The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Contemporary human behaviours using the Internet and social media are an extension of behaviours seen long before the knowledge society. In particular, online identities and avatars, and the behaviours associated with these, have strong precedents in literature, in philosophy and in medieval carnival. The philosopher Mikhail Bakhtin has described these phenomena in detail. The growth in scale of such...
A key question in sentiment analysis is whether sentiment ex-pressions, in a given text, are related to particular entities. This is an imperative question, since people are typically interested in sentiments on specific entities and not in the overall sentiment articulated in an article or a document. Sentiment relevance is aimed at addressing this precise problem. In this paper, we argue that exploiting...
Lessons learned from accident experiences in safety-critical infrastructures are valuable not only for the organizations operating the infrastructures but also for third-party organizations developing or operating similar safety-critical infrastructure systems. While such accident knowledge is often reported after rigorous investigations of the accidents, learning from the knowledge and applying them...
The promotion of the students' transversal or generic competencies is one of the key points of the new European educational framework. Today, companies hiring graduate students are not only concerned about their technical background but also transversal skills and competencies. Hence, it becomes necessary to adopt measures to promote and cultivate these competencies among students. The students' involvement...
The expectation on the creation of new business based on the combination of data from different domains, organizations, and sections, has been increased. It is important to consider which stakeholders are involved and how they are involved in the new businesses. However, the combination of stakeholders and their relationships in the scenarios depends on the context and has various patterns, making...
This paper tries to explore the industrial consumers' adoption of the Smart Grid solutions by investigating the socio — technical interaction between human and non-human actors of the Smart Grid. An ICT-adoption model integrated with the Actor Network Theory is adopted in this paper. Based on the case study approach with four Danish companies, this paper not only presents the influential factors to...
Nowadays companies are rapidly moving towards transforming their business into digital businesses. Being digital often means exploiting emerging technologies to enable new ways of serving customers. This paper presents two digital tools that have been designed to drive innovation in maintenance operations. A remote assistance collaboration tool combining wearable technologies and augmented reality...
Modern organizations, knowledge-based organizations in particular, seek new IT solutions supporting business processes and knowledge management realized by them. One of the solutions, postulated by the authors supporting the actions of such organizations may be computer software in the form of software agents, considered in our study in terms of software agents society. The purpose of this article...
This paper is devoted to the cloud computing model and the opportunities and challenges connected with its utilization by business organizations, including the most significant issues related to the cloud migration strategy. It is composed of five parts. In the first, some facts concerning cloud computing as a new technology and the reasons for organizations using this type of computing model are...
Refactoring has been defined as improving code quality without affecting its functionality. When refactoring is overlooked in daily development, the likelihood of larger refactorings increases with time. Disadvantages of larger refactorings include that they disrupt the daily work, require additional planning effort, and often they need to be justified to stakeholders. In this paper, we investigate...
Background: Technology transfer is one key to the success of research projects, especially in Software Engineering, where the (practical) impact of the outcome may depend not only on the reliability and feasibility of technologies, but also on their applicability to industrial settings. However, there is limited knowledge on the current state of practice and how to assess the success of technology...
In e-marketplace, semantic document exchange is a methodology of providing exchangeable semantic documents, which ensures document writer, writer's computer, reader's computer and document reader to share a same understanding in meaning on any exchanged document, that is, a semantic document is exchangeable across any heterogeneous contexts. Existing methodologies for semantic document exchange, in...
The rapid development in the IT area brings a series of shifts, in underlying theories, technology and work practices. In the normal course of events, most changes are evolutionary, with small, incremental improvements being made to theoretical understanding or practical application. Occasionally, however, changes occur of such magnitude that they do not just alter current operational practice but...
Developing a professional identity, as an engineer, has been the focus of engineering educators. However, previous research illustrates a lack of an integrated framework that conceptualizes the process to explain how individuals practice professional identities and what are the relations between educational design and such practices. We respond to this by proposing a conceptual framework that applies...
Undergraduate ethics instruction in engineering can be broadly divided into two models — disciplinary ethics (integrated within a course) and standalone semester-long ethics course. While both these models have educational value, they insufficiently prepare students in dealing with everyday routine ethical decision making that they might encounter in the workplace. This is because both these models...
One major problem in using static analyzers to manage, monitor, control, and reason about technical debt is that industrial projects have a huge amount of technical debt which reflects hundreds of quality rule violations (e.g., high complex module or low comment density). Moreover the negative impact of violating quality rules (i.e., technical debt interest) may vary across rules or even across contexts...
Manaus, the capital city of the state of Amazonas and the sixth Brazilian largest gross domestic product, demands highly qualified hardware and software developers for consumer electronics and telecommunication sectors of its free trading zone. However, what can be viewed as an opportunity for the youth alumni of local institutions of higher education contrasts with the low level of qualification...
Text actionability detection is the problem of classifying user authored natural language text, according to whether it can be acted upon by a responding agent. In this paper, we propose a supervised learning framework for domain-aware, large-scale actionability classification of social media messages. We derive lexicons, perform an in-depth analysis for over 25 text based features, and explore strategies...
This paper presents the results of an ethnographic study focused on how data science projects were conducted within a global media advertising company. Observations, via embedding a researcher within the team, as well as more structured interviews and surveys, are documented. Recommendations to improve the current data science methodology within the company are also discussed. Overall, there had been...
Many companies have recently introduced the concept of BYOD (Bring Your Own Device) for private mobile devices used at work. Accordingly, they are also introducing NAC and MDM systems to prevent the leak of business information, control access and manage users efficiently. As the access control policy of NAC and MDM is uniformly applied to the users, however, security threats remain due to the frequent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.