hh.sePublications
Change search
Refine search result
12345 51 - 100 of 242
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Chowdhury, Soumitra
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Bergquist, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab). University of Gothenburg, Gothenburg, Sweden.
    Åkesson, Maria
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Architectural Characteristics of Digital Services Enabled by Embedded Technology: A Study on Remote Diagnostics Services2014In: Proceedings of the 47th Annual Hawaii International Conference on System Sciences: 6-9 January 2014: Waikoloa, Hawaii / [ed] Ralph H. Sprague, Jr., Los Alamitos, CA: IEEE Computer Society, 2014, p. 3909-3918Conference paper (Refereed)
    Abstract [en]

    In this paper, we characterize the architecture of digital services that are enabled by embedded technology. Digitalization with embedded technology in physical products has become a common phenomenon. In spite of growing instance of such digitalization, little is known about the architectural characteristics of digital services enabled by embedded technology. Based on a research on vehicular remote diagnostics services, we characterize the architecture of such digital services. Following the framework on layered modular architecture continuum, our findings provide the following architectural characteristics: i) the architecture of the digital services spans along the layered modular architecture continuum, ii) the application program of the digital services is simultaneously de-coupled and partly coupled with the embedded devices, iii) there exist layers within layer of the digital services, iv) application program layer of the digital services is a closed innovation platform. © 2014 IEEE

  • 52.
    Christner, David
    et al.
    Halmstad University, School of Information Technology.
    Norén, Rebecca
    Halmstad University, School of Information Technology.
    Just Arrived: Utmaningar med Lean UX2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 53.
    Chronwall, Anton
    et al.
    Halmstad University, School of Information Technology.
    Haapala, Jacob
    Halmstad University, School of Information Technology.
    Brolle ny på jobbet: En studie om RPAs påverkan på digital arbetsmiljö2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den ökade datakraften och digitaliseringen av arbete har bidragit till möjligheten att automatisera processer. En metod för att automatisera processer är med Robotic Process Automation (RPA), vilket utför regelstyrda uppgifter baserat på detaljerade processbeskrivningar. Användningen av RPA blir allt vanligare inom den offentliga sektorn. Ett exempel på detta är Trafikverket som infört RPA för att automatisera processer med målet att frigöra tid för medarbetare. Denna studie har undersökt vad Trafikverkets införande och användning av RPA har inneburit för den digitala arbetsmiljön. Studien har undersökt detta genom att genomföra intervjuer med medarbetare som påverkats till följd av införandet och användning av RPA eller varit delaktig i införandet av RPA-lösningen.

    Studiens bidrag skapar en ökad förståelse för vad införandet och användandet av RPA har för konsekvenser på digital arbetsmiljö i organisationer i den offentliga sektorn genom att presentera tre konsekvenser. Studien visar att användningen av RPA kan resultera i en initial oro och en upplevd minskad anställningstrygghet bland medarbetarnas. Nya arbetsuppgifter kan uppstå till följd av införandet av RPA, dessa kan upplevas som monotona och irritationsmoment av medarbetarna. Slutligen kan det innebära att medarbetare får mer tid till varierande och kvalificerade arbetsuppgifter med möjlighet till kompetensutveckling. Detta resulterar i att medarbetarna uttrycker en ökad förändringsbenägenhet gentemot fortsatt automatisering med RPA.

  • 54.
    Cukier, Wendy
    et al.
    Ted Rogers School of Management, Ryerson University, Toronto, Ontario, Canada.
    Ngwenyama, Ojelanki K.
    Ted Rogers School of Management, Ryerson University, Toronto, Ontario, Canada.
    Bauer, Robert
    Institute for Organizational Studies, Johannes Kepler University, Linz, Austria.
    Middleton, Catherine
    Ted Rogers School of Management, Ryerson University, Toronto, Ontario, Canada.
    A Critical Analysis of Media Discourse on Information Technology: Preliminary Results of a Proposed Method for Critical Discourse Analysis2009In: Information Systems Journal, ISSN 1350-1917, E-ISSN 1365-2575, Vol. 19, no 2, p. 175-196Article in journal (Refereed)
    Abstract [en]

    Since the 1980s, there has been a growing body of critical theory in information systems research. A central theoretical foundation of this research is Habermas’ theory of communicative action, which focuses on implications of speech and proposes general normative standards for communication. Habermas also places particular emphasis on the importance of the public sphere in a democratic society, critiquing the role of the media and other actors in shaping public discourse. While there has been growing emphasis on critical discourse analysis (CDA), there has been limited effort to systematically apply Habermas’ validity claims to empirical research. Moreover, while critical research in information systems has examined communication within the organizational context, public discourse on information technology has received little attention. The paper makes three primary contributions: (1) it responds to Habermas’ call for empirical research to ground and extend his theory of communication in every day critical practice; (2) it proposes an approach to applying Habermas’ theory of communication to CDA; and (3) it extends the reach of critical research in information systems beyond micro-level organizational concerns and opens up to critical reflection and debate on the impact of systematically distorted communication about technology in the public sphere.

  • 55.
    Djupsjöbacka, Helene
    Halmstad University.
    Elektroniska journalsystem och informationsdelning: En studie om vilka utmaningar som påverkar tillgången till patientinformation från olika journalsystem2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
  • 56.
    Dzonlic, Muris
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Informationssökningsprocess på Internet i studiesituationer2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Uppsatsen presenterar hur högskolestudenter och gymnasieelever av båda könen (killar respektive tjejer) hanterar informationssökning och källkritik på Internet i samband med studier. Syftet med studien är att se skillnader och likheter i tre sökaspekter (informationsbehov, sökstrategi och källkritik). Sedan vill jag se hur tre sökaspekter används av båda könen bland högskolestudenter och gymnasieelever. Undersökningen är en både kvantitativ och kvalitativ studie. Det kvantitativa inslaget bygger på enkätfrågor och öppna frågor medan det kvalitativa inkluderar intervjufrågor. Teoretisk referensram består av litteratur och vetenskapliga artiklar som ger teoretiskt stöd åt ett operationaliseringsschema och ger grund åt hela studien. Studien begränsas till högskolestudenter och gymnasieelever av båda könen som går medieinriktade studier, oberoende av årskursnivå. Ett oväntat resultat som studien visade är, att både högskolestudenter och gymnasieelever av båda könen tittar mest på sina träffar ”Till mitten pålistan”. I studien upptäcktes att högskolestudenter och gymnasieelever av båda könen har kunskap om källkritik, men det stora problemet hos båda grupperna är ”Tidsbrist” och ”Har inte lust”, så att de undviker granska källor på Internet. Högskolestudenter och gymnasieelever av båda könen är medvetna om konsekvenserna som kan uppstå om de inte kritisk granskar källor på Internet. Det sökmönster som högskolestudenter och gymnasieelever av båda könen använder är att de först söker med bred sökning och sedan med smal sökning. Deras val av sökverktyg är ”Google” och de söker mest med sökord.

  • 57.
    Eagen, Ward M.
    et al.
    Ryerson University Toronto, Ontario M5B 2K3 Canada.
    Ngwenyama, Ojelanki K.
    Ryerson University Toronto, Ontario M5B 2K3 Canada.
    Prescod, Franklyn
    Ryerson University Toronto, Ontario M5B 2K3 Canada.
    The Design Charrette in the Classrooms as a Method for Outcomes-based Action Learning in IS Design2008In: Information Systems Education Journal, ISSN 1545-679X, Vol. 6, no 19Article in journal (Refereed)
    Abstract [en]

    This paper explores the adaptation of a traditional studio technique in architecture – the Design Charrette – to the teaching of New Media design in a large information systems program. The Design Charrette is an intense, collaborative session in which a group of designers drafts a solution to a design problem in a time critical environment. The Design Charrette offers learning opportunities in a very condensed period that are difficult to achieve in the classroom by other means and we have adapted its application from the architecture studio to for New Media instruction. The teaching of information systems has tended to rely heavily on conventional pedagogical approaches although there is growing recognition of the importance of experiential and applied learning. Ac- creditation standards have also placed added emphasis on outcome-based learning and encouraged more mindfulness concerning instructional design (Lee et. al., 1995; McGourty et. al., 1999). As a consequence, more emphasis on experiential learning has emerged in recent years. Architecture has long been used as a reference discipline for Information Systems and much of the language used in information systems design is drawn from architectural discourse. However, while architectural design combines attention to history and form as well as function, most information systems design is driven by functional considerations. Teaching New Media design, like architecture, demands at- tention to the conceptual and aesthetic as well as the functional design perspectives and presents particular challenges. The Design Charrette, a short but intense effort to solve an architectural problem is an outcome focused form of action learning that has enormous potential to enrich the teaching of New Media design, in particular, and information systems in general.

  • 58.
    Ebbesson, Esbjörn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Facilitating Distributed Multi-stakeholder Co-creative Innovation Processes– A Case from the Media Industry2012In: IRIS: Selected Papers of the Information Systems Research Seminar in Scandinavia / [ed] Judith Molka-Danielsen, Christina Keller & Mikael Wiberg, Trondheim: Akademika forlag, 2012, Vol. 3, p. 69-82Conference paper (Refereed)
    Abstract [en]

    Facilitating distributed co-creative activities within an innovation process involving multi-stakeholder perspectives such as diverse user groups, designers and organizational representatives is a challenging task. The distance on a conceptual level between participants has the potential to lead to both barriers and opportunities for co-creative activities, while also changing the role of the facilitator. The paper aim to explore this phenomenon further through the research question: How can facilitators work towards bridging conceptual distance between stakeholders in distributed multi-stakeholder co-creative innovation processes?’

    The researcher investigated the work of facilitators within a co-creative innovation process of user generated content services with the media industry through a case study. A theoretical framework centered around communities of practice and boundary spanning were used to gain an understanding of the facilitators work. The study concludes that the development of a shared language, use of boundary objects to aid translation and outer-level brokering before and during innovation activities are important processes that a facilitator use to decrease conceptual distance.

  • 59.
    Ebbesson, Esbjörn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Fragmented Digital Infrastructures: The case of Social (News) Media2015In: 21st Americas Conference on Information Systems (AMCIS 2015), Red Hook, NY: Curran Associates, Inc., 2015, p. 1172-1182Conference paper (Refereed)
    Abstract [en]

    Digitization and contemporary use of social media platforms is changing how we perceive and use IT, both in organizations and as citizens or consumers. These developments have also transformed and changed many industries, bringing both opportunities and challenges. One industry that was affected by digitization relatively early is the media industry, leading to studies on online journalism, gatekeeping, reader interaction and other changing practices enabled by IT.

    This study attempts to highlight the IT infrastructure behind the changing practice to understand the relationship between the IT and the use. Through an online ethnography, this paper investigates the use of social media platforms in the newspaper industry. The findings indicate that newspapers either use an integration strategy, where they relinquish control over the feature to the social media platform, or an appropriation strategy where they take the integration a step further, to have the social media platform work for them. 

  • 60.
    Ebbesson, Esbjörn
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Bergquist, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Dancing in the Dark: Social Media Tactics in the News Industry2016In: The 10th Mediterranean Conference on Information Systems, MCIS 2016, Paphos, Cyprus, September 4-6, 2016, 2016, article id 20Conference paper (Refereed)
    Abstract [en]

    The news media ecosystem has expanded over the years leading up to today’s society to include advertisers, newspapers and other media houses, content producers, along with new players like social media platforms to together form a value packed mix of services for end-users to embrace. The shift from being a dominant platform owner concerning the printed paper, often with its own distribution network, presents the newspaper with many challenges when transforming into, or entering other platform owners’ ecosystems. While previous research has mainly focused on the newspaper industry’s development of strategies for embracing social media into their ecosystem, this study investigates newspaper workers’ social media usage for the purpose of attracting attention and generating value. The study of newspaper workers’ practices shows that, moving into digital platforms controlled by other dominant actors in the ecosystem, workers enact a tactical approach. Two tactics are identified: adaption and exploitation. The paper contributes with empirical insights into how newspaper workers develop practices to embrace social media that goes beyond previous research on social media strategy. We also apply the theory of everyday tactics developed by Michel de Certeau as a scaffold to theorize newspaper positioning in the rapidly changing news media landscape.

  • 61.
    Ebbesson, Esbjörn
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Svensson, Jesper
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Criteria for social software implementation in Living Labs2012In: ISM 2012 workshop proceedings: Innovation through Social Media / [ed] Asbjørn Følstad, Anna Ståhlbröst, Esbjörn Ebbesson, Jesper Svensson, Trondheim: Akademika forlag, 2012, p. 32-40Conference paper (Refereed)
    Abstract [en]

    Halmstad Living Lab has extended experience of working closely with end-users in cocreation projects and has, during recent years, started to experiment more and more with social software and other online software programs to include users in the innovation process. In this paper we draw upon our experiences as a Living Lab to generate a framework that details key criteria for implementation of social software in a Living Lab setting. The framework can be used to guide successful implementation of social software in co-creation projects and to help evaluate or assess proposed solutions to be used in a Living Lab setting to support user involvement.

  • 62.
    Ekengren, Rikard
    et al.
    Halmstad University, School of Information Technology.
    Nilsson, Jakob
    Halmstad University, School of Information Technology.
    Hantering av utmaningar med molnbaserade affärssystem: En studie om molnbaserade affärssystemsutmaningar och hur IT-konsulters roll kommer att förändras2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cloud services is a trend that increasingly affects customer organizations and isconsidered to be the future of how IT services will be consumed. Previous studies showseveral challenges with cloud-based ERP systems. These challenges mostly concern oncustomer organizations, ERP systems and aspects such as functionality, costs andcustomization. What is less explored, are what implications the digital development,where ERP systems are increasingly becoming cloud-based has for IT consultants. Thepurpose of this study has therefore been to provide recommendations for how ITconsultants can handle the challenges that cloud-based ERP systems create. By using adata-driven thematic analysis, several challenges that IT consultants face have beenidentified. The conclusions of the study have contributed with recommendations on thefollowing categories of challenges: Customer organizations needs and integration;Competence development; Communication; Digital platforms and System vendorrelationship. The different challenges are handled in several different ways. Forinstance, IT-consultants can sign Service Level Agreements with the system vendor toensure access to parts of the Cloud-based ERP they consider necessary. They also needto be aware of new technologies such as low-code development tools. According to thestudy, the role of IT consultants will change due to cloud-based ERP systems.

  • 63.
    Ekwall, Andreas
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Braaf, Johanna
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ekologiska val i en e-handelskontext: En mental modell över användares köpbeteende2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Buying ecologically not a new phenomenon, but as to both e-commerce and the demand for organic products is constantly increasing, so support is required for designers to meet these challenges. In order to design e-commerce websites with ecological options requires an understanding of the user and their needs. By mapping the targeted behaviors you can detect when a user is susceptible to an ecological choice for an e-commerce website. A mental model is built based onuser's targeted behavior, and this can be used to support the designers to understand when a user is more susceptible to ecological choices on an e-commercewebsite. This study results in the identification and mapping of when a user is more open to ecological choices.

  • 64.
    Ericsson, Eric
    et al.
    Halmstad University, School of Information Technology.
    Kirkhoff, Robin
    Halmstad University, School of Information Technology.
    Resiliens mot social engineering: En studie om organisationers förmåga att hantera social engineering.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Given the major technological development that has been made in the last decades, companies and organizations draw benefit from these technological means to communicate in new ways rather than using old school methods like snail-mail. This has led to many new attack vectors for culprits looking to commit fraud. These attack vectors have proven to be very effective given the fact that culprits can target massive volumes of potential targets. The purpose of this report was divided into two parts, investigate to what extent employees were aware of the phenomena “social engineering” as well as conducting a literature study to gather knowledge about common attacks and defence mechanisms to counter these attacks.

    To investigate the awareness regarding “social engineering” of employees in different organizations, eight different qualitative interviews were conducted with employees of different organizations. To gather knowledge about common social engineering attacks an extensive literature study was done.

    The interviews revealed that many employees had low awareness about social engineering and many of them also failed to manage their credentials to IT-systems in a safe way. The interviewed subjects also shared a low awareness regarding their organizations policies regarding IT-security.

    The literature study revealed that social engineering attacks come in many different forms.Many of the attacks are very similar but regarding who they are targeting, or which mediumis used for the attack they can receive a different name. The social engineering attack called “phishing” was the most recurrent type of social engineering attack and hence a lot of this thesis is focused on this attack. Examples of authentic successful phishing attempts arepresented.

  • 65.
    Eriksen, Lars Bo
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ihlström, Carina
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Evolution of the Web News Genre - The Slow Move Beyond the Print Metaphor2000In: Proceedings of the 33rd annual Hawaii international conference on System sciences, January 4-7, 2000, Manui, Hawaii: abstracts and CD-ROM of full papers, Los Alamitos: IEEE Computer Society , 2000, p. 3014-Conference paper (Refereed)
    Abstract [en]

    Based on repetitive visits to three Scandinavian newspaper organizations, this paper presents trajectories of evolution for three Scandinavian news sites from 1996to 1999. Genre awareness is an explanation of how usersand designers create and maintain web site awareness beyond the individual site. In the paper genre iselaborated in terms of content, form and rationale. From the data it is concluded that web news by 1999 possess characteristics that makes it distinctive from print mediaand web news sites from 1996. The immediacy of the web affords the provision of news in a continuous pattern similar to “live” reporting. Primary content of web newsis hard news that affords users to visit news sites throughout the day in order to stay informed. In comparison to print media, the web genre has introduced composites to support the users in overview, navigation and browsing of the content of a news site.

  • 66.
    Eriksen, Lars Bo
    et al.
    Intermedia, Aalborg University.
    Ihlström, Carina
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    In the path of the pioneers: longitudinal study of web news genre1999In: Proceedings of the 22nd Information Systems Research Seminar in Scandinavia (IRIS 22): "Enterprise Architectures for Virtual Organisations", Volume 1 / [ed] Timo K. Käkölä, Jyväskylä: University of Jyväskylä , 1999, p. 289-304Conference paper (Refereed)
    Abstract [en]

    Based on repetitive visits to three Scandinavian Newspaper organizations, this paper presents an analysis of the evolution of the web news genre from 96 to 99. Genre awareness is an explanation of how users and designers create and maintain web site awareness beyond the individual site. In the paper genre is elaborated in terms of content, form, rationale and work. From the data it is concluded that web news by 99 possess characteristics that makes it distinctive from print media and web news sites from 96. The immediacy of the web affords the provision of news in a continuous pattern similar to “live” reporting. Primary content of web news is hard news that affords users to visit news sites throughout the day to stay informed. In comparison to print media, the web genre has introduced composites to support the users in navigating and browsing the content of a news site. Internal resistance towards new media has been reduced from 96 to 99 as a consequence of increased competition in the web media.

  • 67.
    Eriksen, Lars Bo
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Ihlström, Carina
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Palmer, Jonathan
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    News: From product to service2000In: Planet Internet / [ed] Kristin Braa, Carsten Sørensen, Bo Dahlbom, Lund: Studentlitteratur, 2000, p. 87-112Chapter in book (Refereed)
  • 68.
    Eriksson, Magnus
    et al.
    Halmstad University, School of Information Technology.
    Özgurdamar, Özgür
    Halmstad University, School of Information Technology.
    En bortglömd målgrupp? En studie i hur design kan främja tillgänglighet för illitterata.2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den teknologiska utvecklingen har lett till att människor har fått större insikt i sina rättigheter och behov. Detta har lett till att tillgängligheten för digitala tjänster har utvecklats markant det senaste decenniet. Dock finns det målgrupper som fallit mellan stolarna. Den här undersökningen har genomförts för att besvara hur ikonbaserade gränssnitt kan designas för en illitterat målgrupp. Det gjordes med en designorienterad ansats och resulterade i tre designförslag som beskriver vad designers bör tänka på för att på ett framgångsrikt sätt designa för illitterata populationer.

  • 69.
    Eriksson, Marcus
    et al.
    Halmstad University, School of Information Technology.
    Pujol Gibson, Ricard
    Halmstad University, School of Information Technology.
    Utmaningar i upphandlingsprocessen av Big datasystem: En kvalitativ studie om vilka utmaningar organisationer upplever vid upphandlingar av Big data-system2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Organizations today have access to massive amounts of data that cannot be handled by traditional Business Intelligence tools. Big data is characterized by big volume, high velocity and variation. Organizations need to acquire a Big Data system, in order to handle the characteristics of the data and be able to generate business value. Today’s organizations are aware that investing in Big Data can be profitable but getting there is a challenge. The purpose of this study is to investigate the challenges the organizations may experience in the process of acquiring a Big Data system and when these challenges arise. The empirical data has been collected by interviewing three large Swedish companies and authorities which have acquired a Big Data system. The Critical Incident Technique has been used in order to identify the challenges which the organizations had experienced in the process of acquiring a Big Data system. The findings of the study shows that organizations experience challenges when they are understanding the need of the Big data‐system, creating the project team, choosing the project method, defining the requirements of the system and managing sensitive and personal data.

  • 70.
    Ewertsson, Carolina
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Johansson, Erica
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Lärplattformar: en explorativ studie om lärstilar och funktioner vid distansundervisning2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Learning management systems are currently used increasingly in distance education. Research indicates that learning styles are important factors to consider in distance education, however, the area regarding learning styles in relation to learning management systems is relatively unexplored, and there is no clear knowledge of how learning management systems can be designed to support different learning styles. This study investigates learning styles in relation to the features in learning management systems, through an explorative approach and study with design elements. Based on a literature study we identified features of a learning management system, which was put in relation to Kolb's theory of learning styles in order to lead to a number of recommendations for education and use of features, which formed the basis for the design of a prototype. The prototype served as the basis for the empirical investigation, in which interviews constituted testing of the relevance of the recommendations, and the mapping of the features of the learning management system to support different learning styles in use. The study resulted in eight design guidelines, and contributes to the shortage that currently exists in terms of how learning management systems can be designed to support different learning styles.

  • 71.
    Fan, Yuantao
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Nowaczyk, Sławomir
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Intelligent Systems´ laboratory.
    Rögnvaldsson, Thorsteinn
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), CAISR - Center for Applied Intelligent Systems Research.
    Evaluation of Self-Organized Approach for Predicting Compressor Faults in a City Bus Fleet2015In: Procedia Computer Science, ISSN 1877-0509, E-ISSN 1877-0509, Vol. 53, p. 447-456Article in journal (Refereed)
    Abstract [en]

    Managing the maintenance of a commercial vehicle fleet is an attractive application domain of ubiquitous knowledge discovery. Cost effective methods for predictive maintenance are progressively demanded in the automotive industry. The traditional diagnostic paradigm that requires human experts to define models is not scalable to today's vehicles with hundreds of computing units and thousands of control and sensor signals streaming through the on-board controller area network. A more autonomous approach must be developed. In this paper we evaluate the performance of the COSMO approach for automatic detection of air pressure related faults on a fleet of city buses. The method is both generic and robust. Histograms of a single pressure signal are collected and compared across the fleet and deviations are matched against workshop maintenance and repair records. It is shown that the method can detect several of the cases when compressors fail on the road, well before the failure. The work is based on data from a three year long field study involving 19 buses operating in and around a city on the west coast of Sweden. © The Authors. Published by Elsevier B.V.

  • 72.
    Fareedi, Abid Ali
    et al.
    LimeSense AB, Stockholm, Sweden.
    Ghazawneh, Ahmad
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Department of Business IT, IT University of Copenhagen, Copenhagen, Denmark.
    An Ontology Approach for Knowledge Acquisition and Development of Health Information System (HIS)2018In: Designing Digitalization (ISD2018 Proceedings) / [ed] B. Andersson, B. Johansson, S. Carlsson, C. Barry, M. Lang, H. Linger, & C. Schneider, Lund, 2018, Vol. 27, p. 607-621, article id 55Conference paper (Refereed)
    Abstract [en]

    This paper emphasizes various knowledge acquisition approaches in terms of tacit and explicit knowledge management that can be helpful to capture, codify and communicate within medical unit. The semantic-based knowledge management system (SKMS) supports knowledge acquisition and incorporates various approaches to provide systematic practical platform to knowledge practitioners and to identify various roles of healthcare professionals, tasks that can be performed according to personnel’s competencies, and activities that are carried out as a part of tasks to achieve defined goals of clinical process. This research outcome gives new vision to IT practitioners to manage the tacit and implicit knowledge in XML format which can be taken as foundation for the development of information systems (IS) so that domain end-users can receive timely healthcare related services according to their demands and needs.

  • 73.
    Ferguson, Isaac Yaw
    Halmstad University, School of Information Technology.
    The Effectiveness of Social Engineering as a Cyber - Attacking Vector: People Do Use Unknown USB Drive, They Find2017Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    Information security importance is rising. Information security awareness' is spreading, and this gives a clear picture of the growing demand for information security. Information security does not only consist of essential information but also the customer. An information system could be either a system user or a device. Protecting vital information is one of the security issues facing our modern technology, but also protecting system users. System users are the weakest link in information security chain due to wrong prioritizing of information security.Standardization of information security must not differ across organizations. Although every organization has a prioritized level of protection, managing information security should not be completely different from one organization over the other. However, this is not the case. The standards of information security across multiple organizations differ. The gap between organizations concerning information security is enormous. The difference between organizations is due to how organizations value their information access. One of the main security issues confronting information security is the end-user security. System users are still the weakest link in the information security chain. An organization's security cannot depend only on the implemented system, but also, the security level of the system users. The end-users within an organization are essential in cultivating better information security practices. Neglecting end users' importance in information security makes it easier for cyber-attacks and end-users manipulations.The inability to protect end-users as a physical system exposes the possibilities of manipulating end-users through various Social Engineering techniques to elicit essential information. Social Engineering is the term used to influence a person without their knowledge to give out sensitive information. Social Engineering comprises of different factors; psychology and computer science. Social Engineering acquires vital information by manipulating the weakest link in information security chains, the system user.Social Engineering proves that end-users are still the weakest link in the information security chain. This experiment demonstrates that people do use unknown USB drive they find. The consequences of this act, in general, could be harmful. Moreover, that, there are possibilities through Social Engineering, to expose organizations' systems infrastructures to cyber-attacks.The result from this project visualizes that, the most valuable assets an organization has are the people within the organization. An organization employee could expose a well-secured system to cyber-attacks without knowing about it.

  • 74.
    Gabrielsson, Annie
    et al.
    Halmstad University, School of Information Technology.
    Johansson, Lisa
    Halmstad University, School of Information Technology.
    Riskhantering för molnbaserade affärssystem: En studie om hur organisationer hanterar risker som kan uppkomma i samband med användandet av molnbaserade affärssystem2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Idag finns affärssystem tillgängliga som molntjänster som innebär att en leverantör tillhandahåller ett affärssystem som en tjänst som hyrs ut till organisationer via internet. Molnbaserade affärssystem kan föra med sig fördelar men det kan även uppkomma risker i samband med användandet av systemet. En av de största anledningarna till att organisationer tvekar på att anskaffa molnbaserade affärssystem är riskerna som kan uppkomma. Risker kan inte elimineras utan de behöver hanteras och förminskas till en hanterbar nivå. Frågan är inte längre om organisationer kommer att börja använda molntjänster, utan att när de väl gör det har skapat planer för hur de ska hantera riskerna. Genom att hantera risker erhåller organisationer en större möjlighet att kunna uppnå sina mål.

    Denna studie har undersökt hur organisationer hanterar risker som kan uppkomma i samband med användandet av molnbaserade affärssystem. Genom en kvalitativ undersökning visar studien att organisationer identifierar, analyserar och utvärderar risker tillsammans med anställda inom organisationen. Organisationer anser att molntjänstleverantörer kan erbjuda högre säkerhet i ett system än vad organisationen själv kan uppnå. Därför väljer organisationer att åtgärda risker genom befintliga åtgärder som molntjänstleverantören erbjuder. Resultatet bidrar med kunskap om hur risker som kan uppkomma i samband med användandet av molnbaserade affärssystem hanteras i praktiken utifrån användarnas perspektiv.

  • 75.
    Gavelin, Emil
    et al.
    Halmstad University, School of Information Technology.
    Gidensköld, Tinny
    Halmstad University, School of Information Technology.
    RFID-(o)säkerhet med enkla medel2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Genom att använda enkla medel i de undersökande experiment som utförts påvisas fortsatt stora brister i RFID-säkerheten hos MIFARE-enheterna. Där dyr och avancerad utrustning tidigare varit ett krav för att utnyttja bristerna kan nu betydligt billigare och mer lättillgänglig utrustninganvändas. Med hjälp av en Arduino och en mobiltelefon kan exempelvis resekort, passerkort och bankkort läsas av och delvis eller helt kopieras för att utnyttjas i ont syfte. Diskussion förs kring CIA-triangelns tre delar, konfidentialitet, integritet samt tillgänglighet. I och med att det i dag är mer eller mindre omöjligt att välja bort RFID-tekniken, ger examensarbetet även förslag på lösningar till de säkerhetsbrister som påvisas. Utöver detta tar uppsatsen även upp RFID-relaterade brott samt den pågående rättegång där en busschaufför misstänks för bedrägeri genom att sälja falska resekort.

  • 76.
    Gelzinis, Adas
    et al.
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Verikas, Antanas
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS).
    Bacauskiene, Marija
    Department of Applied Electronics, Kaunas University of Technology, Lithuania.
    Categorizing laryngeal images for decision support2007In: Advanced Concepts for Intelligent Vision Systems: 9th International Conference, ACIVS 2007, Delft, The Netherlands, August 28-31, 2007 ; proceedings / [ed] Jacques Blanc-Talon, Wilfried Philips, Dan Popescu, Paul Scheunders, Berlin: Springer Berlin/Heidelberg, 2007, p. 521-530Chapter in book (Refereed)
    Abstract [en]

    This paper is concerned with an approach to automated analysis of vocal fold images aiming to categorize laryngeal diseases. Colour, texture, and geometrical features are used to extract relevant information. A committee of support vector machines is then employed for performing the categorization of vocal fold images into healthy, diffuse, and nodular classes. The discrimination power of both, the original and the space obtained based on the kernel principal component analysis is investigated. A correct classification rate of over 92% was obtained when testing the system on 785 vocal fold images. Bearing in mind the high similarity of the decision classes, the correct classification rate obtained is rather encouraging.

  • 77.
    Ghazawneh, Ahmad
    et al.
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS). Department of Business IT, IT University of Copenhagen, Copenhagen, Denmark.
    Mansour, Osama
    Jönköping International Business School, Jönköping University, Jönköping, Sweden.
    Bergquist, Magnus
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Strategizing in Digital Application Marketplaces2018In: / [ed] AIS, 2018, Vol. 29Conference paper (Refereed)
    Abstract [en]

    Digital application marketplaces have become an important strategizing device for many product developing firms. However, creating and sustaining digital application marketplaces are challenging tasks and only little empirical evidence exists about the role and nature of strategy for these marketplaces and how such strategizing actually unfolds in practice. Drawing on a case study of Apple’s App Store, we applied a strategy-as-process perspective to investigate the role of a digital application marketplace in the development of a digital platform. Our analysis identifies and describes three different strategies in the App Store case: monetizing, governing and enhancing, and demonstrates how they were enacted proactively or reactively to support the development of the platform.

  • 78.
    GOVIN, Sandra
    et al.
    Halmstad University, School of Business and Engineering (SET).
    ESPOSITO-FARESE, Cedric
    Halmstad University, School of Business and Engineering (SET).
    The use of Web tools in French companies2010Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Describe and explore how French companies having a Website/homepage use Web tools and their Website/homepage.

    The authors have gathered primary data through a quantitative research method. The research method chosen is the checklist observational method. The checklist used for this paper is composed of 29 items that have been observed on a sample of 20 French companies.

  • 79.
    Grimberg, Adam
    et al.
    Halmstad University, School of Information Technology.
    Nilsson, Marcus
    Halmstad University, School of Information Technology.
    Gamification - En hjälpande hand för träningsapplikationer2018Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [sv]

    Den här studien är utförd för att undersöka hur gamification hjälper träningsapplikationer att influera användarens beteende. Studien har utförts kvalitativt genom intervjuer Anledningen till att studien valde en kvalitativ ansats var att tidigare studier på ämnet hade fokuserat på den kvantitativa ansatsen. I litteraturstudien beskrivs vad som innefattar persuasive technology (övertalande teknik) som i studiens fall refererar till träningsapplikationerna. Litteraturstudien beskriver även vad som innefattar gamification och hur olika författare beskriver gamification. Efter beskrivningen av gamification tas det upp vad studien anser som viktiga delar av gamification och som ger stor vikt i studien. Efter litteraturstudien så beskrivs det vad för teman för litteraturen som sedan kommer användas i de andra delarna av studien. Slutsatsen av studien är ämnat att hjälpa designern med rekommendationer om hur gamification av träningsapplikationer kan influera användarens beteende. Med denna kunskapen ska designern kunna utveckla träningsapplikationer som med hjälp av gamification hjälper användaren. För att besvara undersökningsfrågan användes en kvalitativ undersökningsmetod genom semistrukturerade intervjuer. Detta för att få en djup bild i hur användare influeras av träningsapplikation och vad de känner hjälper dem. Det blev både ett praktiskt resultat och ett teoretiskt resultat från studien. Det praktiska resultatet är i form av rekommendationer för en designer. Det teoretiska resultatet var en djupare insikt i vad i gamification som hjälper en användare att känna intresse till att fortsätta använda en övertalande applikation. 

  • 80.
    Grimberg, Erica
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Karlsson, Maria
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Att betala med din Smartphone: Den digitala plånboken2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This essay is about what influences consumers to want to use a digital wallet. The digital wallet is the fifth generation of payment and have now come to digitize several features that the physical wallet offers. A transaction with the digital wallet is made by the consumer Smartphone. Assuming that Smartphones are becoming mobile wallets can be assumed that consumers would get used to the idea of leaving the physical wallet at home.

    It has previously been studies on adoption of mobile phones and how to generally embrace certain services but the digital wallet is a relatively new phenomenon and, therefore, is our thesis about the adoption of the digital wallet services.

    The conclusions we can draw from this paper is that security, simplicity, and interoperability on the digital wallet will affect whether the consumer chooses to use the service or not. For companies that deliver digital wallet services to achieve the greatest benefit, they should also ensure security, simplicity and compatibility as key elements in the presentation and launch of the service.

  • 81.
    Ha, Jonny
    et al.
    Halmstad University, School of Information Technology.
    Hallerhed, Tim
    Halmstad University, School of Information Technology.
    Affärssystem som Software as a Service, en populär lösning för små och medelstora organisationer trots risker?: En studie om vad som har betydelse för att organisationer accepterar risker och implementerar SaaS-baserade affärssystem2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The introduction of new technology in organizations is an ever-present area of research within ERP systems research. In recent years, the phenomenon of "Cloud Services", or Software as a Service (SaaS), is growing in popularity. Today, many ERP system suppliers offer their customers ERP systems as a cloud service. SaaS-based ERP systems give organizations advantages over traditional ERP systems that are installed locally in the organization, such as increased scalability, better accessibility, and lower implementation costs - which makes them particularly interesting for small and medium-sized organizations. However, SaaS-based ERP systems also involve risks that are related to, for example, lack of security, limited possibilities for system customization and integration, lack of system performance, and supplier lock-in. These risks may cause organizations to avoid SaaS-based ERP systems, despite identified benefits.

    Earlier research has identified both benefits and risks with SaaS-based ERP systems, but little is known about why small and medium-sized organizations choose to implement such systems despite the risks associated with them. The aim of the study is therefore to create an understanding of why small and medium-sized organizations choose to implement SaaS-based ERP systems, despite known risks. The study's results indicate that understanding of risks, trust and confidence in the system vendor, reduced internal competence needs, and the level of comparative advantages are important for organizations' willingness and acceptance to implement SaaS-based ERP systems, despite risks. The study’s conclusions also contributed with recommendations for how systems suppliers of SaaS-based ERP systems can develop their value propositions. For example, system suppliers are advised to be honest and transparent in communicating with customer organizations, as well as collaborating with customer organizations throughout the implementation phase and after the completion of implementation projects.

  • 82.
    Haavik, Maria
    et al.
    Halmstad University, School of Business, Engineering and Science.
    Ragnar, Kajsa
    Halmstad University, School of Business, Engineering and Science.
    Processförändring i samband med CRM-investering2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    En effektiv användning av CRM-system reducerar avstånden mellan kund och verksamhet, samt bidrar till ökad kundlojalitet, god service och bättre insamling av data och information. CRM-system är ett komplext helhetskoncept som kräver integration mellan hårdvara, mjukvara, människor och data. För att systemet ska fungera effektivt kräver det en nära relation mellan systemet och verksamheters affärsprocesser som vid implementering av CRM behöver förändras och utvecklas. Sedan 1990-talet har det varit en ökad efterfrågan på denna typ av system och fler verksamheter önskar investera i CRM-system för att skapa sig en konkurrenskraftig position på marknaden. Trots denna ökning har tidigare forskning visat att flera verksamheter misslyckas med investeringen och att systemet inte uppnår de mål och förväntningar som verksamheten har. En av orsakerna till att systemet misslyckas har visat sig vara brist på processförändring i samband med CRM-implementering.

    I denna studie undersöker vi vad CRM-system är och vilka fördelar systemet kan generera, samt vilken betydelse processförändringsarbetet har på verksamhetens utveckling och CRM-implementering. Utifrån empirisk data presenteras den relation som verksamheter har till processförändring i samband med införande av CRM, hur arbetet skiljer sig mellan verksamheter och i vilken utsträckning de arbetar med förändringen.

    Undersökningens resultat visar hur arbetet med processförändring kan påverka CRM- investeringen. Vi vill med detta arbete uppmärksamma verksamheter som investerar i CRM eller som idag är i behov av att förändra eller utveckla systemet, att i högre grad arbeta med processförändring i samband med CRM-implementation. 

  • 83.
    Hagen, Alexander
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Saengsuriyachat, Arthit
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    IT-säkerhet i praktiken2014Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Att kunna använda information på rätt sätt, och att kunna skydda sina informationstillgångar är livsviktigt för dagens företag. Skulle fel information komma ut kan det innebära allvarliga konsekvenser för företaget. Denna B-uppsats har fokus på nätverkssäkerhet. Uppsatsen kommer att, med hjälp av intervjuer, litteraturstudier och egna experiment, ge läsaren en bild av hur ett företags IT-infrastruktur ser ut, vilka olika typer av hot det kan utsättas för, samt vilka verktyg som kan användas för att hitta svagheter i ett företags IT-nätverk.

  • 84.
    Hammeltz, Mikael
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Mobila kartapplikationer: Interaktionselements inverkan på användbarhet2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Mobila applikationer har under senare år fått ett allt större användningsområde. En typ av applikation som blir allt populärare är mobila kartapplikationer. Denna uppsats belyser problematik kring mobila kartapplikationer och den brist som idag råder i fråga om att skapa gränssnitt med bra användbarhet till denna typ av applikationer. Uppsatsen identifierar och undersöker interaktionselement som används i två befintliga mobila kartapplikationer genom en kvalitativ studie. En inledande studie genomfördes för att identifiera interaktionselement i två befintliga mobila kartapplikationer; Yahoo! Go och Eniros mobila karttjänst.  Kartapplikationerna testades i en emulator för mobiltelefon av mindre modell eftersom det ansågs vara svårare att uppnå bra användbarhet desto mindre skärmytan i enheten är. Utifrån teori inom området kategoriserades interaktionselement in i fyra områden. Områdena var: navigering, innehåll, layout och feedback. Teorin sammanfattades i en teoretisk referensram. Undersökningen återkopplade även till användbarhet då det i uppsatsens syfte ingick att lyfta fram designriktlinjer, som utifrån användares perspektiv kan göra mobila kartapplikationer mer lätthanterliga. I studien samlades data in genom ett uppgiftsbaserat test där respondenterna uppmanades att tänka högt i syfte att fånga deras känslor kring gränssnittens olika interaktionselement. Det uppgiftsbaserade testet följdes av en intervju, där frågor som återkopplade till interaktionselement och användbarhet i de testade gränssnitten ställdes. Intervjun återkopplade även till de problem och kommentarer som respondenterna yttrat under testet. Resultatet av observationen och intervjuerna analyserades och ställdes mot den teoretiska referensramen och slutsatser kunde dras för hur olika interaktionselement påverkar i fråga om användbarhet i mobila kartapplikationer. De slutsatserna som kunde härledas var bland annat att scroll bör undvikas och att på vilket sätt knappsatsen utnyttjas av systemet påverkar användbarhet. Slutsatserna sammanställdes och presenterades som riktlinjer för att uppnå en högre användbarhet i mobila kartapplikationer.

  • 85.
    Hansen, Tone
    Halmstad University, School of Information Technology.
    A Digital Tool to Improve the Efficiency of IT Forensic Investigations2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The IT forensic process causing bottlenecks in investigations is an identified issue, with multiple underlying causes – one of the main causes being the lack of expertise among those responsible for ordering IT forensic investigations. The focus of the study is to create and evaluate a potential solution for this problem, aiming to answer research questions related to a suitable architecture, structure and design of a digital tool that would assist individuals in creating IT forensic orders. This work evaluates concepts of such a digital tool. This is done using a grounded theory approach, where a series of test sessions together with the answers from a survey have been examined and analyzed in an iterative process. A low-fidelity prototype is used in the process. The resulting conclusion of the study is a set of concepts, ideas and principles for a digital tool that would aid in the IT forensic ordering process, as well improving the efficiency of the IT forensic process itself. Future work could involve developing the concept further to eventually become a finished product, or using it for improving already existing systems and tools, improving the efficiency and quality of the IT forensic process.

  • 86.
    Hansson, Martin
    et al.
    Halmstad University, School of Information Technology.
    Magnusson, Olof
    Halmstad University, School of Information Technology.
    Blockkedjor: Teknik för bevaring av dataintegritet i industriella nätverk2018Independent thesis Basic level (degree of Bachelor), 180 HE creditsStudent thesis
    Abstract [en]

    In a perfect world, all data is handled in a secure and verifiable manner to prevent information from being changed, stolen or blocked. Today's infrastructure is based on centralized systems that are shaped to a few participants like government, authorities and institutions. This solution is not adaptable to the digital development, which has led to more information being stored and managed online. The blockchain has a great potential to decentralize how we store and manage data through efficiency, transparency and security. Blockchain technology has a variety of application areas such as finance, medicine and logistics, but can be summed up as a technology in which the algorithms are designed to create a distributed ledger of the information that is stored, which is a technique for getting the data replicated, synchronized, shared and spread geographically over a number of places. The purpose of the blockchain is to be used as a ledger of previous transactions in such a way that all involved nodes on the network are provided a copy of the chain, whereby all participants can verify with the others on the network that the chain has not been manipulated. This opens the questions: How does the landscape look like today? Which techniques are the most appropriate for industrial systems? What is required to get started with a blockchain technology in industrial networks? The purpose of the study is to investigate the most important techniques in the area and clarify the most suitable of the different techniques, taking into consideration the characteristics relevant to industrial systems. An experiment is also being conducted on how to use the blockchain technique based on a simple scenario taken from the industry. In summary, the blockchain is seen as an innovation with the potential to change how to securely distribute information in industrial systems. The result of this study is a survey and a demonstration that can lay the groundwork for decisions about how blockchains could be used in the future.

  • 87.
    H.Daryani, Sara
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Taslimi, Pouria
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Integrated Security by using MPLS-VPN for Retail-Banking Network: Case study Mehr bank, Iran2010Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    The studied application area is a private bank with different branches located in different provinces around the country. There was not integrated security solution to provide communication among different branches. Some of these branches could communicate through the satellite and the others could communicate through a different technology, such as asynchronous transfer mode (ATM).

    Different bank security policies were applied and maintained for different branches separately. In addition, the number of branches is expected to grow during coming year in each province.

    The old topology was partial mesh and it could not support enough redundancy in case of disruption. If a connection between two branches failed, other branches might lose their connectivity as well. In addition, it could not achieve optimum routing.

    Providing integrated quality of service (QoS) for the wide area network (WAN) by using different technologies is not easy to achieve, and it causes so many problems for the system. The bank uses a variety of protocols for different applications, depending on its demand, so the new applied technology should not depend on protocols, or at least should support different protocols at a same time. In the old technology, the bank was responsible for granting availability and connectivity maintenance. Providing proper bandwidth is an important aspect in the bank scenario and for the old technology; supplying enough bandwidth was costly.

    As mentioned above, the old applied technology was dependent upon different protocols. Therefore, packets in different open system interconnection layers (OSI layers) would have to check thoroughly to find the source/ destination address, data and so on, to reach the correct destination. This might cause security problems for entire system. In addition, processing packet in each layer of the OSI model is time consuming.

    One important aspect for the retail-banking scenario is considering all features of the security domain, such as security policy, information security, physical security, access level control, integrated security for the system and so on. Some features of the security domain in this project were not covering completely, such as integrated information security, merged security policy, and integrated physical security for the system.

    In this project, all mentioned problems are solved by implementing a specific communication technology which can overcome the problems above. This technology supports multiple protocols, and it provides fast and secure communication. It can also cover redundancy and it does not cost as much as previous technologies like ATM and satellite. Easy provisioning is one feature of this technology. In this technology, the service provider is responsible for granting availability and connectivity maintenance.

    The mentioned features of the security domain, which were not covered by the old technology, will be covered by a proper, integrated security solution. The IP-based physical security systems provide centralized monitoring and they can define a merged security policy for all different branches around the country. Specific, pre-defined scenarios are created for different events in different situations.

  • 88.
    Hedin, William
    et al.
    Halmstad University, School of Information Technology.
    Olsson, Benjamin
    Halmstad University, School of Information Technology.
    Designförslag för hur digitala utbildningsmedier kan designas för att stötta formativ feedback mellan lärare och studerande2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I dagsläget har lärare inom e-lärande svårt att identifiera var de studerande befinner sig i sitt lärande. Tidigare forskning inom traditionellt klassrumslärande visar på att formativ feedback är väsentligt för att utöka sina kunskaper, däremot har formativ feedback inte utforskats lika väl inom e-lärande. Syftet med denna studie var att ta reda på hur tidigare etablerade teorier för formativ feedback inom traditionellt klassrumslärande kan användas inom e-lärande. Detta genomfördes med en designorienterad forskningsansats där kategorier för formativ feedback inom traditionellt klassrumslärande implementerades i en prototyp. Detta för att kunna identifiera vilka delar av formativ feedback som var mest väsentliga inom e-lärande. Studien resulterade i tre designförslag för hur digitala utbildningsmedier bör designas för att kunna stötta formativ feedback mellan lärare och studerande.

  • 89.
    Heimfarth, Tales
    et al.
    Computer Science Department, Federal University of Lavras, Lavras, Brazil.
    Freitas, Edison Pignaton de
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Pereira, Carlos Eduardo
    Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Ferreira, Armando Morado
    Defense Engineering Graduate Program, Military Institute of Engineering, Rio de Janeiro, Brazil.
    Wagner, Flavio Rech
    Institute of Informatics, Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Experimental Analysis of a Wireless Sensor Network Setup Strategy Provided by an Agent-Oriented Middleware2011In: Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on: proceedings, Los Alamitos, Calif.: IEEE Computer Society, 2011, Vol. 0, p. 820-826Conference paper (Refereed)
    Abstract [en]

    This paper presents simulation results of a setup strategy for wireless sensor networks, based on an agent-oriented middleware. A great problem that has to be tackled in sensor networks is how to setup them to provide the data required from the user with a minimal overhead. Having this goal in mind, the proposed approach abstracts the network setup as missions, which are handled within the network by intelligent agents that disseminate and divide the work related to the missions. Several experiments using this approach are provided, showing its efficiency and the low overhead that it imposes to the network.

  • 90.
    Heimfarth, Tales
    et al.
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Pignaton de Freitas, Edison
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Rech Wagner, Flávio
    Federal University of Rio Grande do Sul, Porto Alegre, Brazil.
    Larsson, Tony
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS).
    Middleware Support for Wireless Sensor Networks: A survey2010In: Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice / [ed] Hai Jin & Wenbin Jiang, Hershey, PA: Information Science Reference, 2010, p. 235-260Chapter in book (Refereed)
    Abstract [en]

    Wireless sensor networks (WSNs) are gaining visibility due to several sophisticated applications in which they play a key role, such as in pervasive computing and context-aware systems. However, the evolution of WSN capabilities, especially regarding their ability to provide information, brings complexity to their development, in particular for those application developers that are not familiar with the technology underlying and needed to support WSNs. In order to address this issue and allow the use of the full potential of the sensor network capabilities, the use of a middleware that raises the abstraction level and hides much of the WSN complexity is a promising proposal. However, the development of a middleware for WSNs is not an easy task. Systems based on WSNs have several issues that make them quite different from conventional networked computer systems, thus requiring specific approaches that largely differ from the current solutions. The proposal of this chapter is to address the complexity of middleware made for sensor networks, presenting a taxonomy that characterizes the main issues in the field. An overview of the state-of-the-art is also provided, as well as a critical assessment of existing approaches. © 2010, IGI Global.

  • 91.
    Hejde, Alexander
    et al.
    Halmstad University, School of Business and Engineering (SET).
    Kylén, Peter
    Halmstad University, School of Business and Engineering (SET).
    10 kamp i fjärrvärme: Hur ett befintligt fjärrvärmesystem kan bli mer effektivt2010Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    District heating constitutes about 12 % (48 TWh) of the total energy usage in Sweden. Arguments for utilize district heating to provide housings and premises with heat are the possibility to use different kinds of fuels with various prices and quality, the good efficiency a centralized heating plant gives and the benefits of produce electricity and heat at the same time.

    The energy company HEM supplies Halmstad and surrounding area with district heating and the produced amount of energy 2009 was 596 GWh. Waste and bio fuels constitutes the largest part of produced energy but also industrial lost heat and small amounts of oil and natural gas are used to produce heat.

    The competitive situation for district heating is in many places close to monopolistic because only one major participant owns the market. It is important to improve a district heating system to maintain it’s ability to be competitive in the future. The following report investigates and describes interventions to make an already existing district heating system more efficient.

    From meetings with personnel, ten items has been presented evaluating different elements in the district heating system of Halmstad. These elements also give a view of how well HEM:s district heating system works in different areas.

    The conclusion of this report shows that the potential of a more energy efficient system is possible but the economical benefits are few.

  • 92.
    Hintze, Johannes
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    Gustafsson, Niklas
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), Halmstad Embedded and Intelligent Systems Research (EIS), Man and Information technology laboratory (MI-lab).
    En designstudie av social interaktion i kontextmedvetna musiktjänster2010Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Den här studien behandlar social interaktion i kontextmedvetna musiktjänster. Problemområdet innefattar design av musiktjänster för att stödja musikens sociala funktioner. Studien genomfördes som en designstudie där workshops tillämpades för att generera den data som låg till grund för slutsatserna. Slutsatserna presenterades i form av fyra stycken designriktlinjer; Hantera och presentera användares identiteter, Stödja dialoger, Erbjuda indirekt interaktion och Erbjuda direkt interaktion. De är inte avsedda för att designa en produkt utan istället för att bidra med kunskap som ger en förståelse om effekten av en design.

  • 93.
    Holdaj Petersson, Kalle
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Thunberg, Martin
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Adaptiva talbaserade system i fordon: Designförslag för att främja user experience2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This bachelor thesis aims to build an understanding how user experience can be promoted in an adaptive speech-based system, which is found in the context of an automobile. Investigating this particular context and system is of importance since the primary task is to drive safely and let the driver focus on driving rather than system. An adaptive system provides the opportunity to make the interaction more effective and a speech-based system lets the driver focus on the traffic environment. By studying relevant theory and by carrying out user tests, with the technique Wizard of Oz, we have drafted design and dialogue recommendations. These recommendations can promote user experience and make the interaction of the system more effective and pleasant.

  • 94.
    Holm, Filip
    et al.
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Lindberg, Susanne
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Användarskapat innehåll som läsarna vill ha: en studie bland läsare av webbtidningar2011Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    User Generated Content (UGC) has, with the fast-paced technological development, become increasingly popular in online newspapers. It is considered a competitive advantage but might entail risks for the newspapers, not in the least cost-wise. Thus it becomes important to invest in the UGC readers want, but what this encompasses is not a widely explored subject. This essay intends to answer what UGC readers of online newspapers prefer and why they prefer this particular content. On the basis of a literature study five aspects that can help describe UGC were identified. A diary study resulted in the identification of nine themes based on which it was possible to corroborate four of the aspects as well as identify a further five aspects that appeared to affect how readers view UGC.

  • 95.
    Holmqvist, Erik
    et al.
    Halmstad University, School of Information Technology.
    Marklund, Cecilia
    Halmstad University, School of Information Technology.
    Combining Digital Games and Rehabilitation2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    AbstraktGenom att använda digitala verktyg går det att stödja barn som är i behov av rehabilitering och på så sätt underlätta deras vardagliga liv. Digitala verktyg som inkluderar ett salutogent perspektiv blir ett allt mer förekommande tillvägagångsätt för att behandla och främja hälsa över en längre tid. Denna form av verktyg kan tillhandahålla aspekter som social interaktion, lärande, kamratstöd, motivation och underhållning. Genom att kombinera och sammanföra dessa aspekter med spelutveckling hoppas vi kunna svara på frågan: Hur kan spelmekaniker integreras och designas in i digitala verktyg för att användas som stöd för barn i rehabiliteringsprocesser?

    Studien har genom ett holistiskt perspektiv överblickat problemområdet och tagit hjälp av metoder från designforskningen för att praktiskt utforska frågeställningen. I studien har barn som inte lider av någon sjukdom inkluderats i en deltagande designprocess för att få feedback under hela utvecklingen. Detta gjordes för att bättre lämpa de framtagna prototyperna för en riktig slutanvändare i dess verkliga miljö. Även en sjuksköterska har intervjuats för att bredda vårt perspektiv inom vården.

    Vår slutsats är att en kombinerad metod som omfattar både riktlinjer från Serious Games och traditionell speldesign stärker spelets syfte som en helhet och bidrar med andra viktiga egenskaper som kan användas inom ramen för digitala rehabiliteringsverktyg. Vårt resultat avbildas i de prototyper som utvecklats samt de riktlinjer i hur mätning kan genomföras och designas i detta sammanhang. Dessa erfarenheter och kunskaper kan användas för att bidra till utvecklingen av liknande digitala spel och verktyg för barn.

    Nyckelord: Mätning inom spel, Kamratstöd, Salutogent perspektiv, Serious Games, Spelutveckling, Spelutveckling, barn och rehabilitering.

  • 96.
    Hultin, Alfred
    et al.
    Halmstad University, School of Information Technology.
    Josefsson, Adam
    Halmstad University, School of Information Technology.
    Implementering av Robotic Process Automation: En studie om hantering av utmaningar i samband med interaktion mellan lightweight IT och heavyweight IT2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Today’s competitive world of companies set high demands on the efficiency of organizations processes. Automatization of tasks is necessary to fulfill the need of frequently updated data that exists in today’s society. The processes of organizations therefore become more and more complex and automatic transactions, big data, and reality-time-applications are becoming more common. Traditional information technology (IT) also referred to as heavyweight IT is no longer enough for organizations to handle the constantly growing complexity in different processes. Instead the use of lightweight IT such as applications, platforms and mobile devices for work purposes is trending to give employees the support they need. An example of lightweight IT is Robotic Process Automation (RPA). RPA is a new phenomenon that merely interacts with other systems rather than integrate. The implementation of this new type of IT means new challenges for organizations when these projects cannot be treated as traditional system implementations.

    The study applies qualitative survey techniques where two projects have been investigated through interviews. The purpose of this study is to map out the interplay between RPA and the organizations other systems to identify the challenges caused by the divided views on interaction and integration. Based on the literature review we identified three main differences between interaction and integration where challenges can arise. These challenges created base for the empirical study. The conclusion then contains three guidelines that can help organizations handle the identified challenges. The guidelines are addressed to both buyers and consultants of RPA.

  • 97.
    Hune, Madelene
    Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
    Rätten till ett varumärke: ett svenskt företags kamp mot plagiatförsäljning över internet, Fjällräven2012Independent thesis Basic level (university diploma), 5 credits / 7,5 HE creditsStudent thesis
    Abstract [sv]

    Syftet med denna rapport är att få en inblick i hur ett stort internationellt företag som Fjällräven arbetar för att skydda sitt varumärke och goda renommé mot tillverkning, införsel och försäljning av plagiat. Rapporten baseras på en intervju med Fjällrävens säkerhetschef Christian Dalsgaard.

    Allt fler sajter skapas mer eller mindre dagligen för att rakt av sälja plagierade kläder av kända varumärken, såsom t.ex. Fjällräven, Haglöfs, Peak Performance och Canada Goose. På annons- och auktionssajter, som Blocket.se, Tradera.com och dess motsvarigheter i andra länder, kan privatpersoner göra sig till kriminella genom att medvetet eller omedvetet försöka sälja plagiat av varumärkesskyddade produkter. Kvalitén på plagiaten är bedrövlig och innehåller ofta otvättat dun, vilket innebär att det inuti jackan kan finnas rester av blod, vingpennor och benbitar. Det är självklart inte bara klädesplagg som plagieras utan det mesta som man kan tänka sig – bilar, flygplansdelar, jordbruksprodukter, tvättmedel, mediciner med mera. Framförallt har man inom läkemedelsindustrin fått in en farlighetsgrad bland pirattillverkare då många tabletter idag förfalskas med tveksamma ingredienser och blir en ren hälsofara för konsumenten.

    Fjällräven väljer att lägga ut stora pengar på att skydda sitt varumärke och företaget har under de senaste två åren kunnat skönja en minskad handel av plagiat med deras varumärke på internet. Deras satsning börjar ge goda reslutat, även om det kan tyckas vara en ojämn kamp.

  • 98.
    Hylving, Lena
    Viktoria Swedish ICT, Gothenburg, Sweden.
    A Call for Phronesis in Transport Research and Practice2016Conference paper (Refereed)
  • 99.
    Hylving, Lena
    Viktoria Swedish ICT, Gothenburg, Sweden & Oslo University, Oslo, Norway.
    Competing Values in the Era of Digitalization2015In: Proceedings of the 48th Annual Hawaii International Conference on System Sciences: HICSS 2015 / [ed] Tung X. Bui & Ralph H. Sprague, Jr., Piscataway, NJ: IEEE Computer Society, 2015, p. 4161-4170, article id 7070318Conference paper (Refereed)
    Abstract [en]

    This case study examines three different digital innovation projects within Auto Inc - a large European automaker. By using the competing values framework as a theoretical lens we explore how dynamic capabilities occur in a firm trying to meet increasing demands in originating and innovating from digitalization. In this digitalization process, our study indicates that established socio-technical congruences are being challenged. More so, we pinpoint the need for organizations to find ways to embrace new experimental learning processes in the era of digitalization. While such a change requires long-term commitment and vision, this study presents three informal enablers for such experimental processes these enablers are timing, persistence, and contacts. © 2015 IEEE.

  • 100.
    Hylving, Lena
    RISE Viktoria Swedish ICT, Gothenburg, Sweden.
    Digitalization Dynamics: User Interface Innovation in an Automotive Setting2015Doctoral thesis, comprehensive summary (Other academic)
12345 51 - 100 of 242
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf