The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Business meetings conducted using fully-immersive telepresence systems provide participants with the lifelike-experience of a face-to-face meeting and offer the cost- and time-saving advantages of computer-mediated communication. However, telepresence systems are still much more expensive than simpler computer-mediated meeting modes, which makes the choice of this technology for business meetings...
Virtual citizen science (VCS) uses technology like the Internet to give volunteers the chance to participate in real scientific research. The success of VCS projects has prompted researchers to understand what motivates volunteer participation. 199 registered users of Zooniverse, a successful collection of VCS projects, completed a web survey assessing various possible motives for their participation...
In this paper we explore the design of Leyline, a provenance-based desktop search and file management system, both on a conceptual and user interface level. We start with a comparative analysis and classification of previous provenance based search systems, examining their underlying assumptions and focus, search coverage and flexibility, as well as features and limitations. We then describe a novel...
Organizations face growing risks from malicious or careless insiders. An insider threat may take many forms, including disgruntled workers, individuals under financial stress or intentional acts of espionage. Waiting for threats to manifest may leave an organization open to liability, hurt morale and in extreme cases lead to physical harm of others. However, predicting who may pose the greatest risk...
Requirements monitors provide high-level feedback on software usage in real-time. Herein, we show how low-level monitoring can identify behavioral transitions that can be interpreted as learning transitions by a post-clinical team. One monitoring technique is to apply stochastic modeling to the software's event stream. Herein, we show how dynamically generated hidden Markov models (HMMs) characterize...
In this paper, a qualitative case study of women-dominated Free/Libre Open Source Software (FLOSS) project is conducted to explore factors which successfully involve and sustain women FLOSS participants by drawing on Brown and Levinsonâs politeness theory. The culture and norms of FLOSS appear to be formulated by what is privileged/marginalized by men in the context of FLOSS, and such menâs...
Notice of an entity's personal information collection and usage practices is considered to be a prerequisite to an online user being able to make informed decisions on personal information disclosure. Notice is typically provided in privacy policies that are often characterized as vague, lengthy, and misleading. As such, notice typically does not equate to awareness of privacy threats. This study...
Longitudinal networks evolve over time through the addition or deletion of nodes and edges. A longitudinal network can be viewed as a single static network that aggregates all edges observed over some time period (i.e., structure of network is fixed), or as a series of static networks observed in different point of time over the entire network observation period (i.e., structure of network is changing...
Understanding the risks caused by relying on information systems is an enduring research stream in the Information Systems (IS) discipline. With information systems becoming ubiquitous, IS risks permeate every aspect of life and effective risk mitigation increasingly requires a holistic structure. We use the largest and oldest publicly available risk collection to understand the developments of IS...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.