The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of Project Based Learning has spread widely over the last decades, not only throughout countries but also among disciplines. One of the most significant characteristics of this methodology is the use of ill-structured problems as central activity during the course, which represents an important difficulty for both teachers and students. This work presents a model, supported by a tool, focused...
It has become easier to create a lifelog by using smart phones. Lifelogs can be used in several ways. However, some problems exist in memory recollection; as many lifelogs owned by a person are partial information, it is impractical to remember days themselves. Therefore, a lifelog sharing system for memory recollection is proposed. The system elicits related information from other people's lifelogs...
Analyzing the role of target-related information in a security attack is an understudied topic in the behavioral information security research field. This paper presents an empirical investigation of the effect of adding information about the target in phishing attacks. Data was collected by conducting two phishing experiments using a sample of 158 employees at five Swedish organizations. The first...
The implementation of virtual teams becomes increasingly common practice in organizations around the world. The progress in the development of new communication technologies in the last two decades have changed the paradigm of how firms-both established and entrepreneurial-approach innovation and new product development (NPD). This study is interested in personal traits of virtual team members measured...
One success factor of teams and organizations is an effectively managed knowledge management system (KMS). However, these systems are even hard to develop in regular face-to-face conditions. Virtual teams as a form of geographically dispersed work arrangement offer significant opportunities for companies and organizations around the globe. But besides the advantages of those teams they pose additional...
In the last few years, the necessity of having documents in electronic format has been growing over and over. This phenomenon affects also healthcare organizations that have adopted a new model for managing clinical information based on so called Electronic Patient Records. On the one hand, the introduction of such models allows to easily share information among several and widespread healthcare organizations...
Sharing knowledge in a timely fashion is important in distributed software development. However, because experts are difficult to locate, developers tend to broadcast information to find the right people, which leads to overload and to communication breakdowns. We study the context in which experts are included in an email discussion so that team members can identify experts sooner. In this paper,...
This paper summarizes our approach to an interactional characterization of social functions of agent societies. The social-theoretic basis adopted for the interactional analysis of social functions is presented. The way the interactional notion of social functions relates to other concepts of social functions is indicated. A simple example of interactional functional analysis is given, as an application...
With the growth of modern systems and infrastructures, automated and intelligent response systems become the holy grail of the security community. An interesting approach proposes to use dynamic access control policies to specify response policies for such systems. These policies should been forced when an ongoing attack, that threatens the monitored system, is detected. However, existing work do...
Remote services are widely used in industry for control, operation, diagnosis and maintenance. In almost all sub-domains of automation and control, solutions for remote access of devices, machines and systems are established. Since coining the term teleservice more than three decades ago, most of the work has rather focused on specific technological solutions than on the general tasks and requirements...
Recently, the autonomic communication networks paradigm has been introduced as a solution to the increasing management complexity of communication networks in the Future Internet. In order to encompass the large-scale nature of these networks, a general consensus has been reached that the supporting autonomic management architectures should be distributed for scalability reasons. However, several...
The relationship between different types of conflict and performance in virtual teams is still unclear. Therefore, this paper tries to shed light on the relationship between conflict and team performance as well as the moderating role of culture. Using survey and archival data of 1,683 virtual teams from 23 countries from a massively multiplayer online game (MMOG), this study's findings show that...
Massively Multiplayer Online Games (MMOG) offer new promising opportunities to research virtual organizations and teams. The characteristics of MMOGs allow researchers to obtain objective data from a large and multi-national population. Lasting over months or even years, MMOGs facilitate longitudinal studies and ensure a high involvement of participants. Moreover, collecting data from online surveys...
Many network visualizations make the assumption that an administrator has previously determined the subset of data that should be visualized. Yet the problem remains that if the visualization provides no insight into the network events that warrant further consideration, then the administrator must go back to the data to determine what should be visualized next. This is a critical issue given the...
Workflow management systems (WFMS) are concerned with the control and coordination of operational business processes, called workflows. When workflow technology is deployed in domains where processes have simple coordinative requirements, the flow of control and data may be easily mapped onto process effectiveness. With the diversity of resources, subjects and activities in the system, ensuring a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.