The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, many devices and sensors we use in everydaylife are connected to the internet. We call this the IoT (Internet ofThings). With more things being used, it is getting more difficultfor users to use them efficiently. Without overcoming thischallenge, IoT cannot be vitalized. To solve this problem, manyvoice agent systems, including Apple Siri and Amazon Alexa, areextending their service domains...
In an Internet of Things vision of smarts museums, recommendation systems based on collaborative filtering approaches can be exploited in the context of providing personalized artworks tours. In this work, we address the problem of generating and then recommending an artworks sequence for a group of visitors within a museum. Differently from a recommender system for an e-commerce application, the...
Internet of Things (IoT) is the technique to connect each and everything to Internet, and it provides anything at anytime regardless of where the thing is located. If we connect devices in this way, by 2020, billions of devices will get connected to the Internet. The current trends shows that the deployment of sensors and IoT paradigm growing in a rapid pace. This shows that the next information revolution...
This work explores the Internet of Cultural Things (IoCT) and applications in the context of smart cities and learning cities. Ambient culture is advanced as an emergent form of the IoCT and applications in the context of 21st century everyday interactions in urban spaces. The constructs of awareness, learning, openness, and engagement enable formulation and operationalization of a framework for ambient...
The World Wide Web has emerged itself to be a huge repository of knowledge. Many websites provide lot of information regarding a topic of interest. In this paper this feature of WWW is made use for the concept of a dynamic encyclopedia. Apart from traditional web search and retrieval this paper deals with the construction of a web encyclopedia page by making use of relevant information from various...
The adoption of multi-stakeholder decision-making processes using online collaborative technologies for Internet governance has facilitated participation of stakeholders from many developing countries in decision making within organizations such as ISOC and ICANN. One important and underlying rationale that gives rise to such arrangements is the notion of consensus. The paper uses the work of Arrow...
This study explores the effect of general disposition to trust on the perceived trustworthiness of an online vendor in high-and low-context cultures. A total sample of 616 responses from users of online bookstores was collected from China and Finland. The results show that the disposition to trust has a highly significant effect on the three dimensions of trustworthiness namely ability, integrity,...
Analysis of digital discourse in social networks can inform decisions about service design and align services with customers' needs and expectations. Using the theory of social representations (SRT) as a theoretical lens, I propose a method for the systematic analysis of the digital discourse in order to identify the core representations on which a service depends. I demonstrate the method by analyzing...
Internet plays an increasingly significant role in our modern life style for our society, educational institution, engineering systems and industrial applications. It serves billions of users worldwide every day by carrying an extensive range of traffic from sources to desired destinations. Along with these advances, inter-domain routing nodes of internet are facing challenging issues like scalability...
Crowdfunding has thus far been run by stand-alone crowdfunding platforms, many of them formed by for-profit companies. However, a number of universities have begun to start their own platforms. These "corporate crowdfunding" platforms are likely to have more resources at their disposal than stand-alone platforms but less flexibility as the overarching organization exerts control and decision-making...
This study takes a network analysis perspective to understand communities of dissidents and allegiants formed on Facebook in relation to Sri Lanka's ethnic conflict. Networks representing dissidents and allegiants were formed based on levels of liking and commenting and analyzed across ethnic groups. The results show that the dissident network is more diverse in terms of ethnic composition and has...
The Internet of Things (IoT) creates a myriad of new business opportunities that focus on collecting, transmitting, and analyzing product data. IoT collaborations bring together diverse firms with separate skill-sets that both produce and utilize digitized data to co-create value. While previous research has explored the technical implications of IoT in great detail, it has largely ignored the business...
In the present mobile climate, both companies as well as their consumers are able to execute various processes at any time in any location using a myriad of wireless technologies. Organizational trends demonstrate that mobile devices are being utilized exponentially more to solve problems from the strategic planning level to the operational level through various departments. This propensity was recently...
Innovation competitions are considered to be an instrument by which companies can inspire customers and employees to generate value-added ideas. However, there is little research on how the quality contributions are made and by whom. In this paper, a case study-based analysis is carried out at a global telecommunications company. Through the analysis of log files, the participating users are categorized...
In recent years, Web 2.0 applications have found their way into organizational practice with increasing demand for corporate social software to support in-ternal (e.g. networking, knowledge transfer) and ex-ternal (e.g. user-interaction, collaboration) processes. Already organizational changes are starting to be-come visible, so our goal is to conduct an exploratory study in order to shed light on...
With millions of users worldwide, online dating platforms strive to assert themselves as powerful tools to find dates and form romantic relationships. However, significant differences exist in male and female use of this mate-matching technology with respect to motivation, preferences, self-presentation, interaction and outcomes. While existing research has routinely reported on gender differences...
Most information systems (IS) research focuses on the effect of gamification or the impact of emotions on IS adoption. Moreover, no study differentiates between digital natives and digital immigrants, although theoretically there should be differences in their IS adoption. Digital natives are those from the generation that has grown up with digital technology, their characteristics and behavior are...
We apply the notion of “popularity” in machine-generated sentence evaluation to the queries used to search for documents. Our intuition is that queries composed of popular terms obtain more relevant documents and increase the probability that these documents contain the desired results. We measure the popularity of a query by analyzing a massive online document repository, Korean Wikipedia. To verify...
Information underlies political participation, making information critical to governance and political systems, particularly in democracies. Furthermore, institutions critically shape distribution of information. In this sense, critical analysis of information flows within the Institutional Analysis and Development (IAD) Framework would importantly contribute to improved understanding of the political...
The purpose of this study is to explore students' perceived information security and privacy (IS&P) threats and to classify them in a way that helps in analyzing the problem, creating awareness measures and further improving students' IS&P education. Using a qualitative research approach, a group of forty two Master's degree IT students identified seventy five IS&P threats related to them...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.