as the software's life cycle and the organization's learning curves are not necessarily aligned. If the firm upgrades its software too early, it may not achieve productivity gains and may lose investments from prior upgrades. If it upgrades too late, it may miss gaining important productivity gains offered by the new version. We present an approach to timing software upgrades that will maximize organization productivity gains. We use the learning curve as the theoretical basis for our mathematical model.

  • 182.
    Ngwenyama, Ojelanki K.
    et al.
    Institute for Innovation and Technology Management, Faculty of Business, Ryerson University, Toronto, Canada.
    Morawczynski, Olga
    Sciences Studies Unit, University of Edinburgh, Edinburgh, EH8 9EJ, UK.
    Factors Affecting ICT Expansion in Emerging Economies: An Analysis of ICT Infrastructure Expansion in Five Latin American Countries2009In: Information Technology for Development, ISSN 0268-1102, E-ISSN 1554-0170, Vol. 15, no 4, p. 237-258Article in journal (Refereed)
    Abstract [en]

    High-quality information and communication technology (ICT) infrastructure is essential for developing countries to achieve rapid economic growth. International trade and the structure of the global economy require a level of integration that is achievable only with sophisticated infrastructure. Since the early 1990s, international institutions have been pushing developing nations to deregulate and heavily invest in ICT infrastructure as a strategy for accelerating socioeconomic development. After more than a decade of continued investments, some countries have still not achieved expected outcomes. Recently, the International Telecommunications Union (ITU) has called for empirical research to assess the performance and impact of ICT expansion in developing countries. In this article, we respond to this call by investigating factors affecting the efficiency of ICT expansion in five emerging economies in Latin America. Our findings demonstrate that deregulation is not enough to effect efficient ICT expansion, and we argue that existing conditions (economic factors, human capital, geography, and civil infrastructure factors) must also be considered. We conclude by asserting that policy makers can more easily realize socioeconomic development via ICTs if they consider these conditions while cultivating their technology strategies. © 2009 Wiley Periodicals, Inc.

  • 183.
    Ngwenyama, Ojelanki K.
    et al.
    Information Technology Management, Ryerson University, Toronto, ON, Canada.
    Nørbjerg, Jacob
    Department of Informatics, Copenhagen Business School, Copenhagen, Denmark.
    Building and Maintaining Alliances in SPI Projects: Implications for Organizing Effective SPI2005In: Proceedings of the 13th European Conference on Information Systems, Information Systems in a Rapidly Changing Economy, ECIS 2005 / [ed] Dieter Bartmann, Federico Rajola, Jannis Kallinikos et al, Regensburg: Institute for Management of Information Systems, University of Regensburg , 2005Conference paper (Refereed)
  • 184.
    Ngwenyama, Ojelanki K.
    et al.
    Ryerson Univ, Inst Innovat & Technol Management, Toronto, ON, Canada.
    Nørbjerg, Jacob
    Copenhagen Sch Econ & Business Adm, Dept Informat, DK-2000 Frederiksberg, Denmark.
    Software Process Improvement with Weak Management Support: An analysis of the Dynamics of Intra-organizational Alliances in IS Change Initiatives2010In: European Journal of Information Systems, ISSN 0960-085X, E-ISSN 1476-9344, Vol. 19, no 3, p. 303-319Article in journal (Refereed)
    Abstract [en]

    Software Process Improvement (SPI) projects are large-scale, complex organization-wide change initiatives. They require considerable investments in personnel, time and money and impact just about every aspect of software firms. The group charged with conducting an SPI project has, however, little formal authority to influence or force software professionals to engage in SPI work or to define and implement changes. The SPI literature suggests that successful SPI initiatives depend on strong commitment from top management. But what should the SPI group do if management support is weak? In this paper, we present an analysis of how an SPI group can use alliances to obtain influence and succeed when management support is weak. Our study is based on a 3-year longitudinal field study of SPI change initiatives at Denmark Electronics. Our findings show that a lack of top management support is not necessarily incompatible with success. This research opens an important new area of research on intra-organizational alliances and information system (IS) implementation. It has the potential to offer new theories and practical advice on how IS implementation projects can be more effectively managed.

  • 185.
    Ngwenyama, Ojelanki K.
    et al.
    School of Information Technology Management, Ryerson University, Canada.
    Sullivan, W.E.
    IT University of Gothenburg, Göteborg, Sweden.
    The Role of Contracts in Measuring IS Outsourcing Risks: A Risk Analysis of Successful Outsourcing Contracts2006In: Proceedings of the Fourteenth European Conference on Information Systems, ECIS 2006, Göteborg, Sweden, 2006 / [ed] Jan Ljungberg & Magnus Andersson, 2006, p. 248-259Conference paper (Refereed)
  • 186.
    Ngwenyama, Ojelanki K.
    et al.
    School of Information Technology Management, Ryerson University, Toronto, Canada.
    Sullivan, William E.
    IT University of Gothenburg, Göteborg, Sweden.
    Outsourcing Contracts as Instruments of Risk Management: Insights from Two Successful Public Contracts2007In: Journal of Enterprise Information Management, ISSN 1741-0398, E-ISSN 1758-7409, Vol. 20, no 6, p. 615-640Article in journal (Refereed)
    Abstract [en]

    Purpose: This paper aims to examine contracts in public jurisdictions to compare academic theories related to outsourcing risks and risk management strategies to current practice in order to extend and refine theory concerning what risk management strategies can, or should, be included in outsourcing contracts.

    Design/methodology/approach: An automated content analysis tool is used to rigorously compare contract documents in two public jurisdictions to a comprehensive outsourcing risk framework from previous research.

    Findings: The findings indicate that although IS outsourcing risk factors are widely acknowledged in the literature, they are not fully specified in the outsourcing contracts that are implemented in some public organizations. This research surfaces some of the differences in the techniques implemented through actual contracts to manage the risks inherent in IS outsourcing, including some strategies not previously identified in the literature. Also, not all risks need to be addressed in the contract to have a successful outsourcing engagement.

    Practical implications: The improved framework for thinking about risk management strategies in the contracting process shown within the paper can provide important ideas and insights for managers contemplating or renewing outsourcing engagements.

    Originality/value: This paper uses content analysis to rigorously compare academic theory to actual practice to extend theory. Specifically, it discovers several risk management strategies that have not been presented in previous research.

  • 187.
    Nilsson, Caroline
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Fridolf, Ulrika
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Användarinvolvering vid systemutvecklingsprojekt i vården2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The IT-systems in the Health Care section does not perform well since the user acceptance among the different professions is low. When IT-systems become unable to support health operators in their daily work, it can cause a variety of effects such as stress, lack of time and reduced patient safety. Hence we see that IT systems should be developed from the user point of view to be able to fulfill its function as a tool in health care. This paper intends to investigate how user involvement in system development projects in health care, can be developed. The study is based on interviews which aimed to map the current situation in health care. Based on this, we propose techniques and tools that can help providers and clients to improve user involvement when implementing new IT systems in healthcare.

    Keywords; Healthcare systems, user involvement, Participatory Design, system development

  • 188.
    Noring, Amanda
    et al.
    Halmstad University, School of Information Technology.
    Gunnman, Alexandra
    Halmstad University, School of Information Technology.
    Upphandlingsprocessen av affärssystem: En studie om hur företag kan arbeta med framtagandet av utvärderingskriterier inför valet av affärssystem2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 189.
    Nylén, Oscar
    et al.
    Halmstad University, School of Business and Engineering (SET).
    Vuopio, Andreas
    Halmstad University, School of Business and Engineering (SET).
    Användningen av Business Intelligence för styrning och beslutsfattande på flera nivåer.2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today, companies are forced to large and rapid changes in order to keep their place in the market. A good supporting data facilitates so that the decisions of these changes can be beneficial. Today's BI system allows companies to create reports, from different data sources, that can be used in the process of governance and decision making. The purpose of this study was to describe and analyse how BI systems can be used in governance at multiple levels in two large Swedish companies to support decision making. To gain a deeper understanding of the subject, we chose to do a qualitative study with a deductive approach. In the theoretical framework, we discuss and develop the five themes; financials, information, decisions, ERP and Business Intelligence. We interviewed two firms and seven respondents in several levels of the companies, giving us different perspectives on the use of BI in the governance and decision making. The results of the study show that information needs at the different levels are different and therefore, the companies in the survey chose to adapt their BI system so that users only have access to the information they need.

  • 190.
    Nyström, Elin
    Halmstad University, School of Information Technology.
    Framgångsfaktorer för affärssystemimplementationer i småföretag2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Companies around the world implement Enterprise Resource Planning Systems to facilitate integration of business processes and management of information within an organization. To succeed in an ERP-implementation, there are a number of success factors that companies must consider. Success factors are characteristics and activities that affect an ERP-implementation. Success factors have previously been studied in large companies and SMEs. The importance of success factors has not been studied in small businesses. Therefore, this study focuses on investigating success factors during an ERP-implementation in small businesses. With the aid of a qualitative research effort, three small companies have been studied to identify success factors in small business during an ERP-implementation.

    The study shows that management has a major role in business system implementations. The success factors identified for small businesses in the study are: The management gives its support and includes the employees, the management as project manager, the management is responsible for the composition of a project group, the management is responsible for appointing resources, informal communication, allocate time for training, the consultant's support and participation in the project group.

  • 191.
    Olsson, Gustav
    et al.
    Halmstad University, School of Information Technology.
    Kunfu, Jonathan
    Halmstad University, School of Information Technology.
    SELF-SERVICE: Vägen till en lyckad Self-Service lösning2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The SSBI tools enable the production of reports and analyzes of business data from the IT department to be transferred to the users. SSBI is developed to satisfy a demand to be able to create fast reports and analyzes, to make business driven decisions. With a SSBI implementation, there are a number of challenges that need to be managed. The aim of the study is to identify how challenges related to SSBI implementations are managed, which enable successful implementation. This leads to the question: How are challenges related to SSBI implementations managed? To gain an understanding of how the challenges have been managed, we chose a qualitative method to interpreted consultants' statements. The study is based on a consulting perspective, since the consultants have experience of customer projects, which involve both newcomers and experienced BI organizations. In the conclusion, we present three groups of approaches of how challenges are managed to succeed with SSBI- implementations.

  • 192. Olsson, Rebecca
    et al.
    Mattsson, Tove
    Utmaningar med sociala medier: En studie om utmaningar på sociala medier och kundrelation2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Sociala medier används mer och mer i dagens samhälle. Sociala medier är en plattform för kommunikation där bland annat företag kan nå ut till existerande samt potentiella kunder. Företag använder sig av diverse sociala medie-plattformar då det är ett billigt sätt för små företag att visualisera sitt företag, inte minst webbutiker som inte syns i samma utsträckning som fysiska butiker. Företag ser nu social media som ett måste för att kunna skapa en relation till sina kunder. De arbetar närmare med kundinvolvering, och social media är en möjliggörare för detta. Men med sociala medie-plattformarna kommer även utmaningar, och kundrelationen kan påverkas av dessa utmaningar. Studien är en kvalitativ studie där datainsamlingsmetoderna netnografiska internetobservationer och semi-strukturerade intervjuer har använts. Ägare från två små webbutiker har intervjuats och deras sociala medie-plattformar har observerats med utgångspunkt från diverse utmaningar med sociala medieplattformar och med ett perspektiv på kundrelation. Syftet med studien är att ge ökad förståese för vilka utmaningar som kommer med olika sociala medieplattformar och hur de kan påverka kundrelationen. Studien skapar förståelse för potentiella utmaningar som små företag kan ställas inför och hur dessa utmaningar skulle kunna påverka kundrelationer.

  • 193.
    Osei-Bryson, K-M
    et al.
    Department of Information Systems, The Information Systems Research Institute, Virginia Commonwealth University, 1015 Floyd Avenue, Richmond, VA 23284, United States.
    Ngwenyama, Ojelanki K.
    School of Information Technology Management, Ryerson University, Canada.
    Managing Risks in Information Systems Outsourcing: An Approach to Analyzing Outsourcing Risks and Structuring Incentive Contracts2006In: European Journal of Operational Research, ISSN 0377-2217, E-ISSN 1872-6860, Vol. 174, no 1, p. 245-264Article in journal (Refereed)
    Abstract [en]

    Information systems outsourcing is now almost standard practice for many companies. Outsourcing the information processing activities is a complex issue that entails considerable implications for the strategy of the firm. An important mechanism for managing the performance of outsourcing vendors is incentive contracts. But to develop an outsourcing contract the IS manager must quantify risks and benefits. However methods and tools for analyzing and quantifying outsourcing risks that IS managers have at their disposal are rudimentary. In this paper we offer a method and some mathematical models for analyzing risks and constructing incentive contracts for IS outsourcing. We are aware that most managers do not like to use mathematical models, consequently we have minimized the technical discussion and have illustrated how this model could be implemented using spreadsheet software for ease of use.

  • 194.
    Osei-Bryson, Kweku-Muata
    et al.
    Department of Information Systems, Information Systems Research Institute, Virginia Commonwealth University, Richmond, VA 23284, United States.
    Dong, Linying
    Ted Rogers School of Information Technology Management, Ryerson University, Toronto, ON M5B 2K3, Canada.
    Ngwenyama, Ojelanki K.
    Institute for Innovation and Technology Management, Ted Rogers School of Management, Ryerson University, Toronto, ON M5B 2K3, Canada.
    Exploring managerial factors affecting ERP implementation: An investigation of the Klein-Sorra model using regression splines2008In: Information Systems Journal, ISSN 1350-1917, E-ISSN 1365-2575, Vol. 18, no 5, p. 499-527Article in journal (Refereed)
    Abstract [en]

    Predicting successful implementation of enterprise resource planning (ERP) systems is still an elusive problem. The cost of ERP implementation failures is exceedingly high in terms of quantifiable financial resources and organizational disruption. The lack of good explanatory and predictive models makes it difficult for managers to develop and plan ERP implementation projects with any assurance of success. In this paper we investigate the Klein & Sorra theoretical model of implementation effectiveness. To test this model we develop and validate a data collection instrument to capture the appropriate data, and then use multivariate adaptive regression splines to examine the assertions of the model and suggest additional significant relationships among the factors of their model. Our research offers new dimensions for studying managerial interventions in IT implementation and insights into factors that can be managed to improve the effectiveness of ERP implementation projects.

  • 195.
    Pesic, Stefanie
    et al.
    Halmstad University, School of Information Technology.
    Pham, Emmy
    Halmstad University, School of Information Technology.
    Användning av CRM-system: En kvalitativ studie om CRM-användning för att stödja företags kundrelationer2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Companies are in a competitive world and to manage to survive, they must take care of their

    existing customers as well as attract new ones. With the help of today's technology,

    companies have the ability to store information about their customers and can therefore have a

    greater understanding of customer behavior and preferences. CRM (Customer Relationship

    Management) system is an aid in this work and has therefore become a priority investment for

    companies as customers regarded as their most important asset. CRM-systems are a costly

    investment, while the chance of failure in the implementation is large. Therefore it is of great

    importance for companies to handle, use, and have an understanding of the CRM-system's

    various functions to manage to strengthen customer relationships and obtain prospective

    benefits that the system is aimed at.

    The study applies qualitative survey techniques where a company has been investigated

    through interviews. The purpose of this study is to investigate the use of a CRM-system to

    find out how this supports the organization and its customer relationships. Based on the

    literature review we identified features of a CRM system, which creates a basis for the

    empirical study. The study's conclusion contains recommendations about the use of CRMsystems

    to support customer relationships. The recommendations are addressed to companies

    using CRM-systems or to companies that are in the process of introducing such a system.

  • 196.
    Pignaton de Freitas, Edison
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Heimfarth, Tales
    Computer science department, Federal university of Lavras, Lavras, Brazil.
    Wagner, Flávio Rech
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Ferreira, Armando Morado
    Defense Engineering Graduate Program, Military Institute of Engineering, Brazil.
    Pereira, Carlos Eduardo
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Geo-aware Handover of Mission Agents Using Opportunistic Communication in VANET2010In: Smart Spaces and Next Generation Wired/Wireless Networking: Proceedings / [ed] Sergey Balandin, Roman Dunaytsev and Yevgeni Koucheryavy, Berlin: Springer Berlin/Heidelberg, 2010, Vol. 6294, p. 365-376Conference paper (Refereed)
    Abstract [en]

    This paper explores geographical location awareness to support software agent mobility in ad hoc networks. The idea is to evaluate the concept of opportunistic communication to perform agent migration and mobility among nodes (handover), in an infrastructureless vehicular ad-hoc network (VANET). The application of this idea can support a number of applications, and one of particular interest is a “virtual sensor network” composed of software agents that implement missions in the form of sensing services, which use the available resources provided by the physical nodes, i.e. physical sensor devices, computing platforms and communication devices. A case study is presented together with simulations results to assess the efficiency of the proposed approach.

  • 197.
    Pignaton de Freitas, Edison
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Heimfarth, Tales
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Wehrmeister, Marco Aurélio
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Rech Wagner, Flávio
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Morado Ferreia, Armando
    Military Institute of Engineering, Brazil.
    Pereira, Carlos Eduardo
    Institute of Informatics, Federal University of Rio Grande do Sul, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Embedded Systems (CERES).
    Using a Link Metric to Improve Communication Mechanisms and Real-Time Properties in an Adaptive Middleware for Heterogeneous Sensor Networks2009In: Advances in Information Security and Assurance: Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009; proceedings, Berlin: Springer Berlin/Heidelberg, 2009, p. 422-431Conference paper (Refereed)
    Abstract [en]

    This paper presents middleware mechanisms to support real-time services in heterogeneous sensor networks, focusing on the evaluation of link metrics. Heterogeneous sensor networks require specific QoS (quality of service) guarantees in order to allow the coordination and cooperation among the different nodes that compose the system. In order to improve QoS, one of the first steps is to enhance the usage of the communication links, aiming at a more reliable and efficient message exchange. In this paper, key middleware features to address this concern are presented, in which a focus is given on the use of a link metric that, as part of a protocol, is used to optimize the message forwarding in relay communications across the network. Additionally, preliminary results are also presented.

  • 198.
    Plaza, Malgorzata
    et al.
    Institute for Innovation and Technology Management, Ryerson University, 55 Dundas Street West, 9 Floor, Room 3-089, Toronto, Ontario, Canada M5B 2K3.
    Ngwenyama, Ojelanki K.
    Institute for Innovation and Technology Management, Ryerson University, 55 Dundas Street West, 9 Floor, Room 3-089, Toronto, Ontario, Canada M5B 2K3.
    Rholf, Katrin
    Department of Mathematics Ryerson University, Toronto, Canada.
    A comparative analysis of learning curves: Implications for new technology implementation management2010In: European Journal of Operational Research, ISSN 0377-2217, E-ISSN 1872-6860, Vol. 200, no 6, p. 518-528Article in journal (Refereed)
    Abstract [en]

    New technology implementation projects are notoriously over time and budget resulting in significant financial and strategic organizational consequences. Some argue that inadequate planning and management, misspecification of requirements, team capabilities and learning contribute to cost and schedule over runs. In this paper we examine how learning curve theory could inform better management of new technology implementation projects. Our research makes four important contributions: (1) It presents a comparative analysis of learning curves and proposes how they can be used to help ERP implementation planning and management. (2) Based on empirical data from four ERP implementation projects, it provides illustrations of how managers can apply the curves in different project situations. (3) It provides a theoretical basis for empirical studies of learning and ERP (and other IT) implementations in different organizational settings. (4) It provides empirical justification for the development of learning curve theory in IT implementation. Crown Copyright © 2009.

  • 199.
    Poulsen, Amanda
    et al.
    Halmstad University, School of Information Technology.
    Nordén, Cassandra
    Halmstad University, School of Information Technology.
    "Alla har för mycket e-post, så är det.": En kvalitativ studie om hur chefer hanterar informationsöverbelastning2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Email is the most common communication tool for sending and receiving information at work. Despite emails advantages of being able to exchange information quickly and easily, research shows that the volume of emails has increased to the extent that it contributes to information overload. Email communication is expected to expose individuals, and especially managers, for even higher levels of information overload. Research shows that the problem is not about how managers could avoid information, but about how managers can handle email communication. This leads to the question: How do managers experience information overload within email communication and what coping strategies do they use?

    In order to gain an increased understanding of how managers handle information overload within email communication, we have used a qualitative research approach. With the use of a thematic analysis, we have been able to identify, analyze and detect recurring patterns of managers’ experiences. We then chose to create themes of how experiences can be understood to describe what experiences coping strategies are based on. The themes that we identified under the thematic analysis are: amount, always connected, interruption and organizational support. Together, the four themes create an understanding of how managers can experience information overload within email communication and that coping strategies they use. The study indicates that there are contrasts in managers experiences. An experience that one manager can perceive as overloading does not have to be overloading for another manager. This demonstrates that there is no single coping strategy for managing information overload within email communication.

  • 200.
    Pyaram, Yadagiri
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Rahman, Md Mashiur
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Radar Signal Processing on Ambric Platform: Implementing FFT and FIR algorithms and mapping on Ambric processor to evaluate massive parallelism2010Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    The advanced signal processing systems of today require extreme data throughput and low power consumption.The only way to accomplish this is to use parallel processor architecture with efficient algorithms.The aim of this thesis was to evaluate the use of parallel processor architecture in Radar signal processingapplications where the processor has to compute complex calculations. This has been done by implementingdemanding algorithms on Ambric Am2000 family Massively Parallel Processor Array (MPPA). The Ambricplatform evaluated in terms of Latency, Cycle Count per output sample and Efficiency of the developmenttools.The two algorithms chosen for implementation are Fast Fourier Transform (FFT) and Finite Impulse Response(FIR) algorithms. We have implemented parameterized versions of FFT and FIR. The FFT algorithmimplemented for N-point input for the range of 8 point to 32 point for complex input variables. It works for anygiven number of inputs within the range for given parameter values and mapped on Ambric processor withfixed point radix - 2. Another one is FIR algorithm for the range of 12 Taps to 64 Taps for complex inputvariables. The Implementation of algorithms shows that high level of parallelism can be achieved in MassivelyParallel Processing Arrays (MPPA) especially on complex algorithms like FFT and FIR.

12345 151 - 200 of 242
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf