Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 81255
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    A. Oliveira, Roger
    et al.
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Energy Science.
    S. Salles, Rafael
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Energy Science.
    Rönnberg, Sarah K.
    Luleå University of Technology, Department of Engineering Sciences and Mathematics, Energy Science.
    Deep Learning for Power Quality with Special Reference to Unsupervised Learning2023In: 27th International Conference on Electricity Distribution (CIRED 2023), IEEE, 2023, p. 935-939, article id 10417Conference paper (Refereed)
  • 2. AAl Abdulsalam, Abdulrahman
    et al.
    Velupillai, Sumithra
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. King's College, London.
    Meystre, Stephane
    UtahBMI at SemEval-2016 Task 12: Extracting Temporal Information from Clinical Text2016In: Proceedings of the 10th International Workshop on Semantic Evaluation (SemEval-2016), Association for Computational Linguistics , 2016, p. 1256-1262Conference paper (Refereed)
    Abstract [en]

    The 2016 Clinical TempEval continued the 2015 shared task on temporal information extraction with a new evaluation test set. Our team, UtahBMI, participated in all subtasks using machine learning approaches with ClearTK (LIBLINEAR), CRF++ and CRFsuite packages. Our experiments show that CRF-based classifiers yield, in general, higher recall for multi-word spans, while SVM-based classifiers are better at predicting correct attributes of TIMEX3. In addition, we show that an ensemble-based approach for TIMEX3 could yield improved results. Our team achieved competitive results in each subtask with an F1 75.4% for TIMEX3, F1 89.2% for EVENT, F1 84.4% for event relations with document time (DocTimeRel), and F1 51.1% for narrative container (CONTAINS) relations.

  • 3.
    Aalberg, Asbjørn Lein
    et al.
    SINTEF Digital, Norway.
    Holen, Siri Mariane
    SINTEF Digital, Norway.
    Aamodt, Edvard
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety.
    Steen-Hansen, Anne Elise
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety. NTNU Norwegian University of Science and Technology, Norway.
    Preconditions for Learning from Fires in Norway: Structural, Cultural, Technological, Interactional and Relational Aspects2021In: Proceedings of the 31st European Safety and Reliability Conference, 2021, p. 1747-1754Conference paper (Refereed)
    Abstract [en]

    Learning from incidents is widely accepted as a core part of safety management. This is also true for fires – however few fires in Norway are investigated. Fires are interesting incidents conceptually due to their potential of devastating outcomes on material and human lives and because they happen across all sectors and industries, businesses, and homes. In Norway, several different actors play a role in investigating and learning from fires, from the fire rescue services to directorates and Non-Governmental Organisations. The present study seeks to understand the preconditions for learning from fires in Norway, with emphasis on the formal actors that play a role in preventing and mitigating fires. Methodologically, the study is based on qualitative interviews conducted with relevant actors from first responders, authorities, and other sectors. We found that there are structural, cultural, technological, and relational aspects that seem to influence learning from fires in Norway. The results were analyzed using thematic analysis and the Pentagon model framework. The findings are discussed in relation to theories from organisational learning and learning from incidents.

    Download full text (pdf)
    fulltext
  • 4.
    Aalbers, Anouschka
    et al.
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Computer and Geospatial Sciences, Computer Science.
    Öberg, Linn
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Computer and Geospatial Sciences, Computer Science.
    Agil Kravprioritering: En kvalitativ studie om prioriteringsprocesser inom agil mjukvaruutveckling hos Monitor ERP System AB2021Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Prioritizing requirements is one of the most important and influential steps in the creation of a software product. The process is iterative; it takes place during the entire agile software development. Through prioritizing requirements, it is decided which requirements are to be developed, in which order, and why. 

    The aim of this study is to investigate how companies that design software prioritize requirements and to identify which prioritization methods they might use during this process. The purpose of this study is to gain an understanding for why a well-balanced prioritization is important, which specific prioritization factors give value to a product, as well as identifying how these factors are related to the result. The purpose is also to investigate the difficulties that exist in a prioritization process, and to create an overview of some of the most used prioritization methods in agile software development. 

    This study is conducted in collaboration with the software company Monitor ERP in order to analyze the company's prioritization processes used to develop their business management system Monitor. The method used is a qualitative study that consists of observations of meetings about prioritization processes, and semi-structured interviews. Processing of collected material was done by organizing, analyzing, and compiling results according to concepts and categories that emerged from the literature study. The results documents work processes, common goals, prioritization aspects and challenges in the requirements prioritization at Monitor ERP. 

    A well-balanced prioritization proved to be important to be able to deliver the right functionality on time and to be able to provide dependable estimates of development, which in turn leads to customers gaining confidence in both the product and the company. A number of prioritization factors that give value to the Monitor software were identified, many of which contribute to increasing customer satisfaction and product quality. Monitor ERP does not use any specific prioritization methods, but the development philosophy Minimum Viable Product is used as a basis for their prioritization choices. During the prioritization process, challenges such as limited resources, unpredictable tasks, difficulties with time estimation, and a challenge in balancing customer value and customer focus were experienced.

    Download full text (pdf)
    Agil_Kravprioritering_Aalbers_Öberg
  • 5.
    Aalbers, Sander
    Malmö University, Faculty of Culture and Society (KS), School of Arts and Communication (K3).
    Back to the Roots: Re-Connecting Humanity and the Natural World by Merging Interactive Technology and Plants2022Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis project explores combining interactive technology and the natural world, through a more-than-human design approach. This project aims to step away from an industry-driven design by valuing plants as equal in the design process. Throughout this report, an overview of the relevant theory and examples are elaborated on. This overview has informed the project in two ways. It formed the foundation of a concept aiming to improve the user’s interconnectedness with nature and it formed the foundation of an evaluation tool developed for aiding designers in design for plants by addressing three design fields: Design for Care, Design for Cohabitation, and Design for Noticing. The concept and the evaluation tool have been developed in parallel and informed each other throughout the project. The final concept contributes to the discussion about addressing more-than-human actors in design. In this case by addressing plant blindness. The evaluation tool contributes to more-than-human design as a tool to evaluate ideas and projects. This project included an extensive analysis of a design collection, workshops regarding the materiality of living plants and assessment of the evaluation tool, an interdisciplinary design approach, and a prototyping phase during which assumptions regarding the concept were tested.

    Download full text (pdf)
    fulltext
  • 6.
    Aalinejad, Elaheh
    University of Skövde, School of Informatics.
    Information Asset Accountability in practice: information owner’s perspective: A qualitative case study2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Information plays an essential role in supporting an organization's business; this information encounters any business's technology, people, and process aspects. In contrast, each aspect can risk an organization's information assets. Information traceability and accountability can play a significant role in controlling and protecting information assets. When individuals perceive accountability for each modification or change, they will behave systematically in their activities because they can expect their actions to impact others. A sense of information accountability increases the likelihood that people think about their behaviors in daily processes. However, if the accountability mechanism is insufficient, it can cause conflicts between information owners and employees. Previous works are based on the theories to increase the sense of information accountability and have efficient mechanisms. Moreover, improvement of the accountability mechanism is a concern because researchers rely on laboratory results, which is not enough to develop and have a systematic mechanism. Therefore, existing theories and explanations of information accountability tend to be unclear in practice.This study presents a qualitative case study focusing on information asset accountability among information owners and finding the practical tools and techniques to enforce the accountability. Data collection is carried out through ten semi-structured interviews among information owners who directly own information and make decisions related to classified information and controlling access levels. The interview questions were based on the increasing information asset accountability to reveal the influential factors that must be addressed. Data analysis discloses information owners’ requirements to increase the sense of accountability in an organization when it comes to information asset accountability. Key findings seem to be applying proper tools and processes such as verification and traceability to strengthen the information asset accountability within organizations. It also reveals the employee’s awareness and training to understand the information handling and processes. Employees get involved with processes by receiving training, clarifying their accountability expectations within information assets, and acknowledging the importance of their actions to secure critical information. The study's contribution provides an insight into the information accountability mechanism to identify the enforcement requirement from the information owner’s perspective. Based on the result of the study, it can raise the significance of accountability and traceability mechanisms to the information owners and provide input to maximize their information asset’s security level within the organization. 

    Download full text (pdf)
    fulltext
  • 7. Aalst, Will
    et al.
    Shaw, Michael J.Szyperski, ClemensStirna, JanisStockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.Persson, Anne
    The Practice of Enterprise Modeling: first IFIP WG 8.1 Working Conference (PoEM 2008), proceedings2009Conference proceedings (editor) (Other academic)
  • 8.
    Aalto, Erik
    KTH, School of Computer Science and Communication (CSC).
    Learning Playlist Representations for Automatic Playlist Generation2015Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Spotify is currently the worlds leading music streaming ser-vice. As the leader in music streaming the task of providing listeners with music recommendations is vital for Spotify. Listening to playlists is a popular way of consuming music, but traditional recommender systems tend to fo-cus on suggesting songs, albums or artists rather than pro-viding consumers with playlists generated for their needs.

    This thesis presents a scalable and generalizeable approach to music recommendation that performs song selection for the problem of playlist generation. The approach selects tracks related to a playlist theme by finding the charac-terizing variance for a seed playlist and projects candidate songs into the corresponding subspace. Quantitative re-sults shows that the model outperforms a baseline which is taking the full variance into account. By qualitative results the model is also shown to outperform professionally curated playlists in some cases.

    Download full text (pdf)
    fulltext
  • 9.
    Aarnio, Linus
    Linköping University, Department of Computer and Information Science.
    Confidence in Release Candidates: Maintaining confidence levels when moving from traditional release management to continuous delivery2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    When shortening release cycles and moving towards continuous delivery, a different approach for quality assurance may be needed than in traditional release management. To allow the transition, all stakeholders must retain a sense of confidence in the quality of release candidates. This thesis proposes a definition for confidence consisting of 30 confidence factors to take into account to ensure confidence from all stakeholders. Confidence factors have been found through interviews with 11 stakeholders, analyzed and categorized using grounded theory analysis. The found factors are grouped into two main categories: Process and Verification Results.

    The thesis additionally contains a literature review of quality measurements and explores how confidence can be expressed in a continuous delivery pipeline. It is found that it is not possible to comprehensively express confidence only with metrics displayable in a pipeline when including only currently well-researched metrics, but with the combination of processes known to be followed in the organization some metrics provide coverage for many of the confidence factors.

    Download full text (pdf)
    thesis_aarnio_2022
  • 10.
    Aarno, Daniel
    KTH, School of Computer Science and Communication (CSC), Numerical Analysis and Computer Science, NADA.
    Intention recognition in human machine collaborative systems2007Licentiate thesis, monograph (Other scientific)
    Abstract [en]

    Robot systems have been used extensively during the last decades to provide automation solutions in a number of areas. The majority of the currently deployed automation systems are limited in that the tasks they can solve are required to be repetitive and predicable. One reason for this is the inability of today’s robot systems to understand and reason about the world. Therefore the robotics and artificial intelligence research communities have made significant research efforts to produce more intelligent machines. Although significant progress has been made towards achieving robots that can interact in a human environment there is currently no system that comes close to achieving the reasoning capabilities of humans.

    In order to reduce the complexity of the problem some researchers have proposed an alternative to creating fully autonomous robots capable of operating in human environments. The proposed alternative is to allow fusion of human and machine capabilities. For example, using teleoperation a human can operate at a remote site, which may not be accessible for the operator for a number of reasons, by issuing commands to a remote agent that will act as an extension of the operator’s body.

    Segmentation and recognition of operator generated motions can be used to provide appropriate assistance during task execution in teleoperative and human-machine collaborative settings. The assistance is usually provided in a virtual fixture framework where the level of compliance can be altered online in order to improve the performance in terms of execution time and overall precision. Acquiring, representing and modeling human skills are key research areas in teleoperation, programming-by-demonstration and human-machine collaborative settings. One of the common approaches is to divide the task that the operator is executing into several sub-tasks in order to provide manageable modeling.

    This thesis is focused on two aspects of human-machine collaborative systems. Classfication of an operator’s motion into a predefined state of a manipulation task and assistance during a manipulation task based on virtual fixtures. The particular applications considered consists of manipulation tasks where a human operator controls a robotic manipulator in a cooperative or teleoperative mode.

    A method for online task tracking using adaptive virtual fixtures is presented. Rather than executing a predefined plan, the operator has the ability to avoid unforeseen obstacles and deviate from the model. To allow this, the probability of following a certain trajectory sub-task) is estimated and used to automatically adjusts the compliance of a virtual fixture, thus providing an online decision of how to fixture the movement.

    A layered hidden Markov model is used to model human skills. A gestem classifier that classifies the operator’s motions into basic action-primitives, or gestemes, is evaluated. The gestem classifiers are then used in a layered hidden Markov model to model a simulated teleoperated task. The classification performance is evaluated with respect to noise, number of gestemes, type of the hidden Markov model and the available number of training sequences. The layered hidden Markov model is applied to data recorded during the execution of a trajectory-tracking task in 2D and 3D with a robotic manipulator in order to give qualitative as well as quantitative results for the proposed approach. The results indicate that the layered hidden Markov model is suitable for modeling teleoperative trajectory-tracking tasks and that the layered hidden Markov model is robust with respect to misclassifications in the underlying gestem classifiers.

    Download full text (pdf)
    FULLTEXT01
  • 11.
    Aarno, Daniel
    et al.
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Sommerfeld, Johan
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Kragic, Danica
    KTH, School of Computer Science and Communication (CSC), Computer Vision and Active Perception, CVAP. KTH, School of Computer Science and Communication (CSC), Centres, Centre for Autonomous Systems, CAS.
    Pugeault, Nicolas
    Kalkan, Sinan
    Woergoetter, Florentin
    Krüger, Norbert
    Early reactive grasping with second order 3D feature relations2008In: Recent Progress In Robotics: Viable Robotic Service To Human / [ed] Lee, S; Suh, IH; Kim, MS, 2008, Vol. 370, p. 91-105Conference paper (Refereed)
    Abstract [en]

    One of the main challenges in the field of robotics is to make robots ubiquitous. To intelligently interact with the world, such robots need to understand the environment and situations around them and react appropriately, they need context-awareness. But how to equip robots with capabilities of gathering and interpreting the necessary information for novel tasks through interaction with the environment and by providing some minimal knowledge in advance? This has been a longterm question and one of the main drives in the field of cognitive system development. The main idea behind the work presented in this paper is that the robot should, like a human infant, learn about objects by interacting with them, forming representations of the objects and their categories that are grounded in its embodiment. For this purpose, we study an early learning of object grasping process where the agent, based on a set of innate reflexes and knowledge about its embodiment. We stress out that this is not the work on grasping, it is a system that interacts with the environment based on relations of 3D visual features generated trough a stereo vision system. We show how geometry, appearance and spatial relations between the features can guide early reactive grasping which can later on be used in a more purposive manner when interacting with the environment.

  • 12.
    Aaro, Gustav
    et al.
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Roos, Daniel
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Carlsson, Niklas
    Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering.
    Toolset for Run-time Dataset Collection of Deep-scene Information2020In: Symposium on Modelling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Springer, 2020, p. 224-236Conference paper (Refereed)
    Abstract [en]

    Virtual reality (VR) provides many exciting new application opportunities, but also present new challenges. In contrast to 360° videos that only allow a user to select its viewing direction, in fully immersive VR, users can also move around and interact with objects in the virtual world. To most effectively deliver such services it is therefore important to understand how users move around in relation to such objects. In this paper, we present a methodology and software tool for generating run-time datasets capturing a user’s interactions with such 3D environments, evaluate and compare different object identification methods that we implement within the tool, and use datasets collected with the tool to demonstrate example uses. The tool was developed in Unity, easily integrates with existing Unity applications through the use of periodic calls that extracts information about the environment using different ray-casting methods. The software tool and example datasets are made available with this paper. 

  • 13. Aarts, Fides
    et al.
    Jonsson, Bengt
    Uppsala University, Disciplinary Domain of Science and Technology, Mathematics and Computer Science, Department of Information Technology, Computer Systems.
    Uijen, Johan
    Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction2010In: Testing Software and Systems: ICTSS 2010, Berlin: Springer-Verlag , 2010, p. 188-204Conference paper (Refereed)
  • 14.
    Aarts, Marcel
    Mälardalen University, School of Innovation, Design and Engineering.
    Using Kinect to interact with presentation software2013Independent thesis Basic level (university diploma), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Imagination Studios is a company specialized in motion capturing and animation. Part of their daily business is working at trade shows where they have a booth to keep close contact with existing customers and also to find new ones. However, usually only two to three people will be working at the booth, and frequently, these people will be in meetings with potential customers. During a time like this, nobody is free to attend to other people checking out the booth. This can result in a potential loss of a new customer. This project seeks a way to alleviate that problem.The idea behind this project was to create an application that trade show visitors can interact with in a playful and innovative way while also giving them a feel of what Imagination Studios is all about while looking for information about the company. To do this it was decided to let users interact with the system by using a Microsoft Kinect. The Kinect allows for easy implementation of a user interface based on motion capturing while also being very cost effective. A new user interface was to be designed as well, without copying already existing solutions and without simply expanding a traditional UI with new elements. To achieve this several design sketches were made, and the most interesting ones were then turned into storyboards. These were then used to decide on the final design, which was then elaborated on by use of video sketches and a collage in Adobe Photoshop.Several tools were used during the actual implementation. For the actual visualization and graphical design, the Unreal Engine 3 in combination with UDK was decided upon. To connect Kinect and Unreal Engine 3, a third party addon called NIUI which makes use of the open source SDK OpenNI was used. For ease of debugging and programming in Unrealscript, the programming language used by the Unreal Engine 3, an addon for Microsoft Visual Studio 2010 called nFringe (Pixel Mine, Inc., 2010) was used.

    Download full text (pdf)
    fulltext
  • 15. Aartsen, M. G.
    et al.
    Abbasi, R.
    Ackermann, M.
    Adams, J.
    Aguilar, J. A.
    Ahlers, M.
    Altmann, D.
    Arguelles, C.
    Auffenberg, J.
    Bai, X.
    Baker, M.
    Barwick, S. W.
    Baum, V.
    Bay, R.
    Beatty, J. J.
    Tjus, J. Becker
    Becker, K. -H
    BenZvi, S.
    Berghaus, P.
    Berley, D.
    Bernardini, E.
    Bernhard, A.
    Besson, D. Z.
    Binder, G.
    Bindig, D.
    Bissok, M.
    Blaufuss, E.
    Blumenthal, J.
    Boersma, David J.
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Bohm, C.
    Bose, D.
    Boeser, S.
    Botner, Olga
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Brayeur, L.
    Bretz, H. -P
    Brown, A. M.
    Bruijn, R.
    Casey, J.
    Casier, M.
    Chirkin, D.
    Christov, A.
    Christy, B.
    Clark, K.
    Classen, L.
    Clevermann, F.
    Coenders, S.
    Cohen, S.
    Cowen, D. F.
    Silva, A. H. Cruz
    Danninger, M.
    Daughhetee, J.
    Davis, J. C.
    Day, M.
    De Clercq, C.
    De Ridder, S.
    Desiati, P.
    de Vries, K. D.
    de With, M.
    DeYoung, T.
    Diaz-Velez, J. C.
    Dunkman, M.
    Eagan, R.
    Eberhardt, B.
    Eichmann, B.
    Eisch, J.
    Euler, S.
    Evenson, P. A.
    Fadiran, O.
    Fazely, A. R.
    Fedynitch, A.
    Feintzeig, J.
    Feusels, T.
    Filimonov, K.
    Finley, C.
    Fischer-Wasels, T.
    Flis, S.
    Franckowiak, A.
    Frantzen, K.
    Fuchs, T.
    Gaisser, T. K.
    Gallagher, J.
    Gerhardt, L.
    Gladstone, L.
    Glusenkamp, T.
    Goldschmidt, A.
    Golup, G.
    Gonzalez, J. G.
    Goodman, J. A.
    Gora, D.
    Grandmont, D. T.
    Grant, D.
    Gretskov, P.
    Groh, J. C.
    Gross, A.
    Ha, C.
    Ismail, A. Haj
    Hallen, P.
    Hallgren, Allan
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Halzen, F.
    Hanson, K.
    Hebecker, D.
    Heereman, D.
    Heinen, D.
    Helbing, K.
    Hellauer, R.
    Hickford, S.
    Hill, G. C.
    Hoffman, K. D.
    Hoffmann, R.
    Homeier, A.
    Hoshina, K.
    Huang, F.
    Huelsnitz, W.
    Hulth, P. O.
    Hultqvist, K.
    Hussain, S.
    Ishihara, A.
    Jacobi, E.
    Jacobsen, J.
    Jagielski, K.
    Japaridze, G. S.
    Jero, K.
    Jlelati, O.
    Kaminsky, B.
    Kappes, A.
    Karg, T.
    Karle, A.
    Kauer, M.
    Kelley, J. L.
    Kiryluk, J.
    Klaes, J.
    Klein, S. R.
    Koehne, J. -H
    Kohnen, G.
    Kolanoski, H.
    Koepke, L.
    Kopper, C.
    Kopper, S.
    Koskinen, D. J.
    Kowalski, M.
    Krasberg, M.
    Kriesten, A.
    Krings, K.
    Kroll, G.
    Kunnen, J.
    Kurahashi, N.
    Kuwabara, T.
    Labare, M.
    Landsman, H.
    Larson, M. J.
    Lesiak-Bzdak, M.
    Leuermann, M.
    Leute, J.
    Luenemann, J.
    Macias, O.
    Madsen, J.
    Maggi, G.
    Maruyama, R.
    Mase, K.
    Matis, H. S.
    McNally, F.
    Meagher, K.
    Merck, M.
    Merino, G.
    Meures, T.
    Miarecki, S.
    Middell, E.
    Milke, N.
    Miller, J.
    Mohrmann, L.
    Montaruli, T.
    Morse, R.
    Nahnhauer, R.
    Naumann, U.
    Niederhausen, H.
    Nowicki, S. C.
    Nygren, D. R.
    Obertacke, A.
    Odrowski, S.
    Olivas, A.
    Omairat, A.
    O'Murchadha, A.
    Paul, L.
    Pepper, J. A.
    de los Heros, Carlos Perez
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Pfendner, C.
    Pieloth, D.
    Pinat, E.
    Posselt, J.
    Price, P. B.
    Przybylski, G. T.
    Quinnan, M.
    Raedel, L.
    Rae, I.
    Rameez, M.
    Rawlins, K.
    Redl, P.
    Reimann, R.
    Resconi, E.
    Rhode, W.
    Ribordy, M.
    Richman, M.
    Riedel, B.
    Rodrigues, J. P.
    Rott, C.
    Ruhe, T.
    Ruzybayev, B.
    Ryckbosch, D.
    Saba, S. M.
    Sander, H. -G
    Santander, M.
    Sarkar, S.
    Schatto, K.
    Scheriau, F.
    Schmidt, T.
    Schmitz, M.
    Schoenen, S.
    Schoeneberg, S.
    Schoenwald, A.
    Schukraft, A.
    Schulte, L.
    Schultz, D.
    Schulz, O.
    Secke, D.
    Sestayo, Y.
    Seunarine, S.
    Shanidze, R.
    Sheremata, C.
    Smith, M. W. E.
    Soldin, D.
    Spiczak, G. M.
    Spiering, C.
    Stamatikos, M.
    Stanev, T.
    Stanisha, N. A.
    Stasik, A.
    Stezelberger, T.
    Stokstad, R. G.
    Stoessl, A.
    Strahler, E. A.
    Ström, Rickard
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Strotjohann, N. L.
    Sullivan, G. W.
    Taavola, Henric
    Uppsala University, Disciplinary Domain of Science and Technology, Physics, Department of Physics and Astronomy, High Energy Physics.
    Taboada, I.
    Tamburro, A.
    Tepe, A.
    Ter-Antonyan, S.
    Tesic, G.
    Tilav, S.
    Toale, P. A.
    Tobin, M. N.
    Toscano, S.
    Tselengidou, M.
    Unger, E.
    Usner, M.
    Vallecorsa, S.
    van Eijndhoven, N.
    van Overloop, A.
    van Santen, J.
    Vehring, M.
    Voge, M.
    Vraeghe, M.
    Walck, C.
    Waldenmaier, T.
    Wallraff, M.
    Weaver, Ch.
    Wellons, M.
    Wendt, C.
    Westerhoff, S.
    Whitehorn, N.
    Wiebe, K.
    Wiebusch, C. H.
    Williams, D. R.
    Wissing, H.
    Wolf, M.
    Wood, T. R.
    Woschnagg, K.
    Xu, D. L.
    Xu, X. W.
    Yanez, J. P.
    Yodh, G.
    Yoshida, S.
    Zarzhitsky, P.
    Ziemann, J.
    Zierke, S.
    Zoll, M.
    The IceProd framework: Distributed data processing for the IceCube neutrino observatory2015In: Journal of Parallel and Distributed Computing, ISSN 0743-7315, E-ISSN 1096-0848, Vol. 75, p. 198-211Article in journal (Refereed)
    Abstract [en]

    IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, identify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. This paper presents the first detailed description of IceProd, a lightweight distributed management system designed to meet these requirements. It is driven by a central database in order to manage mass production of simulations and analysis of data produced by the IceCube detector. IceProd runs as a separate layer on top of other middleware and can take advantage of a variety of computing resources, including grids and batch systems such as CREAM, HTCondor, and PBS. This is accomplished by a set of dedicated daemons that process job submission in a coordinated fashion through the use of middleware plugins that serve to abstract the details of job submission and job management from the framework. (C) 2014 Elsevier Inc. All rights reserved.

  • 16.
    Aasberg, Freddy
    KTH, School of Electrical Engineering and Computer Science (EECS).
    HypervisorLang: Attack Simulations of the OpenStack Nova Compute Node2021Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Cloud services are growing in popularity and the global public cloud services are forecasted to increase by 17% in 2020[1]. The popularity of cloud services is due to the improved resource allocation for providers and simplicity of use for the customer. Due to the increasing popularity of cloud services and its increased use by companies, the security assessment of the services is strategically becoming more critical. Assessing the security of a cloud system can be problematic because of its complexity since the systems are composed of many different technologies. One way of simplifying the security assessment is attack simulations, covering cyberattacks of the investigated system. This thesis will make use of Meta Attack language (MAL) to create the Domain- Specific Language (DLS) HypervisorLang that models the virtualisation layer in an OpenStack Nova setup. The result of this thesis is a proposed DSL HypervisorLang which uses attack simulation to model hostile usage of the service and defences to evade those. The hostile usage covers attacks such as a denial of services, buffer overflows and out-of-bound-read and are sourced via known vulnerabilities. To implement the main components of the Nova module into HypervisorLang, literature studies where performed and included components in Nova together with threat modelling. Evaluating the correctness of HypervisorLang was performed by implementing test cases to display the different attack steps included in the model. However, the results also show that some limitations of the evaluations have been found and are proposed for further research. 

    Download full text (pdf)
    fulltext
  • 17.
    Aasberg Pipirs, Freddy
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Svensson, Patrik
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Tenancy Model Selection Guidelines2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Software as a Service (SaaS) is a subset of cloud services where a vendor provides software as a service to customers. The SaaS application is installed on the SaaS provider’s servers, and is often accessed via the web browser. In the context of SaaS, a customer is called tenant, which often is an organization that is accessing the SaaS application, but it could also be a single individual. A SaaS application can be classified into tenancy models. A tenancy model describes how a tenant’s data is mapped to the storage on the server-side of the SaaS application.By doing a research, the authors have drawn the conclusion that there is a lack of guidance for selecting tenancy models. The purpose of this thesis is to provide guidance for selecting tenancy models. The short-term-goal is to create a tenancy selection guide. The long-term-goal is to provide researchers and students with research material. This thesis provides a guidance model for selection of tenancy models. The model is called Tenancy Model Selection Guidelines (TMSG).TMSG was evaluated by interviewing two professionals from the software industry. The criteria used for evaluating TMSG were Interviewee credibility, Syntactic correctness, Semantic correctness, Usefulness and Model flexibility. In the interviews, both of the interviewees said that TMSG was in need of further refinements. Still they were positive to the achieved result.

    Download full text (pdf)
    fulltext
  • 18.
    Aasheim, Fanny
    et al.
    Linköping University, Department of Science and Technology, Media and Information Technology. Linköping University, The Institute of Technology.
    Gestsson, Linnea
    Linköping University, Department of Science and Technology, Media and Information Technology. Linköping University, The Institute of Technology.
    Det spelar ingen roll hur du gör det - bara du gör det: Hur ett koncept kan utformas för att uppmana till motion utan att bidra till hälsohets2020Independent thesis Basic level (degree of Bachelor), 10,5 credits / 16 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 19.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Information Technology Governance: The Role of Organizational Culture and Structure2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information Technology Governance (ITG) is among the most important challenges for the managers today. IT is not anymore just a supportive tool but also a strategic driver for the businesses. In the dynamic and competitive world of today, it is crucial for organizations to know how to govern IT rather than just to use it. IT governance deals with specifying responsibilities and decision rights to encourage the desirable behaviour from IT and generate value from IT investments. IT governance can impact the overall performance of organizations, however there are still difficulties in understanding IT governance and the factors that may influence it.

    Organizational culture and structure are among the factors that have significant influence on many issues in an organization. According to previous research, organizational culture and structure need to be considered when implementing IT governance. However, there is a lack of research focusing on how organizational culture and structure can influence IT governance performance and implementation. Thus, the main research question addressed in this thesis is: How are organizational culture and structure related to IT governance? To address this question, this research has performed literature reviews and conducted case studies to investigate the role of organizational culture and structure on IT governance. As the first step, the previous literature was reviewed to find the gaps in the research on culture and IT governance. As the next step, four case studies were conducted to explore the influence of organizational culture and structure on IT governance. Two case studies have investigated the relation between organizational structure and IT governance implementation and performance in large organizations; and two other case studies investigated on how different types of organizational culture influence IT governance performance outcomes.

    The results of this research respond to the research question by specifying the role of culture in IT governance through a categorization of prior research both from research and practice perspectives; specifying the influence of different organizational culture types on IT governance performance outcomes in different organizations; and by specifying IT organizational structure relationship with IT governance performance outcomes and IT governance implementation.

    The research presented in this thesis provides both theoretical and empirical contributions to the IT governance research and practice.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 20.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiate thesis, comprehensive summary (Other academic)
    Download full text (pdf)
    fulltext
  • 21. Aasi, Parisa
    et al.
    Nikic, Jovana
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Melisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Cloud Computing on IT Governance in a Swedish Municipality2020In: Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, Proceedings / [ed] Marinos Themistocleous, Maria Papadaki, Muhammad Mustafa Kamal, Springer, 2020, p. 623-639Conference paper (Refereed)
    Abstract [en]

    Cloud computing is used to a greater extent in today’s organizations and enables organizations to obtain on-demand network access to IT services. When cloud computing is adopted in an organization, the IT governance becomes more challenging, because organizations need to address business and IT-related processes as well as managing risks and maintaining the relationship with cloud computing vendors. This research aims at finding how cloud computing service model specifically Software as a Service (SaaS) influence IT governance structures, processes and relational mechanisms in a public organization. For this purpose a case study was conducted in a Swedish municipality and the data was collected through interviews with IT managers and from internal documents of municipality and was analyzed using thematic analysis. The results of this study shows that SaaS influences the IT governance structure by improving roles and responsibilities definition and speeds up the decision-making processes. Moreover, the communication with the vendors is more efficient due to the use of SaaS.

  • 22.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: Proceedings of the 48th Annual Hawaii International Conference on System Sciences, IEEE, 2015, p. 4691-4699Conference paper (Refereed)
  • 23. Aasi, Parisa
    et al.
    Nunes, Ivan
    KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
    Rusu, Lazar
    Hodosi, Georg
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), IEEE Computer Society, 2015, p. 4691-4699Conference paper (Refereed)
    Abstract [en]

    IT Outsourcing (ITO) is used widely by Multinational Companies (MNCs) as a sourcing strategy today. ITO relationship between service buyer and provider then becomes a crucial issue in achieving expected objectives. This research sheds light on the influence of organizational culture (OC) of the buyer company on its ITO relationship with the provider. More specifically, the influence that OC can have on four significant dimensions of trust, cooperation, communication and commitment in ITO is studied through a qualitative analysis. IT managers of six MNCs were interviewed which exposed the connection between OC and ITO relationship factors. An open communication culture, speed of adaption to change, receiving innovative solutions, flat or hierarchical structures and responsibility degree appeared as the most visible differences between OCs of MNCs influencing ITO relationships. The results can be used for improving the ITO by considering the influence of OC to gain more benefits from outsourcing.

  • 24.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The impact of different organizational cultures on IT outsourcing relationship management2013In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, no 2, p. 50-66Article in journal (Refereed)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 25.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Facing The Digitalization Challenge: Why Organizational Culture Matters and How It Influences IT Governance Performance2017In: Information Systems Development: Advances in Methods, Tools and Management: Proceedings / [ed] N. Paspallis, M. Raspopoulos, C. Barry, M. Lang, H. Linger, C. Schneider, Association for Information Systems, 2017Conference paper (Refereed)
    Abstract [en]

    Today it is not possible for the companies to compete without having IT as a strategic driver. That is why IT governance becomes crucial for managers to bring the most value from IT to the business. Additionally organizational culture is an important factor and often blamed when IT governance projects fail. However little in-depth research investigated how the organizational culture changes can improve the IT governance performance. This research is a case study of the IT department of a large company attempting to improve the IT governance while facing the digitalization challenge. In this case the IT department has an organizational culture change journey seeking to improve the IT governance performance. The results indicate that the initial clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore, adhocracy is identified as preferred culture for improving IT governance for growth.

  • 26.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2014In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, no 1, article id 3Article in journal (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 27.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2018In: Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications, IGI Global, 2018, no 2018, p. 139-156Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 28.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2017In: Organizational Culture and Behavior: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017, no 2017, p. 1329-1346Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 29.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Culture on IT Governance: A Literature Review2014In: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, p. 4436-4445Conference paper (Refereed)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 30.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui; Ralph H. Sprague, Jr., IEEE Computer Society, 2016, p. 5157-5166Conference paper (Refereed)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 31.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Role of Culture in IT Governance2014In: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Conference paper (Refereed)
  • 32.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017In: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, no 0, p. 229-252Chapter in book (Refereed)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 33.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    How Does the Organizational Culture of Collaborative Networks Influence IT Governance Performance in a Large Organization?2018In: Proceedings of the 51st Annual Hawaii International Conference on System Sciences, 2018, p. 4941-4951Conference paper (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks desire different organizational culture types based on their priorities for IT governance outcomes. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost effective use of IT. An adhocracy culture is desired when prioritizing the effective use of IT for business growth. Finally a combination of market and hierarchy organizational culture is desired when seeking effective use of IT for business flexibility and cost cutting.

  • 34.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    What is the role of organizational culture in IT governance performance of collaborative virtual networks?2018In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 9, no 1, article id 2Article in journal (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks fit better with different organizational culture types based on their priorities for IT governance outcomes to maximize performance. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost-effective use of IT. An adhocracy culture fits better when prioritizing the effective use of IT for business growth. Finally, a combination of market and hierarchy organizational culture is desired and fits better when seeking effective use of IT for business flexibility and cost cutting.

  • 35.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2020In: Start-Ups and SMEs: Concepts, Methodologies, Tools, and Applications / [ed] Mehdi Khosrow-Pour, IGI Global, 2020, no 1, p. 1664-1687Chapter in book (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance’s five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 36.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2017In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 8, no 2, p. 42-61, article id 3Article, review/survey (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance's five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 37.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Atug, Sebastian
    Institutionen för data- och systemvetenskap, Stockholms universitet. Sverige.
    Cermeno, Lorenzo
    för data- och systemvetenskap, Stockholms universitet. Sverige.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Digital Transformation Success Through Aligning the Organizational Structure: Case Study of Swedish Public Organizations2022In: AMCIS 2022 Proceedings, Association for Information Systems (AIS) , 2022Conference paper (Refereed)
    Abstract [en]

    A Digital Transformation fundamentally involves the implementation of one or more digital tools, which is a process often burdened with challenges. It is estimated that approximately 66 to 84 percent of the taken Digital Transformation initiatives are unsuccessful, which can be attributed to organizational shortcomings, more specifically structural ones. While public organizations regularly do not achieve the same success as those in the private sector, it was of interest to investigate the Swedish ones. Where 86 percent of residents use the internet to interact with public authorities. Previous research has singled out the IT organization to be the appointed leader of Digital Transformations, further research on that relationship is limited. Therefore, this study examines how the IT organization, in an agile environment, can align its structure for a successful Digital Transformation. To answer the discovered research problem, the following research question has been formulated: “How should an IT organization’s structure be aligned in an agile environment in order to achieve a successful Digital Transformation?”. This is research in progress and will be continued by conducting case studies in four public organizations. Data will be collected through semi0structured interviews and analyzed thematically. Finally, a presentation of different aspect of organizational structure alignment through digital transformation based on these cases will be provided.

  • 38.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Gråhns, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Geijer, Robin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Aspects in Achieving a Successful Digital Transformation: Case of an ERP System Change2022In: Information Systems: 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8–9, 2021, Proceedings / [ed] Marinos Themistocleous; Maria Papadaki, Springer, 2022, p. 653-666Conference paper (Refereed)
    Abstract [en]

    Digital transformation has been an interesting concept from the organizational perspective for a long time. The benefits of a successful digital transformation can take your organization into the next step by providing an increased organizational growth, aid market reachability by penetrating new and exciting markets, or enable your business operations to function to a greater extent than before with higher efficiency and lower lead times. Digital transformation is however a complex and diverse concept that means to integrate new innovations by using digital technology into the organization with the need of making greater organizational changes to succeed. This research, has explored how different organizational aspects like structural, technological and cultural ones can impact the success of a digital transformation during an ERP system change. A case study has been conducted in a company to identify how the current structural, technological, and cultural aspects influence the current digital transformation in that the company. The data was collected through interviews with employees having managerial roles and from internal documents of company and was analyzed using thematic analysis. The results show an agile approach, a more decentralized structure and high readiness for change, along with a transparent communication between management and co-workers to be beneficial for a successfully digital transformation.

  • 39. Aayesh,
    et al.
    Bilal Qureshi, Muhammad
    Afzaal, Muhammad
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Shuaib Qureshi, Muhammad
    Gwak, Jeonghwan
    Fuzzy-Based Automatic Epileptic Seizure Detection Framework2022In: Computers, Materials and Continua, ISSN 1546-2218, E-ISSN 1546-2226, Vol. 70, no 3, p. 5601-5630Article in journal (Refereed)
    Abstract [en]

    Detection of epileptic seizures on the basis of Electroencephalogram (EEG) recordings is a challenging task due to the complex, non-stationary and non-linear nature of these biomedical signals. In the existing literature, a number of automatic epileptic seizure detection methods have been proposed that extract useful features from EEG segments and classify them using machine learning algorithms. Some characterizing features of epileptic and non-epileptic EEG signals overlap; therefore, it requires that analysis of signals must be performed from diverse perspectives. Few studies analyzed these signals in diverse domains to identify distinguishing characteristics of epileptic EEG signals. To pose the challenge mentioned above, in this paper, a fuzzy-based epileptic seizure detection model is proposed that incorporates a novel feature extraction and selection method along with fuzzy classifiers. The proposed work extracts pattern features along with time-domain, frequency domain, and non-linear analysis of signals. It applies a feature selection strategy on extracted features to get more discriminating features that build fuzzy machine learning classifiers for the detection of epileptic seizures. The empirical evaluation of the proposed model was conducted on the benchmark Bonn EEG dataset. It shows significant accuracy of 98% to 100% for normal vs. ictal classification cases while for three class classification of normal vs. inter-ictal vs. ictal accuracy reaches to above 97.5%. The obtained results for ten classification cases (including normal, seizure or ictal, and seizure-free or inter-ictal classes) prove the superior performance of proposed work as compared to other state-of-the-art counterparts.

  • 40. Aayesha,
    et al.
    Qureshi, Muhammad Bilal
    Afzaal, Muhammad
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Qureshi, Muhammad Shuaib
    Fayaz, Muhammad
    Machine learning-based EEG signals classification model for epileptic seizure detection2021In: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 80, p. 17849-17877Article in journal (Refereed)
    Abstract [en]

    The detection of epileptic seizures by classifying electroencephalography (EEG) signals into ictal and interictal classes is a demanding challenge, because it identifies the seizure and seizure-free states of an epileptic patient. In previous works, several machine learning-based strategies were introduced to investigate and interpret EEG signals for the purpose of their accurate classification. However, non-linear and non-stationary characteristics of EEG signals make it complicated to get complete information about these dynamic biomedical signals. In order to address this issue, this paper focuses on extracting the most discriminating and distinguishing features of seizure EEG recordings to develop an approach that employs both fuzzy-based and traditional machine learning algorithms for epileptic seizure detection. The proposed framework classifies unknown EEG signal segments into ictal and interictal classes. The model is validated using empirical evaluation on two benchmark datasets, namely the Bonn and Children's Hospital of Boston-Massachusetts Institute of Technology (CHB-MIT) datasets. The obtained results show that in both cases, K-Nearest Neighbor (KNN) and Fuzzy Rough Nearest Neighbor (FRNN) give the highest classification accuracy scores, with improved sensitivity and specificity percentages.

  • 41.
    Aayesha, Aayesha
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nouri, Jalal
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Afzaal, Muhammad
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Wu, Yongchao
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Xiu
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Weegar, Rebecka
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    An Ensemble Approach for Question-Level Knowledge Tracing2021In: Artificial Intelligence in Education: 22nd International Conference, AIED 2021, Utrecht, The Netherlands, June 14–18, 2021, Proceedings, Part II / [ed] Ido Roll; Danielle McNamara; Sergey Sosnovsky; Rose Luckin; Vania Dimitrova, Cham: Springer , 2021, p. 433-437Conference paper (Refereed)
    Abstract [en]

    Knowledge tracing—where a machine models the students’ knowledge as they interact with coursework—is a well-established area in the field of Artificial Intelligence in Education. In this paper, an ensemble approach is proposed that addresses existing limitations in question-centric knowledge tracing and achieves the goal of predicting future question correctness. The proposed approach consists of two models; one is Light Gradient Boosting Machine (LightGBM) built by incorporating all relevant key features engineered from the data. The second model is a Multiheaded-Self-Attention Knowledge Tracing model (MSAKT) that extracts historical student knowledge of future question by calculating their contextual similarity with previously attempted questions. The proposed model’s effectiveness is evaluated by conducting experiments on a big Kaggle dataset achieving an Area Under ROC Curve (AUC) score of 0.84 with 84% accuracy using 10fold cross-validation.

  • 42.
    Abad, Shayan
    et al.
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Computer and Geospatial Sciences, Computer Science.
    Gholamy, Hassan
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Computer and Geospatial Sciences, Computer Science.
    Evaluation of machine learning models for classifying malicious URLs2023Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Millions of new websites are created daily, making it challenging to determine which ones are safe. Cybersecurity involves protecting companies and users from cyberattacks. Cybercriminals exploit various methods, including phishing attacks, to trick users into revealing sensitive information. In Australia alone, there were over 74,000 reported phishing attacks in 2022, resulting in a financial loss of over $24 million. Artificial intelligence (AI) and machine learning are effective tools in various domains, such as cancer detection, financial fraud detection, and chatbot development. Machine learning models, such as Random Forest and Support Vector Machines, are commonly used for classification tasks. With the rise of cybercrime, it is crucial to use machine learning to identify both known and new malicious URLs. The purpose of the study is to compare different instance selection methods and machine learning models for classifying malicious URLs.

    In this study, a dataset containing approximately 650,000 URLs from Kaggle was used. The dataset consisted of four categories: phishing, defacement, malware, and benign URLs. Three datasets, each consisting of around 170,000 URLs, were generated using instance selection methods (DRLSH, BPLSH, and random selection) implemented in MATLAB. Machine learning models, including SVM, DT, KNNs, and RF, were employed. The study applied these instance selection methods to a dataset of malicious URLs, trained the machine learning models on the resulting datasets, and evaluated their performance using 16 features and one output feature.

    In the process of hyperparameter tuning, the training dataset was used to train four models with different hyperparameter settings. Bayesian optimization was employed to find the best hyperparameters for each model. The classification process was then conducted, and the results were compared. The study found that the random instance selection method outperformed the other two methods, BPLSH and DRLSH, in terms of both accuracy and elapsed time for data selection. The lower accuracies achieved by the DRLSH and BPLSH methods may be attributed to the imbalanced dataset, which led to poor sample selection.

    Download full text (pdf)
    Evaluation of machine learning models for classifying malicious URLs
  • 43.
    Abad, Shayan
    et al.
    Department of Computer and Geo-Spatial Sciences, University of Gävle, 801 76 Gävle, Sweden.
    Gholamy, Hassan
    Department of Computer and Geo-Spatial Sciences, University of Gävle, 801 76 Gävle, Sweden.
    Aslani, Mohammad
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Computer and Geospatial Sciences, Computer Science.
    Classification of Malicious URLs Using Machine Learning2023In: Sensors, E-ISSN 1424-8220, Vol. 23, no 18, article id 7760Article in journal (Refereed)
    Abstract [en]

    Amid the rapid proliferation of thousands of new websites daily, distinguishing safe ones from potentially harmful ones has become an increasingly complex task. These websites often collect user data, and, without adequate cybersecurity measures such as the efficient detection and classification of malicious URLs, users’ sensitive information could be compromised. This study aims to develop models based on machine learning algorithms for the efficient identification and classification of malicious URLs, contributing to enhanced cybersecurity. Within this context, this study leverages support vector machines (SVMs), random forests (RFs), decision trees (DTs), and k-nearest neighbors (KNNs) in combination with Bayesian optimization to accurately classify URLs. To improve computational efficiency, instance selection methods are employed, including data reduction based on locality-sensitive hashing (DRLSH), border point extraction based on locality-sensitive hashing (BPLSH), and random selection. The results show the effectiveness of RFs in delivering high precision, recall, and F1 scores, with SVMs also providing competitive performance at the expense of increased training time. The results also emphasize the substantial impact of the instance selection method on the performance of these models, indicating its significance in the machine learning pipeline for malicious URL classification

    Download full text (pdf)
    fulltext
  • 44.
    Abadir Guirgis, Georg
    Linköping University, Department of Computer and Information Science.
    Lärarperspektiv på riskutbildningen för motorcyklister2011Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [sv]

    Under det senaste decenniet har det i Sverige blivit allt populärare att åka motorcykel. Enobligatorisk riskutbildning för behörighet A och A1 infördes från och med den 1 november2009. Då riskutbildningen är ny har få utvärderingar gjorts.Denna studie utvärderar riskutbildningen för motorcyklister utifrån trafikskolläraresperspektiv. Målet har varit att sammanställa synpunkter och erfarenheter från lärarna påutbildningen. Ett ytterligare mål har varit att undersöka trafikskollärarnas upplevda effekter avutbildningen på elevers trafikbeteende. Sex semistrukturerade intervjuer med trafikskolläraresamt en observationsstudie på olika trafikskolor genomfördes. Utöver detta genomfördesdeltagande observation av en fortbildning där 15 trafikskollärare deltog. Resultatet frånstudien visar att lärarna anser att behovet av riskutbildningen är stort och attimplementationen av den nya riskutbildningen gått bra. Förutom att elever efter utbildningenrefererar till den, vilket enligt lärarna indikerar att de tagit till sig vad som sagts, märks det nui större utsträckning än tidigare att elever kör lugnare och tänker sig mer för i vissasituationer. Detta påtalades vara ett klart önskvärt resultat.

    Download full text (pdf)
    Lärarperspektiv på riskutbildningen för motorcyklister
  • 45.
    Abadir Guirgis, Georg
    Linköping University, Department of Computer and Information Science. Linköping University, Faculty of Arts and Sciences.
    Mindre energi och rätt tid: Utvärdering av utbildning och träning för lokförare i energieffektiv körning – en simulatorstudie2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    During the 80’s, the first train simulator was introduced in Swedish train driver education and is still the only full scale simulator being used to educate train drivers in Sweden. The reason for this seems to be a lack of educational and economic motives for an expanded usage of simulators within education and training. Energy savings within the railway domain, i.e. energy-efficient driving, is currently a topic for all train operators in Sweden. Some operators already educate their drivers in energy efficient driving and tests of energy efficiency in real traffic has shown a potential energy saving of 16 %, after drivers have completed a theoretical education in energy-efficient driving. Because there were some uncertainties in the data from the tests carried out in real traffic, where conditions and experimental procedures varied between the drivers and it also turned out that education and access to a support system while driving resulted in a small saving in energy (13 %) there was a need to examine the potential savings under controlled conditions. Therefore, a study was conducted using a train simulator. In the simulator, the researcher has full control over the data and conditions are the same for all drivers. The simulator used in the study was developed by VTI (Swedish National Road and Transport Research Institute) and modeled after an X50 Regina. The purpose of this study was to investigate whether the same theoretical education in energy-efficient driving, in combination with simulator training under ideal conditions, could contribute to the same, or better energy saving compared to the results of the tests from real traffic. Furthermore, the effect of feedback during training with regard to energy savings was also investigated. 24 train driver students were divided into three groups with 8 students in each. Two of these groups completed two sessions (reference and test session) with theoretical education and simulator training between the sessions. The last group (control group) completed two sessions (reference and test session) without education and training between the sessions. The two groups that were given theoretical education conducted their simulator training under two different conditions, where one group trained with feedback (energy consumption and rail gradient) and the other group trained without feedback. It turns out that a theoretical education in energy efficient driving, combined with 30 minutes of simulator training, resulted in a total saving of about 24 % energy for both groups. Also, considering that the control group improved their energy consumption by simply driving the simulator two times (8 % total energy saving), the energy saving was almost equal to the result of the tests in real traffic. Since the results were equal even though the conditions differed, there is reason to investigate how different driving conditions affect the outcome. There is also a need to better understand why education in combination with a support system resulted in a lower energy saving than for those who were only given education during the tests in real traffic, and also why feedback during training in the simulator did not give a detectable effect. Basically, there are many reasons to further investigate how to design simulator training and support systems for train drivers. In addition to the energy savings, the results showed that drivers improved their arrival times i.e. arrive more accurate in relation to the time table. The results suggest that there is great potential for train simulators in the Swedish train driver education, both for training and for evaluating the effects of the training.

    Download full text (pdf)
    Mindre energi och rätt tid
  • 46.
    Abadir Guirgis, Georg
    et al.
    Swedish National Road and Transport Research Institute, Traffic and road users, Human-vehicle-transport system interaction.
    Peters, Björn
    Swedish National Road and Transport Research Institute, Traffic and road users, Human-vehicle-transport system interaction.
    Lidström, Mats
    Swedish National Road and Transport Research Institute, Traffic and road users, Vehicle technology and simulation.
    Lokförarutbildning i Sverige: simulatoranvändning och ERTMS2014Report (Other academic)
    Abstract [en]

    This report, which provides an overview of the compulsory basic training for train drivers in Sweden, highlights the occurrence of simulator-based training in education, along with the training efforts being made with regards to the future introduction of ERTMS/ETCS. The report also shows the possibilities and limitations of increased use of simulators in driver training and describes the most important governing documents for train drivers and train driver training. Furthermore, the Swedish Transport Agency curriculum for train driver licenses is presented along with the institutions engaged in basic education, training and examination of train driver’s. Also, the Swedish Transport Administration’s E-learning tool for ERTMS, the ERSA-simulator and company specific ERTMS education at SJ and Green Cargo are described. Moreover, Swedish train companies’ and educators’ current use and future needs of simulators for train driver training were examined. Examples from other domains where simulators are used in a training context are also presented.

    Download full text (pdf)
    fulltext
  • 47.
    Abadir Guirgis, Georg
    et al.
    Statens väg- och transportforskningsinstitut, Samspel människa, fordon, transportsystem, MFT.
    Peters, Björn
    Statens väg- och transportforskningsinstitut, Samspel människa, fordon, transportsystem, MFT.
    Lidström, Mats
    Statens väg- och transportforskningsinstitut, Fordonsteknik och simulering, FTS.
    Lokförarutbildning i Sverige: simulatoranvändning och ERTMS2014Report (Other academic)
    Abstract [en]

    This report, which provides an overview of the compulsory basic training for train drivers in Sweden, highlights the occurrence of simulator-based training in education, along with the training efforts being made with regards to the future introduction of ERTMS/ETCS. The report also shows the possibilities and limitations of increased use of simulators in driver training and describes the most important governing documents for train drivers and train driver training. Furthermore, the Swedish Transport Agency curriculum for train driver licenses is presented along with the institutions engaged in basic education, training and examination of train driver’s. Also, the Swedish Transport Administration’s E-learning tool for ERTMS, the ERSA-simulator and company specific ERTMS education at SJ and Green Cargo are described. Moreover, Swedish train companies’ and educators’ current use and future needs of simulators for train driver training were examined. Examples from other domains where simulators are used in a training context are also presented.

    Download full text (pdf)
    FULLTEXT01
  • 48. Abaglo, A. J.
    et al.
    Bonalda, C.
    Pertusa, Emeline
    KTH.
    Environmental Digital Model: Integration of BIM into environmental building simulations2017In: CISBAT 2017 International ConferenceFuture Buildings & Districts – Energy Efficiency from Nano to Urban Scale, Elsevier, 2017, Vol. 122, p. 1063-1068Conference paper (Refereed)
    Abstract [en]

    The digital model and the BIM are creating a revolution with a transition from 2D to 3D models. However, environmental professions carry out building simulations with a wide range of software with little or no communication between them. This often leads to the realization of several 3D models and therefore a significant loss of time, as well as possible inconsistencies of geometrical information. Our research aims to use the interoperability potential offered by BIM-friendly software to develop gateways to optimize the modeling phase and improve the restitution of the studies through visual integration in a digital mockup.

  • 49. Abarca, Leonardo
    et al.
    Killander, Emil
    Rollén, Christoffer
    ENTERPRISE ARCHITECTURE I SMÅ OCH MEDELSTORA FÖRETAG2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Efficient use of IT resources in organizations requires an optimized alignment between business operations and IT. Enterprise Architecture is a well-known concept used to align the structure of IT systems with the business operations. Previous research has mostly focused on Enterprise Architecture in large organizations, thus there is a lack of research on how the concept is applied, or can be applied, in small and medium-sized enterprises. The purpose of this study was to investigate how small and medium-sized enterprises, consciously or unconsciously, work or can work with Enterprise Architecture in their context. The secondary purpose was to develop a framework to support small and medium-sized enterprises in this work. Semi-structured interviews were conducted with people in senior positions in small and medium-sized enterprises (n = 4). The interview transcripts were analyzed using qualitative data analysis. The results of this study provide insight into a number of challenges and opportunities that small and medium-sized enterprises face when it comes to embracing Enterprise Architecture. The challenges were that they did not realize the value the concept can create, lack of resources, misconception that the concept must be applied fully, that the frameworks are too rigid, to involve the management team who are often more interested in financial performance indicators, floating role distributions and lack of long-term thinking. The opportunities were to improve the collaboration between IT and business, integrate IT systems and ensure that the systems are in line with the company's goals and visions, support long-term thinking, provide a better overview and structure of the business, reduce costs and optimize work processes. When working with Enterprise Architecture, small and medium-sized enterprises should use adaptable frameworks, manage the interplay between short-term and long-term goals, involve the entire business, establish active communication between different departments and only use what is needed in the business. Based on theoretical and empirical insights, a framework has been developed, which can be used to support the work with Enterprise Architecture in small and medium-sized enterprises.

    Download full text (pdf)
    fulltext
  • 50.
    Abas, Hassan
    et al.
    Malmö University, Faculty of Technology and Society (TS).
    Almén, Jonathan
    Malmö University, Faculty of Technology and Society (TS).
    Cybersäkerhet inom små och medelstora organisationer: Med anpassning till EU:s NIS-Direktiv2024Independent thesis Basic level (degree of Bachelor), 13 HE creditsStudent thesis
    Abstract [en]

    This study investigates how small and medium-sized enterprises in Sweden implement the EU's NIS Directive through their cybersecurity strategies and policies. The aim is to identify the main challenges and success factors in this process. Interviews with key individuals within these companies reveal that strong leadership engagement is crucial for integrating the NIS Directive requirements into daily operations. The study identifies coercive and mimetic isomorphism as significant factors for adaptation, where companies are influenced both by regulatory demands and by mimicking successful strategies from other firms. The findings show that proactive risk management, including regular training and the use of standards such as ISO 27001 and NIST, enhances companies' resilience against cyber threats. The use of external consultants is an effective strategy, despite the high costs. The study emphasizes the need for tailored cybersecurity strategies that consider each company's unique conditions and needs. 

    Download full text (pdf)
    fulltext
1234567 1 - 50 of 81255
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf