The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Past research has suggested that social networking sites are the most common source for social engineering-based attacks. Persuasion research shows that people are more likely to obey and accept a message when the source's presentation appears to be credible. However, many factors can impact the perceived credibility of a source, depending on its type and the characteristics of the environment. Our...
Information underlies political participation, making information critical to governance and political systems, particularly in democracies. Furthermore, institutions critically shape distribution of information. In this sense, critical analysis of information flows within the Institutional Analysis and Development (IAD) Framework would importantly contribute to improved understanding of the political...
Research focused on values in information systems (IS) is conducted using a diversity of approaches, methods and theoretical frameworks. This paper presents a systematic literature review to investigate the relationship between values and materiality -- specifically, how researchers materialize values -- in IS research. Analysis of the literature demonstrates that IS researchers perceive the values...
With the advent of the internet, most organizations offer more and more access to their information systems in order to increase their benefits. However, such an opening may cause security issues if sufficient precautions are not taken. An adequate solution to secure access to information systems consists in (1) defining the sufficient security policies and (2) ensuring their correct deployment on...
As the amount of information offered by information systems is increasing exponentially, the need of personalized approaches for information access increases. This work discusses user profiles designed for providing personalized information access. We first present a general classification of research directions on adaptive systems, followed by a state-of-the-art study about user profiling. We propose...
Computer simulation has evolved to a standard means for planning, analyzing, and optimizing complex systems. Yet, a twofold usage can be observed: as a tool for generating data and as a method for deriving knowledge. The objective of this paper is to outline epistemological consequences arising from this methodological uncertainty by analyzing the state of discussion as well as challenges of using...
One important challenge in ERP implementation is the acceptance and usage of ERP systems by their users. This study aims to identify important antecendents of ERP acceptance and usage among individual users, considering specifically the complex nature of ERP systems. A research model was developed, incorporating two antecedents from DeLone and McLean IS success model, two technological related antecedents...
This study aims to build a smart hospital information framework to deal with various medical information. First, a ubiquitous smart hospital information system model under WaaS (Wisdom as a Service) architecture is proposed. With this model, medical information can be organized into different levels. In this model, novel methods of organizing medical information (offline computing) and smart services...
This study aims to examine continuance intention and success factors of E-learning systems. The scope of research is focused on educational purpose not including corporate training program. The results shows that service innovation, information quality, and system quality was the key factors of E-learning systems. These factors can helps the learner achieve better performance which enabling the users...
We outline a methodology for automatic and efficient object-relational mapping (ORM) in the context of model-driven development (MDD) of high-performance information systems specified with executable UML models. Although there are various approaches to performance tuning, we focus here on the persistence layer the relational database. The relational data model is usually designed following the well-known...
To keep up with the competition, organizations must be capable to dynamically change business process components at runtime. This problem has been relevant for many years; however, there is no proposed solution, which ensures the dynamicity. This paper presents analysis of related work on dynamic business processes, i.e. the analysis of definitions of dynamic business process and different views on...
This paper tries to explore the industrial consumers' adoption of the Smart Grid solutions by investigating the socio — technical interaction between human and non-human actors of the Smart Grid. An ICT-adoption model integrated with the Actor Network Theory is adopted in this paper. Based on the case study approach with four Danish companies, this paper not only presents the influential factors to...
Capability approach is hard to operationalize and capabilities are sometimes difficult to reduce into the individual level. We describe our approach to solve these problems paired with an adequate ICT infrastructure and believe that the impact of concrete eGovernment services will become more visible and available. Citizens can inspect it, professionals can target their re-engineering on failure cases,...
Societal changes are forcing us to reconsider how healthcare is delivered. Connected Health, which involves the application of ICT to support healthcare delivery, is an emerging trend in this space. A robust evaluation technique that considers the impact of Connected Health on society is a vital enabler for this growing area. For this reason, we developed an exploratory framework for the evaluation...
Quality requirements prioritization is a complex multi-criteria decision making process that stakeholders face in any phase of software development. Several surveys have been carried out to identify the most important quality requirements considered in various domains and stakeholder perspectives. There is a lack of understanding, however, about how the perceived importance of these qualities can...
In the dynamic and unstable E-commerce environment, online retailers must have more usable websites in order to satisfy their customers and thus increase their market share. This study has been undertaken in context of B2C E-commerce websites and its main purpose is to explore the linkages between different dimensions of website usability and their impact on user satisfaction. A questionnaire survey...
With the rapid advances in information technology (IT) in last few decades, software development has become a high-growth industry. While the software development process is an extremely complicated, iterative, unpredictable, knowledge-intensive, as well as an expensive process, a supportive collaborative information system (CIS) is indispensible for allowing complex interdependencies among globally...
Traditional meters present both the users and utilities providers with various challenges in developing countries. For instance utility providers must get access to their users' premises to be able to read these meters or check fraudulent connections. Users on the other hand have to wait for months or more before knowing their utility consumptions or join long queues to purchase credit for the post-payment...
In this paper we want to investigate how to measure changes that occur when ontologies evolve in time. In the modern semantic online environments users cannot assume that initially created ontologies will remain static throughout the whole lifespan of particular application. Moreover, alignments originally established between such ontologies can become stale and invalid when certain changes have been...
Over the paper decade the health sector has witnessed significant investments towards development of digital health information systems (HIS) infrastructure. Despite the promise and enthusiasm surrounding such efforts, challenges remain regarding how to enhance prospects for long-term maintenance. Observed challenges arise from lack of technical, financial, and human resources. Due to the inadequacy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.