The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Constrained Application Protocol (CoAP) has been developed as an alternative to the HyperText Transfer protocol (HTTP) to connect resource-limited devices to the Web. In addition to technical advantages, the success of Internet protocols depends also on their economic feasibility for the stakeholders involved in protocol deployment. Therefore, this paper studies the techno-economic feasibility of...
In this paper, a novel scheme of two-stage multiview image compression is proposed to create two-level reconstructed quality. Differently from the conventional multiview image compression algorithms, SIFT (Scale-Invariant Feature Transform) features matching from interview images are exploited to remove the correlations between multiple views. In the first stage coding, SIFT and RANSAC (RANdom SAmple...
Information systems projects nowadays often affect more stakeholders than before and the range of users is also more versatile. Thus, a need for a fine-grained conceptualization of involved actors, including users and developers as well as various other affected stakeholder groups, has been identified in the literature. Some studies have already discussed participatory processes for information infrastructure...
Although IT usage is generally known as a desirable behavior, addictive IT usage is likely to have some adverse consequences for individuals, organizations and even societies. This paper investigates IT addiction and aims to identify the mechanisms behind its development. Based on a thorough review of the literature, we conceptualize IT addiction as a psychological dependency on IT that involves excessive...
Three artifacts were examined in a Massive Open Online Course (MOOC) called Mechanical because there is no professor to offer the course. Employing the notion of inscription from actor-network theory, the analysis focuses on the action of facilitation embedded in these artifacts and the ways in which these actions unfold. Using online ethnography, this study attempts to explicate how the designers...
Attracting a large number of new contributors has been seen as a way to ensure the survival, long-term success, and sustainability of Free/Libre/Open Source Software (FLOSS) communities. However, this appears to be a necessary, but not a sufficient condition, as the well-being of FLOSS communities also relies on members behaving as "good citizens," to nurture and protect the community. This...
This study examines how administrative staff in the back-office aim to maintain the continuity and flow of their tasks that is critical for producing appropriate administrative results in time. Based on an ethnographic study of administrative work, the results suggest that administrative staff in a back-office environment prepare for information technology-related interruptions that may affect the...
As many IT projects continue to fail or stay in the area of challenged projects, the requirement to investigate this problem and to find solutions will continue. The current study is an exploratory examination to investigate challenged IT projects across Saudi organizations. Data were collected through a mixed method using the critical incident technique (CIT) with 15 experienced IT managers and a...
Information Technology (IT) has been used in large organizations since the 1950s for internal and external purposes. The pervasive use of technology in organizations has created a critical dependency on IT that calls for a specific focus on IT Governance (ITG). However, determining the right ITG mechanisms remains a complex endeavor. In this paper we propose to perform an exploratory research and...
Overcoming shortages of teachers or teachers with required skills and experience is a major challenge in rural schools in the global south. We investigate a classroom video conference multi-casting project under development by the Nepal Wireless Networking Project. Our case study draws on one-to-one interviews and focus group discussions from three areas and 10 village research sites in Nepal. An...
Recent technology acceptance studies have highlighted the importance of hedonic values when studying consumer information systems. The flow experience is often chosen as a theoretical construct to explain hedonic motivations in Web-related studies. However, when regarding consumer healthcare information systems, the relevance of hedonic values has received little attention. In this study Oinas-Kukkonen's...
The last decade has been unstable for the Information Technology (IT) professional. In the early millennium, an increased demand for ecommerce systems appeared in part because of increased use of information and communication technologies (ICT). However, the dotcom bust, the 2001 and 2007 recessions have created an increase concern on IT spending. Organizations have reduced not only IT purchases but...
This exploratory paper answers questions about how Facebook as a game platform influences players' game play, arguing that platforms can shape play as well as cheating behaviors in important ways. It is based on a survey of players of social network games, exploring their attitudes towards cheating in games such as The Sims Social and City Ville. It also includes results from follow-up qualitative...
By means of qualitative research methods, this study investigated the factors of negative experiences at different times regarding family trip destinations to explore the tourism experiences and the factors affecting negative experiences among family members. This study further probed the experiences of family members generated by tourism factories, thereby establishing a conceptual model regarding...
The task of creating a university invigilator schedule is important as well as difficult and tedious task. The problem involves choosing invigilators to invigilate examination, imbalance invigilation load between invigilators and identifying invigilators status. This paper will highlight the critical success factors of invigilation schedule which encompasses three hierarchical levels which are mandatory,...
This study aims to propose a knowledge sharing system model for Higher Learning Institutions based on academicians knowledge sharing behaviour. This research was carried out in four stages which are determined the knowledge acquisition, collected the data, data analyses and finding, and development of a knowledge sharing system model. The proposed knowledge sharing system model solves the problem...
Written communication skills are essential for engineers in the workplace, yet developing these skills in undergraduate engineering continues to be an issue. Curriculum innovation can be increased through the use of online writing tools that are designed to support integration of written tasks in engineering courses, along with the appropriate leadership communication and integration in the faculty...
The mining equipment technology services sector is driven by a reactive and user-centered design approach, with a technological focus on incremental new product development. As Australia moves out of its sustained mining boom, companies need to rethink their strategic position, to become agile to stay relevant in an enigmatic market. This paper reports on the first five months on an embedded case...
This study has been directed to disclose the attitudes of academic staff in Libyan universities towards Internet-based learning and training. The research for this study has been conducted using both quantitative and qualitative methods. The findings suggest that faculty members have positive attitudes towards integrating the Internet into the teaching process and an expectation that this will dramatically...
This paper introduced a user research case of youth in second and third-tier cities and focuses on the self-knowledge classification method implemented in the study. This case firstly studied the background, and then selected nineteen samples of users through the user funnel model. At last, researchers conducted the in-depth interviews used the self-knowledge methods. This method divided into three...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.