Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 11717
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Aalberg, Asbjørn Lein
    et al.
    SINTEF Digital, Norway.
    Holen, Siri Mariane
    SINTEF Digital, Norway.
    Aamodt, Edvard
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety.
    Steen-Hansen, Anne Elise
    RISE Research Institutes of Sweden, Safety and Transport, Fire and Safety. NTNU Norwegian University of Science and Technology, Norway.
    Preconditions for Learning from Fires in Norway: Structural, Cultural, Technological, Interactional and Relational Aspects2021In: Proceedings of the 31st European Safety and Reliability Conference, 2021, p. 1747-1754Conference paper (Refereed)
    Abstract [en]

    Learning from incidents is widely accepted as a core part of safety management. This is also true for fires – however few fires in Norway are investigated. Fires are interesting incidents conceptually due to their potential of devastating outcomes on material and human lives and because they happen across all sectors and industries, businesses, and homes. In Norway, several different actors play a role in investigating and learning from fires, from the fire rescue services to directorates and Non-Governmental Organisations. The present study seeks to understand the preconditions for learning from fires in Norway, with emphasis on the formal actors that play a role in preventing and mitigating fires. Methodologically, the study is based on qualitative interviews conducted with relevant actors from first responders, authorities, and other sectors. We found that there are structural, cultural, technological, and relational aspects that seem to influence learning from fires in Norway. The results were analyzed using thematic analysis and the Pentagon model framework. The findings are discussed in relation to theories from organisational learning and learning from incidents.

    Download full text (pdf)
    fulltext
  • 2.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Information Technology Governance: The Role of Organizational Culture and Structure2018Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information Technology Governance (ITG) is among the most important challenges for the managers today. IT is not anymore just a supportive tool but also a strategic driver for the businesses. In the dynamic and competitive world of today, it is crucial for organizations to know how to govern IT rather than just to use it. IT governance deals with specifying responsibilities and decision rights to encourage the desirable behaviour from IT and generate value from IT investments. IT governance can impact the overall performance of organizations, however there are still difficulties in understanding IT governance and the factors that may influence it.

    Organizational culture and structure are among the factors that have significant influence on many issues in an organization. According to previous research, organizational culture and structure need to be considered when implementing IT governance. However, there is a lack of research focusing on how organizational culture and structure can influence IT governance performance and implementation. Thus, the main research question addressed in this thesis is: How are organizational culture and structure related to IT governance? To address this question, this research has performed literature reviews and conducted case studies to investigate the role of organizational culture and structure on IT governance. As the first step, the previous literature was reviewed to find the gaps in the research on culture and IT governance. As the next step, four case studies were conducted to explore the influence of organizational culture and structure on IT governance. Two case studies have investigated the relation between organizational structure and IT governance implementation and performance in large organizations; and two other case studies investigated on how different types of organizational culture influence IT governance performance outcomes.

    The results of this research respond to the research question by specifying the role of culture in IT governance through a categorization of prior research both from research and practice perspectives; specifying the influence of different organizational culture types on IT governance performance outcomes in different organizations; and by specifying IT organizational structure relationship with IT governance performance outcomes and IT governance implementation.

    The research presented in this thesis provides both theoretical and empirical contributions to the IT governance research and practice.

    Download full text (pdf)
    fulltext
    Download (jpg)
    presentationsbild
  • 3.
    Aasi, Parisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Culture and Structure Influence on Information Technology Governance2016Licentiate thesis, comprehensive summary (Other academic)
    Download full text (pdf)
    fulltext
  • 4. Aasi, Parisa
    et al.
    Nikic, Jovana
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Li, Melisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Cloud Computing on IT Governance in a Swedish Municipality2020In: Information Systems: 17th European, Mediterranean, and Middle Eastern Conference, EMCIS 2020, Dubai, United Arab Emirates, November 25–26, 2020, Proceedings / [ed] Marinos Themistocleous, Maria Papadaki, Muhammad Mustafa Kamal, Springer, 2020, p. 623-639Conference paper (Refereed)
    Abstract [en]

    Cloud computing is used to a greater extent in today’s organizations and enables organizations to obtain on-demand network access to IT services. When cloud computing is adopted in an organization, the IT governance becomes more challenging, because organizations need to address business and IT-related processes as well as managing risks and maintaining the relationship with cloud computing vendors. This research aims at finding how cloud computing service model specifically Software as a Service (SaaS) influence IT governance structures, processes and relational mechanisms in a public organization. For this purpose a case study was conducted in a Swedish municipality and the data was collected through interviews with IT managers and from internal documents of municipality and was analyzed using thematic analysis. The results of this study shows that SaaS influences the IT governance structure by improving roles and responsibilities definition and speeds up the decision-making processes. Moreover, the communication with the vendors is more efficient due to the use of SaaS.

  • 5.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Does Organizational Culture Matter in IT Outsourcing Relationships?2015In: Proceedings of the 48th Annual Hawaii International Conference on System Sciences, IEEE, 2015, p. 4691-4699Conference paper (Refereed)
  • 6.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nunes, Ivan
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hodosi, Georg
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The impact of different organizational cultures on IT outsourcing relationship management2013In: International Journal of Innovation in the Digital Economy, ISSN 1947-8305, Vol. 4, no 2, p. 50-66Article in journal (Refereed)
    Abstract [en]

    Globalization has affected the organizations in many aspects such as structure, architecture, internal/external strategies and sourcing management. Outsourcing is one of the recent business strategies used to provide IT needs via external agents. The relationship between the service buyer and provider companies is a constituent playing a significant role in IT outsourcing success or failure. This research has a focus on the influence of organizational culture of buyer companies on the specific factors of trust, cooperation, communication and commitment in their relationship with the IT service provider. Two explorative case studies are done in global companies using ITO which revealed the presence of organizational culture effect. Particularly, being innovative, having open discussion as an organizational culture and looking for extending contracts with providers as a strategy, appeared as the major difference between the two cases organizational culture; which influences the studied factors of ITO relationship in this research.

  • 7.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Facing The Digitalization Challenge: Why Organizational Culture Matters and How It Influences IT Governance Performance2017In: Information Systems Development: Advances in Methods, Tools and Management: Proceedings / [ed] N. Paspallis, M. Raspopoulos, C. Barry, M. Lang, H. Linger, C. Schneider, Association for Information Systems, 2017Conference paper (Refereed)
    Abstract [en]

    Today it is not possible for the companies to compete without having IT as a strategic driver. That is why IT governance becomes crucial for managers to bring the most value from IT to the business. Additionally organizational culture is an important factor and often blamed when IT governance projects fail. However little in-depth research investigated how the organizational culture changes can improve the IT governance performance. This research is a case study of the IT department of a large company attempting to improve the IT governance while facing the digitalization challenge. In this case the IT department has an organizational culture change journey seeking to improve the IT governance performance. The results indicate that the initial clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore, adhocracy is identified as preferred culture for improving IT governance for growth.

  • 8.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2014In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 5, no 1, article id 3Article in journal (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 9.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2018In: Technology Adoption and Social Issues: Concepts, Methodologies, Tools, and Applications, IGI Global, 2018, no 2018, p. 139-156Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 10.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Culture Influence on IT Governance: What We Have Learned?2017In: Organizational Culture and Behavior: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017, no 2017, p. 1329-1346Chapter in book (Other academic)
    Abstract [en]

    Managers face enormous challenges today to plan the decision rights and responsibilities in order to reach desired IT behaviors which are aligned with business objectives of organizations. This is known as IT governance and is ranked as one of the firms' top concerns. Not surprisingly, it is crucial for organizations to find the affecting factors on IT governance and solve the problems associated with it. Culture in national, organizational or group level is an affecting factor in organizations that can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the influence of culture on IT governance. The research purpose is to identify how culture and IT governance in the companies can be linked together and promote this area for future research. The literature review is done systematically and the findings are classified by using an IT governance framework with three main components of structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance. This research calls upon a further research on culture impact on achieving an effective IT governance implementation in organizations.

  • 11.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Culture on IT Governance: A Literature Review2014In: 2014 47th Hawaii International Conference on System Sciences (HICSS) / [ed] Sprague, R. H., IEEE Computer Society, 2014, p. 4436-4445Conference paper (Refereed)
    Abstract [en]

    IT governance is crucial for managers to regulate the decision rights and responsibilities that the desired IT behaviors and business objectives are aligned with each other. Additionally, culture in national, organizational or group level can play a role in IT governance and this role is rarely explored in academic research. This paper provides a literature review investigating the impact of culture on IT governance. It is aimed to find the linkage between these two concepts and to promote this area for future research. The literature review was done systematically and the findings are categorized by using an IT governance framework which includes three main components: structures, processes and relational mechanisms. The results indicate there is an influence from national and organizational culture on IT governance, especially on relational mechanisms. However, the number of studies is very few and there is still a lack of knowledge on how culture can influence IT governance.

  • 12.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Influence of Organizational Culture on IT Governance Performance: Case of The IT Department in a Large Swedish Company2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences / [ed] Tung X. Bui; Ralph H. Sprague, Jr., IEEE Computer Society, 2016, p. 5157-5166Conference paper (Refereed)
    Abstract [en]

    IT governance is one of the top concerns of organizations today seeking to gain value from their IT investments and create competitive advantage. Organizational culture on the other hand is one of the various factors influencing IT governance performance. However there is not much research conducted to understand this topic deeply. This research thus, is exploring the influence of organizational culture on four IT governance performance outcomes through a case study in IT department of a large Swedish company. The results provide evidence that organizational culture is influencing IT governance performance. Specifically the current clan culture orientation of the IT department has led to a successful IT governance performance in cost-effective use of IT. Furthermore adhocracy as the preferred culture is identified to influence IT governance in effective use of IT for growth which is not so successful with the current clan culture.

  • 13.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Han, Shengnan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Role of Culture in IT Governance2014In: Americas Conference on Information Systems (AMCIS 2014): AMCIS 2014, Proceedings, AIS eLibrary , 2014Conference paper (Refereed)
  • 14.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    IT Organizational Structure Relationship with IT Governance Performance: Case of a Public Organization2017In: Information Technology Governance in Public Organizations: Theory and Practice / [ed] Lazar Rusu, Gianluigi Viscusi, Cham, Switzerland: Springer, 2017, no 0, p. 229-252Chapter in book (Refereed)
    Abstract [en]

    Information Technology (IT) is widely used in organizations and managers continue to struggle with how to govern IT. IT governance concerns the decision rights and division of responsibilities to achieve value from IT investments. Any IT governance approach is incorporated into a given organizational structure. However in the particular context of public organizations, there is little research on IT organizational structure relationship with IT governance performance. In this research, a case study is done in a public organization to find out how suitable is the organizational structure of the IT department is in relation with the IT governance performance. The results reveal that the IT department organizational structure needs to suit the IT governance performance desired outcomes. In this case, operating as a public organization has actuated the organization to focus on IT governance outcome of effective use of IT for growth. This together with the IT governance archetypes of this public organization for different IT decisions led the IT department leaders to adopt a matrix organizational structure.

  • 15.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    How Does the Organizational Culture of Collaborative Networks Influence IT Governance Performance in a Large Organization?2018In: Proceedings of the 51st Annual Hawaii International Conference on System Sciences, 2018, p. 4941-4951Conference paper (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks desire different organizational culture types based on their priorities for IT governance outcomes. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost effective use of IT. An adhocracy culture is desired when prioritizing the effective use of IT for business growth. Finally a combination of market and hierarchy organizational culture is desired when seeking effective use of IT for business flexibility and cost cutting.

  • 16.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Leidner, Dorothy
    Perjons, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrales Estrada, Martha
    What is the role of organizational culture in IT governance performance of collaborative virtual networks?2018In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 9, no 1, article id 2Article in journal (Refereed)
    Abstract [en]

    In today's complex organizations, IT governance is an important managerial challenge. IT governance deals with decisions and responsibilities concerning IT. There are many factors influencing IT governance. One factor that has remained relatively unexplored by academic research is that of organizational culture. This research explores the influence of the organizational culture of collaborative networks on IT governance performance. A case study was conducted in a large complex company with several networks. The findings indicated that the networks fit better with different organizational culture types based on their priorities for IT governance outcomes to maximize performance. A clan organizational culture is desired when aiming for effective use of IT for asset utilization and cost-effective use of IT. An adhocracy culture fits better when prioritizing the effective use of IT for business growth. Finally, a combination of market and hierarchy organizational culture is desired and fits better when seeking effective use of IT for business flexibility and cost cutting.

  • 17.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2020In: Start-Ups and SMEs: Concepts, Methodologies, Tools, and Applications / [ed] Mehdi Khosrow-Pour, IGI Global, 2020, no 1, p. 1664-1687Chapter in book (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance’s five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 18.
    Aasi, Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vieru, Dragos
    The Role of Culture in IT Governance Five Focus Areas: A Literature Review2017In: International Journal of IT - Business Alignment and Governance, ISSN 1947-9611, E-ISSN 1947-962X, Vol. 8, no 2, p. 42-61, article id 3Article, review/survey (Refereed)
    Abstract [en]

    Information technology governance (ITG) is one of the top challenges of managers today and culture in different level can have an important role while implementing IT governance. This is a new and significant issue, which has not been investigated deeply. This paper sets out to provide a systematic review of the literature, focusing on the role of culture in IT governance. The literature review findings are categorized through the lens of IT governance's five focus areas which are IT strategic alignment, IT value delivery, Risk management, IT resource management and Performance measurement. This study contributes to the field of IT governance by reviewing and discussing the existing literature on the role of culture on IT governance. This literature review resulted that there are few research studies in this topic and many of the IT governance focus areas are not covered regarding the role of culture in these IT governance areas.

  • 19.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Atug, Sebastian
    Institutionen för data- och systemvetenskap, Stockholms universitet. Sverige.
    Cermeno, Lorenzo
    för data- och systemvetenskap, Stockholms universitet. Sverige.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Digital Transformation Success Through Aligning the Organizational Structure: Case Study of Swedish Public Organizations2022In: AMCIS 2022 Proceedings, Association for Information Systems (AIS) , 2022Conference paper (Refereed)
    Abstract [en]

    A Digital Transformation fundamentally involves the implementation of one or more digital tools, which is a process often burdened with challenges. It is estimated that approximately 66 to 84 percent of the taken Digital Transformation initiatives are unsuccessful, which can be attributed to organizational shortcomings, more specifically structural ones. While public organizations regularly do not achieve the same success as those in the private sector, it was of interest to investigate the Swedish ones. Where 86 percent of residents use the internet to interact with public authorities. Previous research has singled out the IT organization to be the appointed leader of Digital Transformations, further research on that relationship is limited. Therefore, this study examines how the IT organization, in an agile environment, can align its structure for a successful Digital Transformation. To answer the discovered research problem, the following research question has been formulated: “How should an IT organization’s structure be aligned in an agile environment in order to achieve a successful Digital Transformation?”. This is research in progress and will be continued by conducting case studies in four public organizations. Data will be collected through semi0structured interviews and analyzed thematically. Finally, a presentation of different aspect of organizational structure alignment through digital transformation based on these cases will be provided.

  • 20.
    Aasi, Seyedeh Parisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Gråhns, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Geijer, Robin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organizational Aspects in Achieving a Successful Digital Transformation: Case of an ERP System Change2022In: Information Systems: 18th European, Mediterranean, and Middle Eastern Conference, EMCIS 2021, Virtual Event, December 8–9, 2021, Proceedings / [ed] Marinos Themistocleous; Maria Papadaki, Springer, 2022, p. 653-666Conference paper (Refereed)
    Abstract [en]

    Digital transformation has been an interesting concept from the organizational perspective for a long time. The benefits of a successful digital transformation can take your organization into the next step by providing an increased organizational growth, aid market reachability by penetrating new and exciting markets, or enable your business operations to function to a greater extent than before with higher efficiency and lower lead times. Digital transformation is however a complex and diverse concept that means to integrate new innovations by using digital technology into the organization with the need of making greater organizational changes to succeed. This research, has explored how different organizational aspects like structural, technological and cultural ones can impact the success of a digital transformation during an ERP system change. A case study has been conducted in a company to identify how the current structural, technological, and cultural aspects influence the current digital transformation in that the company. The data was collected through interviews with employees having managerial roles and from internal documents of company and was analyzed using thematic analysis. The results show an agile approach, a more decentralized structure and high readiness for change, along with a transparent communication between management and co-workers to be beneficial for a successfully digital transformation.

  • 21. Abarca, Leonardo
    et al.
    Killander, Emil
    Rollén, Christoffer
    ENTERPRISE ARCHITECTURE I SMÅ OCH MEDELSTORA FÖRETAG2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Efficient use of IT resources in organizations requires an optimized alignment between business operations and IT. Enterprise Architecture is a well-known concept used to align the structure of IT systems with the business operations. Previous research has mostly focused on Enterprise Architecture in large organizations, thus there is a lack of research on how the concept is applied, or can be applied, in small and medium-sized enterprises. The purpose of this study was to investigate how small and medium-sized enterprises, consciously or unconsciously, work or can work with Enterprise Architecture in their context. The secondary purpose was to develop a framework to support small and medium-sized enterprises in this work. Semi-structured interviews were conducted with people in senior positions in small and medium-sized enterprises (n = 4). The interview transcripts were analyzed using qualitative data analysis. The results of this study provide insight into a number of challenges and opportunities that small and medium-sized enterprises face when it comes to embracing Enterprise Architecture. The challenges were that they did not realize the value the concept can create, lack of resources, misconception that the concept must be applied fully, that the frameworks are too rigid, to involve the management team who are often more interested in financial performance indicators, floating role distributions and lack of long-term thinking. The opportunities were to improve the collaboration between IT and business, integrate IT systems and ensure that the systems are in line with the company's goals and visions, support long-term thinking, provide a better overview and structure of the business, reduce costs and optimize work processes. When working with Enterprise Architecture, small and medium-sized enterprises should use adaptable frameworks, manage the interplay between short-term and long-term goals, involve the entire business, establish active communication between different departments and only use what is needed in the business. Based on theoretical and empirical insights, a framework has been developed, which can be used to support the work with Enterprise Architecture in small and medium-sized enterprises.

    Download full text (pdf)
    fulltext
  • 22.
    Abas, Hassan
    et al.
    Malmö University, Faculty of Technology and Society (TS).
    Almén, Jonathan
    Malmö University, Faculty of Technology and Society (TS).
    Cybersäkerhet inom små och medelstora organisationer: Med anpassning till EU:s NIS-Direktiv2024Independent thesis Basic level (degree of Bachelor), 13 HE creditsStudent thesis
    Abstract [en]

    This study investigates how small and medium-sized enterprises in Sweden implement the EU's NIS Directive through their cybersecurity strategies and policies. The aim is to identify the main challenges and success factors in this process. Interviews with key individuals within these companies reveal that strong leadership engagement is crucial for integrating the NIS Directive requirements into daily operations. The study identifies coercive and mimetic isomorphism as significant factors for adaptation, where companies are influenced both by regulatory demands and by mimicking successful strategies from other firms. The findings show that proactive risk management, including regular training and the use of standards such as ISO 27001 and NIST, enhances companies' resilience against cyber threats. The use of external consultants is an effective strategy, despite the high costs. The study emphasizes the need for tailored cybersecurity strategies that consider each company's unique conditions and needs. 

    Download full text (pdf)
    fulltext
  • 23.
    Abbas, Asad
    et al.
    Örebro University, Örebro University School of Business.
    Faiz, Ali
    Örebro University, Örebro University School of Business.
    Reasons for the failure of government IT projects in Pakistan: A Contemporary Study2013Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 24.
    Abbas, Asad
    et al.
    Örebro University, Örebro University School of Business.
    Faiz, Ali
    Örebro University, Örebro University School of Business.
    Usefulness of Digital and Traditional Library in Higher Education2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
  • 25.
    Abbas, Haider
    et al.
    KTH, School of ICT, Electronic Systems.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    ICT/Materialfysik.
    Addressing Dynamic Issues in Information Security Management2011In: Information Management & Computer Security, ISSN 0968-5227, E-ISSN 1758-5805, Vol. 19, no 1, p. 5-24Article in journal (Refereed)
    Abstract [en]

    The paper addresses three main problems resulting from uncertainty in information security management: i)dynamically changing security requirements of an organization ii) externalities caused by a security system and iii)obsolete evaluation of security concerns. A framework based on options reasoning borrowed from corporate finance is proposed and adapted to evaluation of security architecture and decision-making for handling these issues at organizational level. The adaptation as methodology is demonstrated by a large case study validating its efficacy.

  • 26. Abbas, Haider
    et al.
    Magnusson, Christer
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Yngström, Louise
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hemani, Ahmed
    Architectural Description of an Automated System for Uncertainty Issues Management in Information Security2010In: International Journal of computer Science and Information Security, ISSN 1947-5500, Vol. 8, no 3, p. 59-67Article in journal (Refereed)
    Abstract [en]

    Information technology evolves at a faster pace giving organizations a limited scope to comprehend and effectively react to steady flux nature of its progress. Consequently the rapid technological progression raises various concerns for the IT system of an organization i.e. existing hardware/software obsoleteness, uncertain system behavior, interoperability of various components/method, sudden changes in IT security requirements and expiration of security evaluations. These issues are continuous and critical in their nature that create uncertainty in IT infrastructure and threaten the IT security measures of an organization. In this research, Options theory is devised to address uncertainty issues in IT security management and the concepts have been developed/validated through real cases on SHS (Spridnings-och-Hämtningssystem) and ESAM (E-society) systems. AUMSIS (Automated Uncertainty Management System in Information Security) is the ultimate objective of this research which provides an automated system for uncertainty management in information security. The paper presents the architectural description of AUMSIS, its various components, information flow, storage and information processing details using options valuation techniques. It also presents heterogeneous information retrieval problems and their solution. The architecture is validated with examples from SHS system

  • 27.
    Abbas, Nada
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Information needs of gravel roads stakeholders:  A case study to elicit the requirements of future users of a cloud-based information system2020Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Within any ecosystem, information needs are shared to be fulfilled and to support the ecosystem in a way or another. They are vital for designing appropriate information systems that will provide those needs. In this thesis, the gravel road ecosystem is studied, where efficient information sharing is not enabled due to the lack of appropriate information systems. Thus,when focusing on the gravel roads ecosystem, information plays a crucial role regarding the maintenance acts upon these roads. Moreover, not enough literature investigates theinformation needs of gravel roads stakeholders with the aim to improve the maintenance ofthese roads.

    Therefore, this thesis intends to elicit information needs of gravel road stakeholders by performing an exploratory case study. The case study forms a part of an ongoing project with the goal to build a cloud-based information system for a sustainable gravel road maintenance. Data were collected through telephone- and online-based interviews with several key stakeholders in Sweden and were thereafter structured through template analysis. The major findings were a set of information needs and several needed sensors within the pre-mentioned information system. This thesis concluded that the future cloud-based information system in the ongoing project is a useful system for sharing vital information among future gravel roads stakeholders, considering the variety of needed information that affects the maintenance of the gravel roads.

    Download full text (pdf)
    Information needs of gravel roads stakeholders
  • 28.
    Abbasi, Abdul Ghafoor
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    CryptoNET: Generic Security Framework for Cloud Computing Environments2011Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that

    -               our system is guaranteed to be secure,

    -               it is verifiable to provide the complete set of security services,

    -               we prove that it always functions correctly, and

    -               we justify our claim that it can not be compromised without user neglect and/or consent.

     

    We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security.

    In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate.

    At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications.

    Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then

    -               its software modules are not vulnerable to malware and viruses,

    -               its data are not vulnerable to illegal reading and theft,

    -               all messages exchanged in a networking environment are strongly protected, and

    -               all other resources of an application are also strongly protected.

     

    Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use.

    Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems.

    By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications.

    Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected.

    Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently.

    We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system.

    Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions.

    Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure Application Servers to client components are Single-Sign-On protocol, secure communication, and user authorization. In our system application servers are installed in a domain but it can be installed in a cloud environment as services. Secure Application Servers are designed and implemented using the concept and implementation of the Generic Security Server. It provides extended security functions using our engine components. So by adopting this approach, the same sets of security services are available to each application server.

    Security Management Infrastructure Servers provide domain level and infrastructure level services to the components of the CryptoNET architecture. They are standard security servers, known as cloud security infrastructure, deployed as services in our domain level could environment.

    CryptoNET system is complete in terms of functions and security services that it provides. It is internally integrated, so that the same cryptographic engines are used by all applications. And finally, it is completely transparent to users – it applies its security services without expecting any special interventions by users. In this thesis, we developed and evaluated secure network applications of our CryptoNET system and applied Threat Model to their validation and analysis. We found that deductive scheme of using our generic security objects is effective for verification and testing of secure, protected and verifiable secure network applications.

    Based on all these theoretical research and practical development results, we believe that our CryptoNET system is completely and verifiably secure and, therefore, represents a significant contribution to the current state-of-the-art of computer network security.

    Download full text (pdf)
    FULLTEXT01
  • 29.
    Abbasi, Shirin
    et al.
    Islamic Azad University, Iran.
    Rahmani, Amir
    National Yunlin University of Science and Technology, Douliou, Taiwan.
    Balador, Ali
    RISE Research Institutes of Sweden, Digital Systems, Industrial Systems. Mälardalen University, Sweden.
    Sahafi, Amir
    Islamic Azad University, Iran.
    Internet of Vehicles: Architecture, services, and applications2021In: International Journal of Communication Systems, ISSN 1074-5351, E-ISSN 1099-1131, Vol. 34, no 10, article id e4793Article in journal (Refereed)
    Abstract [en]

    The connection between objects and information exchange has been possible in recent years, with the advent of the Internet of Things (IoT) in different industries. We can meet different requirements in each industry utilizing this feature. Intelligent transportation uses the Internet of Vehicles (IoV) as a solution for communication among vehicles. It improves traffic management applications and services to guarantee safety on roads. We categorize services, applications, and architectures and propose a taxonomy for IoV. Then, we study open issues and challenges for future works. We highlighted applications and services due to drivers' requirements and nonfunctional requirements, considering the qualitative characteristic. This paper summarizes the current state of the IoV in architectures, services, and applications. It can be a start view to provide the solutions for challenges in traffic management in cities. The present study is beneficial for smart city developments and management. According to this paper's result, the services and applications evaluate performance with 34% frequency, safety and data accuracy, and security with a 13% frequency in selected papers. These measurements are essential due to the IoV characteristics such as real-time operation, accident avoidance in applications, and complicated user data management. 

  • 30.
    Abd Al Ghani, Zahi
    et al.
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Ha Zu, Peter
    Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
    Framtidens Lärande: En Undersökning av ChatGPT:s Acceptans, Möjligheter och Utmaningar Inom Högre Utbildning2023Independent thesis Basic level (degree of Bachelor), 13 HE creditsStudent thesis
    Abstract [sv]

    Det pågår en stor förändring i arbetsliv och samhälle i samband med lansering av olika generativa AI verktyg som skapar innehåll varierande former. Centralt i debatten är ChatGPT, som har väckt mängder av diskussioner i media angående risker för missbruk, särskilt inom utbildningssektorn. Denna studie syftar till att skapa och bidra till förståelse över ChatGPT och dess användbarhet, samt utmaningar genom att analysera acceptansen hos lärare och studenter i högre utbildning. Detta genom att använda teorier från nya vetenskapliga artiklarna angående ChatGPT i högre utbildning, samt jämföra dem med kvalitativa data i form av perspektiv och åsikter från lärare och studenter, och slutligen analysera dem i ett samband med tidigare utbildningsteknologier. Studiens resultat tyder på att ChatGPT har relativt blandad acceptans och delvis haft fördelaktiga effekter på genomförandet av uppgifter i högre utbildning beroende på kunskapsämne. ChatGPT har redan uppvisat anmärkningsvärda förändringar i arbetsprocessen för både lärare och studenter, däremot förekommer det obesvarade frågor och etiska problematik vilket för närvarande förhindrar dess möjligheter som ett potentiellt revolutionerande utbildningsverktyg i högre utbildning.

    Download full text (pdf)
    fulltext
  • 31.
    Abd-Alhe, Manar
    et al.
    University West, School of Business, Economics and IT, Divison of Informatics.
    Ernhjelm, Henrietta
    University West, School of Business, Economics and IT, Divison of Informatics.
    Vad är svenska bilisters inställning till självkörande bilars ageranden i etiskt svåra situationer?2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The purpose of this study is to investigate Swedish motorists' attitudes towards self-driving cars. The thesis highlights advanced ethical decisions and ethical problems that exist for self-driving cars.

    To answer the question "What is the attitude of Swedish motorists towards self-driving cars and their actions in ethically difficulty situations?" a qualitative method has been applied. Artificial intelligence is a broad area with many domains, and therefore a delimitation has been made to the automotive industry.

    By using interviews and literature studies, the ethical dilemmas have been established for self-driving cars. The results of this literature study have been analyzed together with interviews for the study.

    Problems that have been identified with self-driving cars is that they are responsible for the event of accidents and decisive in ethical situations. Another problem identified in this study is the question of whom should be given priority in a situation where an accident is inevitable. The result has revealed that the actions of cars do not always comply with the driver's ethical principles, and that society usually lacks knowledge in the area of self-driving cars. People could act on reflexes in sudden incidents, which is different from a system that can make faster calculated decisions.

  • 32. Abd-Alrahman, Ahmed Mustafa
    et al.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Modelling Health Information during Catastrophic Events - A Disaster Management System for Sudan2017In: IST-Africa 2017: Conference Proceedings / [ed] Paul Cunningham, Miriam Cunningham, International Information Management Corporation Limited, 2017, p. 1-9Conference paper (Refereed)
    Abstract [en]

    There is an increasing trend of disastrous events during past decade with significant damage in terms of lives, infrastructure, economics and environment. Disastrous events are affecting communities worldwide and, apart for the actual and personal suffering involved, can fundamentally disrupt societal functions for many years. This is particularly the case in already vulnerable regions, which often require external assistance of various kinds. In order to reduce catastrophic effects of disasters, disaster mitigation measures and crisis reduction must be systematically planned and managed. This includes correct damage assessment, fast, efficient and prepared responses, adequate resource allocation and organisation of the relief processes. Obviously, the conditions and abilities to implement such measures are very different in various locations, where regions have particularly severe conditions. In this paper, we discuss crisis management in Sudan and highlight the need for national and regional disaster management processes and activities as well as general framework for the design of an efficient disaster management program in Sudan.

  • 33. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Comparing an e-Learning Reproductive Health Module with Traditional Lectures at a Medical School in Egypt2010In:  , 2010Conference paper (Other academic)
  • 34. Abdel Hai, R
    et al.
    Yassin, A
    Ahmad, MF
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Exploring Knowledge, Attitudes and Behaviors of Medical Students Towards Using Computer Technology in Learning2010In:  , 2010Conference paper (Other academic)
  • 35.
    Abdel-Fattah, Dina
    et al.
    UiT – The Arctic University of Norway, Norway; University of Alaska Fairbanks, USA.
    Danielson, Mats
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Hock, Regine
    University of Alaska Fairbanks, USA; University of Oslo, Norway.
    Trainor, Sarah
    University of Alaska Fairbanks, USA.
    Application of a structured decision-making process in cryospheric hazard planning: Case study of Bering Glacier surges on local state planning in Alaska2024In: Journal of Multi-Criteria Decision Analysis, ISSN 1057-9214, E-ISSN 1099-1360, Vol. 31, no 1-2, article id e1825Article in journal (Refereed)
    Abstract [en]

    Surging glaciers are glaciers that experience rapidly accelerated glacier flow over a comparatively short period of time. Though relatively rare worldwide, Alaska is home to the largest number of surge-type glaciers globally. However, their impact on the broader socioecological system in the state is both poorly understood and under-researched, which poses a challenge in developing appropriate sustainability decisions in Alaska. We investigated how the surge patterns of the Bering Glacier in Alaska have potentially devastating effects on the local ecological biodiversity of its watershed via a structured decision-making analysis of the different possible consequences. Specifically, this analysis was conducted to explore the various outcomes of a Bering Glacier surge particularly if humans have an increased presence near the glacier due to the area potentially becoming a state park. This work explored the benefits of applying a risk and decision analytical framework in a cryosphere context, to better understand the socioeconomic impact of glacier surges. This is a novel approach in which a decision analysis tool was used to better understand an environmental sustainability challenge, offering an innovative method to support the achievement of the United Nations Sustainability Development Goals in Alaska. We therefore emphasise the need for integrated biophysical and socioeconomic analyses when it comes to understanding glacier hazards. Our research highlights the importance of understanding and researching biophysical changes as well as using a structured decision-making process for complicated hazard planning scenarios, exemplified via glaciated regions in Alaska, in order to create adaptation strategies that are sustainable and encompass the range of possible outcomes.

  • 36.
    Abdelhadi, Ahmed
    et al.
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Fadda, Mohammed Raoof
    Jönköping University, School of Engineering, JTH, Department of Computer Science and Informatics.
    Exploring Software-Defined Networking Challenges in Sweden: IT Team Knowledge and Skills Gap2022Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Software-Defined Networking (SDN) is a new evolving approach within the networking domain. The concept is based on decoupling and abstracting the control and data plane of the traditional network devices. This separation facilitates the network operations with many benefits such as faster delivery, better segmentation, scalability, programmability, enhancing the quality of service and the quality of experience. Despite all the benefits, SDN has its own set of challenges. 

    The purpose of this study is to explore the main challenges in adopting SDN architecture in Swedish organizations. The focus is on the skills gap as one of the main challenges and how Swedish organizations were able to manage it.

    A qualitative approach has been chosen to conduct this research using semi-structured interviews to collect the data from seven different organizations, using a mixture of a purposive and snowball sampling selection. A thematic approach was then used to generate categories and themes from the collected data.

    The results are consistent with previous studies when it comes to technical, financial and security challenges. The technical challenges, however, were fewer in comparison with previous studies. A new way of working was presented as a new challenge when implementing SDN solutions. Furthermore, the knowledge gap was mentioned as a key challenge within Swedish organizations when implementing/operating SDN. 

    Finally, clear recommendations were made to overcome the knowledge gap challenge, from consulting a third-party expert, having a detailed plan, employing a multiphase process for SDN implementation, to having an online learning platform available to the IT team. 

    Download full text (pdf)
    Exploring SDN Challenges in Sweden
  • 37.
    Abdihodzic, Sanin
    University of Skövde, School of Informatics.
    Den digitala verktygslådan: En studie om de digitala verktygens svårigheter i distansundervisningen2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna studie syftar till att undersöka vilka svårigheter högstadielärare upplever i distansundervisningen där digitala verktyg används. Studiens syfte är att undersöka vad som anses vara problematiskt med användningen av digitala verktyg när lärare och elever inte befinner sig på samma fysiska plats. För att skapa en god grund för läsaren presenteras en bakgrund där den rådande situationen kring pandemin Covid-19 och dess utveckling presenteras. I bakgrunden behandlas även den övergång som gjorts från det traditionella klassrummet till distansundervisning, vad digitala verktyg är, innebörden av digital kompetens, IKT i undervisningen samt olika typer av kommunikation. För att stärka studiens syfte ytterligare presenteras också delar från den tidigare forskning som gjorts inom ämnesområdet. Den insamling av data som gjort i studien är en fallstudie med en kvalitativ ansats där 10 högstadielärare intervjuats gällande ämnet digitala verktyg i distansundervisningen. Studien visar att lärare upplever de digitala verktygen som används idag som problematiska. Lärarna i fråga anser att de digitala verktygen inte är anpassade efter undervisningen syfte. De 10 intervjuer som genomförts mynnar ut i 3 huvudsakliga problemområden; kommunikation, uppkoppling och verktygets struktur som samtliga bearbetas i studiens analys. Studien visar att de digitala verktygen som idag används i distansundervisningen inte uppfyller de kriterier som lärare och skola har. Den bristande kommunikationen försvårar lärarnas arbete, gör undervisningen långsammare och komplicerar feedback. Uppkopplingsproblematiken skapar frustration och ett sämre lärande hos eleverna samtidigt som de digitala verktygens struktur anses vara svag och inte anpassad efter den hela massan.

    Download full text (pdf)
    fulltext
  • 38.
    Abdu, Mohammed
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Integrated Source Code and Architectural Quality Analysis Using Neo4j Graph Database2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    In the realm of software engineering, understanding the architecture and measuringthe quality of a source code is essential for maintaining and enhancing softwaresystems. However, many existing tools fall short in evaluating architectural aspects,such as detecting architectural erosion or addressing architecture-related metrics andconstraints tailored to the unique context of their systems or organisations. Thisdeficiency restricts proactive architecture governance and hinders the mitigation ofarchitecture-related risks, creating a critical gap in the analysis of software sourcecode.

    This thesis presents a novel approach to tackle these challenges. It proposes a graphdatabase as a data structure for analysing the source code and architecture quality andcalculating various architectural metrics of interest. The tool developed in this thesisrepresents the source code structural elements and their relationships in the graphdatabase, enabling an intuitive analysis of the source code architecture.

    The tool also integrates different code quality metrics parsed from Visual Studiocode metrics results, mapped to their correspondent nodes to assess the source codeoverall quality and identify potential areas of improvement. This empowers softwareengineers and developers to make informed decisions regarding refactoring, codeoptimisation, and architectural enhancements.

    Furthermore, the tool allows users to define the intended architecture in terms ofmodules to reveal any Architecture erosion (AEr). It also provides the flexibility toestablish custom constraints and metrics through tailored queries, accommodating theunique requirements of their system and company.

    A case study conducted on a real-world software project validates the effectivenessand usefulness of the proposed approach. The case study demonstrates how the toolanalysis reveals valuable insights into the source code health and identifies patternsthat can impact maintainability and scalability. The results of this research showcasethe potential of our tool as a powerful instrument for analysing the code qualityand architecture of source code, fostering more resilient and sustainable softwaresystems.

    Download full text (pdf)
    Integrated Source Code and Architectural Quality Analysis Using Neo4j Graph Database
  • 39.
    Abdulhomeed, Bashar
    Örebro University, Örebro University School of Business.
    Contemporary Research on e-democracy: A Literature Review2013Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
  • 40.
    Abdulkarim, Rekan
    et al.
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Lopez Fredriksson, Christoffer
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Nyckelfaktorer som påverkar framgång av e-röstningssystem – en fallstudie av fyra europeiska länder2020Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study examines the current situation regarding e-voting in four selected European countries as well as whether Sweden can implement e-voting and achieve success. With the help of a literature study, the study defines the advantages and disadvantages of e-voting and the traditional voting procedure and through a case study, the current situation is identified by the selected European countries and an interview is conducted to gain an insight into the Swedish voting procedure and where Sweden stands when it comes to e-voting. By analyzing the interview and doing a comparative analysis of the key factors that affected the failure or success of e-voting in the selected countries with the key factors identified in Sweden, the result will be clear whether an implementation in Sweden can be successful or not.

    Download full text (pdf)
    fulltext
  • 41.
    Abdullah Jan, Mirza
    et al.
    Linköping University, Department of Electrical Engineering.
    Ahsan, Mahmododfateh
    Linköping University, Department of Electrical Engineering.
    Multi-View Video Transmission over the Internet2010Independent thesis Advanced level (degree of Master (Two Years)), 30 credits / 45 HE creditsStudent thesis
    Abstract [en]

    3D television using multiple views rendering is receiving increasing interest. In this technology a number of video sequences are transmitted simultaneously and provides a larger view of the scene or stereoscopic viewing experience. With two views stereoscopic rendition is possible. Nowadays 3D displays are available that are capable of displaying several views simultaneously and the user is able to see different views by moving his head.

    The thesis work aims at implementing a demonstration system with a number of simultaneous views. The system will include two cameras, computers at both the transmitting and receiving end and a multi-view display. Besides setting up the hardware, the main task is to implement software so that the transmission can be done over an IP-network.

    This thesis report includes an overview and experiences of similar published systems, the implementation of real time video, its compression, encoding, and transmission over the internet with the help of socket programming and finally the multi-view display in 3D format.  This report also describes the design considerations more precisely regarding the video coding and network protocols.

    Download full text (pdf)
    FULLTEXT02
  • 42.
    Abdulrahman, Aziz
    et al.
    University West, School of Business, Economics and IT, Divison of Informatics.
    Whittaker, David
    University West, School of Business, Economics and IT, Divison of Informatics.
    Avatarers pedagogiska implikationer för lärande i Virtual Reality: Empirisk studie om Tenstar Simulations AB’s avatar-teknik2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study is a part of a research project between Tenstar Simulation AB and University West with the purpose of developing pedagogical knowledge regarding Tenstar Simulation’s avatar-technology in Virtual Reality (VR) as an educational tool. VR has become more and more common in education with the purpose of making the learning process for students more efficient. The purpose of this study is to explore and investigate the pedagogical implications of VR, with a particular emphasis on Avatar technologies, for a teacher’s teaching context. The data collection method used in this study was semi-structured interviews, the interviews were individual interviews and the participants consisted of both teachers and Tenstar Simulation’s employees. The results indicated among other things that both VR and avatars have pedagogical benefits, where VR is a meaningful tool to facilitate training that is applicable to real life situations. Whereas avatars can afford the teacher more ways to observe the student’s actions in the VR-environment as well as affording more ways of communication between teacher and student. However, one challenge regarding potential teachers being critical to the use of the technologies was highlighted.

  • 43.
    Abdulrazak Kadhim, Duaa
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Improving Electronic Health Records for Non-Swedish Speaking Refugees: A Qualitative Case Study2018Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Abstract

    Information and communication technology is used in healthcare in Sweden to improve health quality. Electronic Health Records are one of the technologies in healthcare which can increase a patient’s involvement in his/her healthcare and decision-making related to it. The patient can discuss the treatments, analyses and medical information stored in Electronic Health Records. The aim in this study is to investigate how the Electronics Health Records can be improved to motivate refugees in Sweden who cannot speak Swedish. This research is a qualitative interpretive case study. The methods used in this study are observation and interviews. Thematic analysis was used for data analysis. The findings show that refugees don’t receive information or instructions about how to use electronic health records properly. The language is the biggest hurdle to use electronic health records for refugee patients without knowing Swedish language. The findings further show that the electronic health records can be improved by adding sound or translated medical information in the diagnosis part of the electronic health record. This research might contribute to the healthcare process of any country in the world which has refugees and they use electronic health records.

     

    Download full text (pdf)
    fulltext
  • 44.
    Abelli, Björn
    University of Borås, School of Business and IT.
    Directing and Enacting the Information System2007In: Advances in Information Systems Development - New Methods and Practice for the Networked Society. / [ed] W Wojtkowski, W. G. Wojtkowski, J. Zupancic, G. Magyar, G. Knapp, Springer US , 2007, p. 13-23Chapter in book (Other academic)
  • 45.
    Abelli, Björn
    Mälardalen University, School of Business.
    Directing and Enacting the Information System2007In: Advances in Information Systems Development: New Methods and Practice for the Networked Society, Volume 2, Issue PART 2, 2007, p. 13-23Conference paper (Refereed)
  • 46.
    Abelli, Björn
    Mälardalen University, School of Business.
    Enacting the e-Society2006In: Proceedings of the IADIS International Conference e-Society 2006, 2006, p. 285-298Conference paper (Refereed)
  • 47.
    Abelli, Björn
    University of Borås, School of Business and IT.
    On Stage! Playwriting, Directing and Enacting the Informing Processes2007Doctoral thesis, monograph (Other academic)
  • 48.
    Abelli, Björn
    et al.
    Mälardalen University, School of Business.
    Révay, Péter
    Mälardalen University, School of Business.
    To Be or Not To Be Computer Based2004In: Proceedings of microCAD 2004, 2004, p. 1-8Conference paper (Refereed)
  • 49. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Tweens konstruerar identitet online – flickors och pojkars erfarenheter av sociala medier2013In: Pedagogisk forskning i Sverige, ISSN 1401-6788, E-ISSN 2001-3345, Vol. 18, no 1-2Article in journal (Refereed)
  • 50. Abiala, Kristina
    et al.
    Hernwall, Patrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Tweens negotiating identity online – Swedish girls' and boys' reflections on online experiences2013In: Journal of Youth Studies, ISSN 1367-6261, E-ISSN 1469-9680, Vol. 16, no 8, p. 951-969Article in journal (Refereed)
    Abstract [en]

    How do Swedish tweens (10–14 years old) understand and experience the writing of their online identities? How are such intertwined identity markers as gender and age expressed and negotiated? To find some answers to these questions, participants in this study were asked to write a story about the use of online web communities on pre-prepared paper roundels with buzzwords in the margins to inspire them. Content analysis of these texts using the constant comparative method showed that the main factors determining how online communities are understood and used are the cultural age and gender of the user. Both girls and boys chat online, but girls more often create blogs while boys more often play games. Gender was increasingly emphasised with age; but whereas boys aged 14 described themselves as sexually active and even users of pornography, girls of the same age described themselves as shocked and repelled by pornography and fearful of sexual threats. In this investigation an intersectionalist frame of reference is used to elucidate the intertwined power differentials and identity markers of the users' peer group situation.

1234567 1 - 50 of 11717
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf