The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
In this paper, novel method is introduced to establish content driving of engineering model entity definition and generation at computer description and representation of multidisciplinary industrial product system. Main objective of this work was developing new structure of driving content which made construction of requirements, functional, logical, and physical (RFLP) structured product model easier...
Cloud computing is an emerging economic modelthat provides a broad network access to services with manybenefits to many tenants at the same time. Although it createsa large potential to develop new online services the evolution ofcloud computing has been accompanied by the proliferation ofvarious attacks against the services on the cloud infrastructures. The importance of risk management in cloud...
In this work we examine the impact of informal contacts network in the context of organizational change. We use a cellular automata model with majority rule and movement but supplemented with additional mechanism which generates much more unbalanced network between agents. The structures of the emerged networks are briefly described and the outcomes of two variants of simulation experiments are presented...
It is mandatory for organizations to keep up with rapid and continuous changes to their business processes to be competitive. Business process simulation is a preferred way to improve these changes. Many business processes can start with partially filled data and run for a few days or even longer. Such business processes are defined as long running business processes. However, business process simulation...
A Maturity Model is a widely used technique that is proved to be valuable to assess business processes or certain aspects of organizations, as it represents a path towards an increasingly organized and systematic way of doing business. A maturity assessment can be used to measure the current maturity level of a certain aspect of an organization in a meaningful way, enabling stakeholders to clearly...
The aim of this study is to develop a conceptual model that could use to understanding the role of organizational factors in KMS acceptance. Theory Technology Acceptance Model (TAM) along with organizational factors are using in develop the conceptual model for this study. Study was conducted by collected and analysis relevant article in this area. Variable and indictors in the conceptual model was...
This paper summarizes an event which brought together modeling experts, users, potential users and healthcare management practitioners to explore the question of evidence in the field of healthcare: how it is, and how it should be, used. The paper is an abridged version of a full report on the event. The paper highlights the high status accorded to empirical evidence (generated, in particular by randomized...
This work introduces adversarial feature selection, a game between a feature selection agent and its adversary. The adversarial approach is drawn from existing work on adversarial classification. The feature selection algorithm selects a subset of features from the original set based on their utility towards classification accuracy. A cost is incurred based on features selected. The adversary modifies...
In recent years the technological world has grown by incorporating billions of small sensing devices, collecting and sharing real-world information. As the number of such devices grows, it becomes increasingly difficult to manage all these new information sources. There is no uniform way to share, process and understand context information. In previous publications we discussed efficient ways to organize...
The main purpose of this paper is to review the literatures on the adoption of Cloud Computing by SMEs in order to learn the current state of Cloud Computing studies and identify gaps for future research. Twenty-two articles were reviewed and analyzed from various journals and conference proceedings that were published on Cloud Computing adoption, acceptance, and diffusion. Findings revealed that...
(1) Background, Motivation and Objective: Academic study of Cloud Computing within Saudi Arabia is an emerging research field. Saudi Arabia represents the largest economy in the Arabian Gulf region. This positions it as a potential market of cloud computing technologies. Adoption of new innovations should be preceded by analysis of the added value, challenges and adequacy from technological, organizational...
This study highlights the importance of considering gender and offline cultural context when working in virtual teams. To this end, we examine gender differences in performance and participation within virtual teams in a popular online game, drawing from behavioral game data from game servers in nine countries, each representing a distinct region of the world. Results are compared to metrics from...
The internal organization of an Online Social Network is well described by the formation of groups between members. Often groups evolve in a very confusing way, due to occasional interactions between their components. However, it does not necessarily imply the formation of aggregation units in which users have similar interests and behaviour and, contextually, mutually trust with each others. Users...
This contribution provides an overview of cloud governance aspects based on a representative survey of trends in the perception, assessment and adoption of Cloud Computing within the enterprise. The survey was conducted through a two-fold research approach and combined a meta-study of existing and published empirical studies with an own empirical study within a representative group of European and...
Cloud governance, and in particular data governance in the cloud, relies on different technical and organizational practices and procedures, such as policy enforcement, risk management, incident management and remediation. The concept of accountability encompasses such practices, and is essential for enhancing security and trustworthiness in the cloud. Besides this, proper measurement of cloud services,...
This paper presents a Business Rule Extraction tool for COBOL systems. Starting from a COBOL program, we derive a model-based representation of the source code and we provide a set of model transformations to identify and visualize the embedded business rules. In particular, the tool facilitates the definition of an application vocabulary and the identification of relevant business variables. In addition,...
Knowledge is generally acknowledged as essential for everyday life and a requisite for quality of life. Although arguably more so for people with disabilities, disabled people are often excluded due to their impairments. Worsening this exclusion, the expected benefits of information and communications technologies (ICT) in enabling knowledge practices and for assisting disabled people has not been...
With such rapid growth in ICT innovation products, there were thoudsands research papers discussing about emerging ICT in many ICT products, analyzing or expose what and why do ICT emerge with peoples' activities. Some methods from litaratures related to emerging until accepting ICT (i.e. TAM, UTAUT) are also widely discussed. This paper analyze number of terms in emerging ICT to conduct the same...
This communication aims to identify factors fostering Information Technology (IT) acceptance by nurses in Morocco. It suggests a model based on the Unified Theory of Acceptance and Usage of Technology [1] extended by a new construct called “Trust”. The study was conducted in public and private healthcare organizations located in Agadir city, south of Morocco. It concerned 250 nurses, representing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.