Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 6483
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Aakhus, Mark
    et al.
    Rutgers University.
    Ågerfalk, Pär
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    Lennmyr, Fredrik
    Uppsala University, Disciplinary Domain of Medicine and Pharmacy, Faculty of Medicine, Department of Surgical Sciences, Anaesthesiology and Intensive Care.
    Digital Innovation as Design of Digital Practice: Doctors as Designers in Healthcare2018In: Proceedings of the 51st Hawaii International Conference on System Sciences (HICSS), 2018, p. 4594-4601Conference paper (Refereed)
    Abstract [en]

    Medical professionals are increasingly assuming the role of maker and creator. At the same time, digital innovations, as part of evolving information infrastructures, are becoming increasingly prevalent in healthcare. In this paper, we adopt a Schönian approach to understand how a medical professional, who is not an IS designer by trade, engages in the design of digital practice - turning what may appear as a failed digital innovation effort into a successful design of digital practice. Our inquiry suggests three pragmatic principles that call for further investigation: (a) professionals can make a significant contribution to design work by inventing means for fact-based, reflective engagement with the situation; (b) the reorganization of work practice involves organizational design, information system design, and communication design; and (c) developing design as digital practice entails the development of fact-based design practice and must engage practical theories.

    Download full text (pdf)
    fulltext
  • 2. Aakhus, Mark
    et al.
    Ågerfalk, Pär
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media.
    Lyytinen, Kalle
    Te’eni, Dov
    Symbolic Action Research in Information Systems: Introduction to the Special Issue2014In: Management Information Systems Quarterly, ISSN 0276-7783, E-ISSN 2162-9730, Vol. 38, no 4, p. 1187-1200Article in journal (Other academic)
    Abstract [en]

    This special issue introduction explores the need to study information systems as symbolic action systems, defines broadly the research domain and related assumptions, notes the origins of this perspective, articulates its key lines of study, and discusses the state of the field in light of published research. The essay also positions the three papers of the special issue in the broader Information Systems (IS) discourse and notes their specific contribution in bridging so far unconnected streams of research and expanding research methods amenable to symbolic action research. This introductory essay furthermore observes some unique challenges in pulling together the special issue that invited the editors to combat against the tendency to approach communicative processes associated with information systems as primarily psychological processes. In closing we note several lines of inquiry that can strengthen future studies of symbolic action including better design theories, more flexible and open use of methods, and attentive use of rich traditions that inform symbolic action research in IS.

  • 3.
    Aarestrup, F. M.
    et al.
    Tech Univ Denmark, Lyngby, Denmark..
    Auffray, C.
    EISBM, Vourles, France..
    Benhabiles, N.
    Univ Paris Saclay, CEA, French Atom Energy & Alternat Energy Commiss, Direct Rech Fondamentale, F-91191 Gif Sur Yvette, France..
    Blomberg, N.
    ELIXIR, Welcome Genome Campus, Cambridge CB10 1SD, England..
    Korbel, J. O.
    European Mol Biol Lab, Genome Biol Unit, Heidelberg, Germany..
    Oksvold, Per
    KTH, Centres, Science for Life Laboratory, SciLifeLab. KTH Royal Inst Technol, Sci Life Lab, Stockholm, Sweden..
    Van Oyen, H.
    Univ Sci & Technol, Dept Comp Sci, Krakow, Poland.;Univ Sci & Technol, Akad Gornizco Hutnizca, Acad Comp Ctr Cyfronet, Krakow, Poland.;Sciensano, Juliette Wystmanstr, B-1050 Brussels, Belgium..
    Towards a European health research and innovation cloud (HRIC)2020In: Genome Medicine, E-ISSN 1756-994X, Vol. 12, no 1, article id 18Article in journal (Refereed)
    Abstract [en]

    The European Union (EU) initiative on the Digital Transformation of Health and Care (Digicare) aims to provide the conditions necessary for building a secure, flexible, and decentralized digital health infrastructure. Creating a European Health Research and Innovation Cloud (HRIC) within this environment should enable data sharing and analysis for health research across the EU, in compliance with data protection legislation while preserving the full trust of the participants. Such a HRIC should learn from and build on existing data infrastructures, integrate best practices, and focus on the concrete needs of the community in terms of technologies, governance, management, regulation, and ethics requirements. Here, we describe the vision and expected benefits of digital data sharing in health research activities and present a roadmap that fosters the opportunities while answering the challenges of implementing a HRIC. For this, we put forward five specific recommendations and action points to ensure that a European HRIC: i) is built on established standards and guidelines, providing cloud technologies through an open and decentralized infrastructure; ii) is developed and certified to the highest standards of interoperability and data security that can be trusted by all stakeholders; iii) is supported by a robust ethical and legal framework that is compliant with the EU General Data Protection Regulation (GDPR); iv) establishes a proper environment for the training of new generations of data and medical scientists; and v) stimulates research and innovation in transnational collaborations through public and private initiatives and partnerships funded by the EU through Horizon 2020 and Horizon Europe.

  • 4.
    Abadal Mahmood Abadi, Mahboobeh
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Nasseri, Mehran
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Shirmohammadian, Davood
    Jönköping University, Jönköping International Business School, JIBS, Business Informatics.
    Efficient Business Intelligence systems utilization: Deliberation of information quality significance on decision-making2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Business Intelligence (BI) system facilitates informed and timely decision making incompetitive business environment. However, decision making can turn out to be highlychallenging if information delivered by BI system does not meet certain level of quality.Organization can benefit from provided information if they are correct, comprehensive,current, and accessible. The organizational members who use BI application to make decisionare best informants to verify the quality of delivered information. Additionally,the implementers of BI system are the one who must be aware of delivering high qualityof information and can explain the reason of failures if any. It is critical to inquire bothimplementers and users. Therefore, the factors that can affect the quality of informationwere studied through comprehensive literature review. Low quality of information maymake customers/ suppliers’ relationship worse, shrink the efficiency of the business performance,decrease the level of trust on BI, and eventually cause to lose the competitivenessin market place. This thesis is intended at investigating fundamental dimensionsthat hinder effective utilization of information in BI system and realizing how these dimensionscan affect the quality and outcome of decisions. Study with an exploratorypurpose was designed and conducted at a chain retail stores in Iran to gather empiricaldata from both group of BI users and implementers through focus group interview. Theresult of investigation shows the main BI system utilized to facilitate customer/ supplierrelationship management and store operation management. Business areas and activitiesinfluenced by the quality of information include, inventory management, customer loyalty,competitiveness, and supplier management. The information quality issues are encounteredmainly due to technical failures, lack of competent system developers, changesin business environment, inappropriate documentation during the system developmentlifecycle, and logical error in programming and designing algorithms. The time, effort,and resources spent on exploring and resolving problems regarding to the quality of informationhad a great influence on efficiency and effectiveness. Documentation duringsystem development life cycle is emphasized as a crucial factor that necessitates furtherstudy in documentation subject. The preliminary findings signify the importance of study to consider information quality in BI practice.

    Download full text (pdf)
    fulltext
  • 5. Abbas, A.
    et al.
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Xiaobao, P.
    Zhao, S. L.
    Chong, R.
    Strategic framework of collaboration in knowledge transfer of high-tech industries2018In: Quality - Access to Success, ISSN 1582-2559, E-ISSN 2069-2242, Vol. 19, no 163, p. 74-80Article in journal (Refereed)
  • 6. Abbas, A.
    et al.
    Faiz, A.
    Fatima, A.
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems. Örebro University.
    Reasons for the failure of government IT projects in Pakistan: A contemporary study2017In: 2017 International Conference on Service Systems and Service Management, IEEE conference proceedings, 2017Conference paper (Refereed)
    Abstract [en]

    After the introduction of information technology (IT), the government needs to take the initiative to start IT projects for the automation of government process to the citizen. Statistics show that a high number of government IT projects fail and only 15 percent e-government projects are successful. In this study, we will answer this research question, what are the reasons for failure of IT projects in the government sector organization in Pakistan and how to overcome these issues? This research was conducted through a literature review, 20 articles from journals and conferences were selected through keywords for the period of ten years from 2003 to 2013. For suggestions, we have followed the same structured search procedure. We found and select articles with our keywords, after reading abstract and conclusion. Our study has described four factors for the failure of IT projects in government sector organizations in Pakistan. These factors are Technology, Management, Politics and Finance. The technology factor can be reduced by providing latest ICT infrastructure with an expert to run and maintain it. Management issues can be resolved by hiring an experienced, skilled and highly motivated project manager to complete a project successfully. Government should make new laws and regulations to help the implementation of these projects and bureaucracy should eliminate any power struggle during and after the implementation. The budget should be allocated before the start of the project to complete it on time. Our research study has provided guidelines to policy makers for automation of government organizations in Pakistan. By considering these suggestions, successful government projects can be achieved.

  • 7.
    Abbas, Abdullah
    et al.
    University West, School of Business, Economics and IT.
    Danielsson, Eddi
    University West, School of Business, Economics and IT.
    Distansundervisning under COVID-19-pandemin: En analys av dess påverkan på högskolestudenters upplevelse2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    I studien undersöks effekterna av distansutbildning på högskolestudenter under COVID-19-pandemin. Pandemin var en extraordinär händelse som har förändrat utbildningslandskapet över hela världen. I examensarbetet presenteras bakgrundsinformation om pandemins inverkan på högre utbildning, inklusive de utmaningar och möjligheter som uppstått. Syftet är att undersöka högskolestudenters upplevelse av distansundervisning och påverkan av digitala verktyg. För att få en djupare förståelse av universitetsstudenters erfarenheter under övergången till distansundervisning genomförde vi en enkät med hjälp av snöbollsurval. Denna metod valdes eftersom den ger möjligheten att nå en bredare och mer diversifierad population av studenter. Studiens fokus var på könsspecifika skillnader och faktorer som påverkade studenternas akademiska erfarenhet och prestation. Studien undersökte tillgång till teknik, motivation och engagemang, samt hur dessa faktorer påverkade studenternas övergripande tillfredställelse och framgång. Examensarbetets resultat visar att män och kvinnor påverkas olika av distansutbildning, även om det inte finns någon signifikant skillnad i deras erfarenheter när det gällde de flesta faktorer av online-undervisning. I studien framgick att tillgång till teknik är en betydande faktor som påverkar studenternas akademiska erfarenhet och prestation, vilket framhäver vikten av likvärdiga resurser för alla studenter. Studenternas motivation och engagemang spelar en betydande roll för deras framgång i onlinekurser. Avgörande för att förbättra framtida online-undervisning är en bättre förståelse för könsspecifika skillnader.

  • 8. Abbas, Asad
    et al.
    Anam, Fatima
    Sunguh, Khavwandiza
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Zhang, Xuehe
    Digital rights management system in China: Challenges and Opportunities2018In: Journal of Cases on Information Technology, ISSN 1548-7717, E-ISSN 1548-7725, Vol. 20, no 1Article in journal (Refereed)
  • 9.
    Abbas, Asad
    et al.
    School of Public Affairs, University of Science and Technology of China.
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Chong, Ren
    School of Public Affairs, University of Science and Technology of China.
    Framework of Collaboration in Knowledge Transfer of High Technology Industries2018In: Quality - Access to Success, ISSN 1582-2559, E-ISSN 2069-2242, Vol. 19, no 163Article in journal (Refereed)
    Abstract [en]

    Purpose - The concept of Triple Helix relates to collaboration between universities, governments and industry. Such collaboration can take different forms in different countries. This paper examines collaboration between universities and industry in China, specifically in the city of Hefei in Anhui province, one of the most rapidly developing regions in the country. In so doing, it seeks to address the research question: How does industry collaborate with universities in order to acquire commercialized knowledge?

    Design/ Methodology/ Approach - The study is qualitative, based on interviews with experts in R & D, and Intellectual Property Rights from high-tech companies based in Hefei. We analyzed our findings using a conceptual framework that focuses on Knowledge Transfer and Innovation Diffusion (Liyanage et al, 2012). Our study describes and discusses the entire process, from an initial awareness of new knowledge to its eventual acquisition.

    Findings and implications - We conclude that Chinese high-tech companies design comprehensive strategies for the acquisition of knowledge generated from external sources. These strategies are based on local, provincial and state government industrial policies that aim to support collaboration with universities and implement external knowledge in existing systems.

    Originality - Commercialized knowledge put into practice by industries for their own innovation and commercial purposes.

    Limitation - We interviewed industrial experts from three high-tech companies in the city of Hefei, which is located in an industrial area of Anhui province.

  • 10.
    Abbas, Asad
    et al.
    School of Public Affairs, University of Science and Technology of China.
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Chang Barker, Katherine
    School of Public Affairs, University of Science and Technology of China.
    Xiaobao, Peng
    School of Public Affairs, University of Science and Technology of China.
    Process of knowledge transfer from universities to industry through the University of Technology Transfer Offices in China: The case of Anhui province2018In: Science and Innovation, ISSN 2409-9066, Vol. 14, no 2, p. 5-18Article in journal (Refereed)
    Abstract [en]

    Introduction. This paper focuses on knowledge generation and the way in which it is transferred from universities to industry. Most well reputed universities have several departments and university-run enterprises that engage in research. The purpose of these research units is to help universities provide breakthrough innovation through the generation of new knowledge.

    Problem Statement. For this we chose to study China's University Technology Transfer Offices (UTTOs) to gather concrete evidence of university knowledge generation for commercial use in industry. The objective of this study is get indepth information about the role of UTTOs in the transfer of such knowledge.Purpose. The generation of new knowledge contributes to the field of science and technology; in turn, industry can use this knowledge to produce new innovative products or improve existing ones. This study aims to identify the process of knowledge transfer from universities to industry in China.

    Materials and Methods. Our study was carried out as a qualitative case study in the Anhui province of China. Data was mainly collected through semi-structured interviews with technology transfer experts working in technology transfer offices. Collected data were analyzed using a knowledge transfer model with six phases: 1) awareness, 2) acquisition, 3) transformation, 4) association, 5) application, and 6) feedback.

    Results. In China, universities and their research groups dominate in the generation and commercialization of research results, with UTTOs acting as technology bridges between the two parties, as well as providing legal and business services.

    Conclusions. This paper contributes by offering a detailed description of the knowledge transfer process and specifically the role and activities of UTTOs. This research also helps Chinese and international researchers currently carrying out research on the technology transfer process in China.

  • 11. Abbas, Asad
    et al.
    Avdic, Anders
    Dalarna University, School of Technology and Business Studies, Information Systems.
    Xiaobao, Peng
    Ming, Wan
    University-government collaboration for the generation and commercialization of new knowledge for use in industry2019In: Journal of Innovation and Knowledge, ISSN 2530-7614, E-ISSN 2444-569X, Vol. 4, no 1, p. 23-31Article in journal (Refereed)
    Abstract [en]

    The concept of Triple Helix relates to collaboration between universities, governments and industry. Such collaboration can take different forms in different countries. This paper describes collaboration between universities and government in China, specifically in the city of Hefei in Anhui province, one of the most rapidly developing regions in the country. The research question is: How can bi-lateral research collaboration be a source of knowledge generation and commercialization for use in industry?

    The study is qualitative, involving individual and group interviews with university team leaders and team members from successful projects. Government representatives in China were also interviewed. We used the SECI knowledge creation method to analyze the findings. We also describe the collaboration process from idea and application through to review, funding, realization and commercialization. Our study shows that the government in China plays a dominant role in the process of knowledge creation and commercialization. We conclude that collaboration is a source of new knowledge generation and that the government plays a key role by funding universities and creating a research environment that meets the policy requirements of industry today. In particular, we show that universities and their research groups use resources, such as skilled manpower, laboratories and equipment, to accomplish tasks within a set timeframe.

    Download full text (pdf)
    fulltext
  • 12.
    Abbas, Yasir
    University West, School of Business, Economics and IT.
    Effective Cloud Computing Resource Allocation Challenges in Small and Medium Enterprises2023Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Small and medium-sized Enterprises (SMEs) play a crucial role in the global economy by generating employment opportunities and fostering economic expansion. However, the allocation of cloud computing resources remains a significant challenge for small and mediumsized enterprises (SMEs). The primary objective of this qualitative study was to examine the challenges associated with the allocation of cloud computing resources in small and mediumsized enterprises (SMEs). The research encompassed a comprehensive examination of existing literature and the utilization of semi-structured interviews to gather data from small and medium-sized enterprise (SME) owners and managers. The study focused only on two developed nations, namely the United States of America and the United Kingdom, as well as two developing countries, namely India and Pakistan. The literature review identified many issues that have an influence on the allocation of cloud computing resources in small and medium-sized enterprises (SMEs). These challenges include financial constraints, organizational culture, availability of competent individuals, and advancements in technology. The insights obtained from conducting interviews with small and medium-sized enterprise (SME) owners and managers provided useful information on the current methodologies employed for assigning cloud computing resources, as well as the obstacles faced by SMEs in effectively distributing these resources. The study's findings indicate that the successful operation of small and medium enterprises (SMEs) heavily relies on the efficient allocation of cloud computing resources. Furthermore, addressing challenges in this area necessitates a purposeful and proactive strategy. The findings of this study offer valuable insights into the cloud computing resource allocation tactics employed by small and medium-sized enterprises (SMEs). As a result, policymakers, researchers, and SME owners and managers may utilize these insights to effectively implement successful strategies for allocating cloud computing resources.

  • 13.
    Abbasi, Abdul
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Muftic, Sead
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    CryptoNET: integrated secure workstation2009In: International Journal of Advanced Science and Technology, ISSN 2005-4238, Vol. 12Article in journal (Refereed)
    Abstract [en]

    In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and implemented Secure Workstation, which represents an integrated security environment and protects local IT resources, messages and operations across multiple applications. It comprises five components, i.e. four most commonly used PC applications: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Documents System, and Secure Browser. These four components for their security extensions use functions and credentials of the fifth component, Generic Security Provider [5]. With this approach, we provide standard security services (authentication, confidentiality, and integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, strong authentication protocol, SAML based single-singe-on, secure sessions, and other security functions, to all PC applications with the same set of security modules and parameters.

  • 14.
    Abbasi, Muhammad Abbas Khan
    University of Skövde, School of Informatics.
    The effect of time pressure on human behavior regarding phishing susceptibility: Human aspects in information security2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. Human susceptibility to phishing is a persistent threat, and has a devastating effect on organizational and personal security. Previous researchers found that human susceptibility to phishing increases in presence of some factors such as organizational, individual, and environmental. Various studies highlight time pressure as one of the influencing factors that can negatively or positively impact human behavior. This research study aimed to investigate the effect of time pressure on human cybersecurity behavior regarding the ability to detect phishing. The study used quantitative research and developed a questionnaire comprising interactive phishing emails distributed online to 03 random groups having different time limits to complete the questionnaire. The study received 356 complete responses. The study's result shows a slight change in user behavior under time pressure, and the impact of time pressure can be positive or negative. However, the results are not statistically significant for all demographic groups to accept this slight change in variance. Moreover, this study's results validate previous studies on human susceptibility to phishing and found more than 50 % of respondents vulnerable to phishing.

    Thus, the results of this study indicate that the factor of time pressure itself does not significantly impact the human ability to detect phishing. However, it is essential to note that other work-related tasks or stress associated with time pressure can influence human behavior in detecting phishing attempts.

    In conclusion, the author also proposes further testing and some methodology tweaking by modifying the time given to each tested group and adding more elements to the questionnaire. Finally, the study also suggested conducting the same analysis on physically controlled groups in an organizational or institutional setting. 

    Download full text (pdf)
    fulltext
  • 15.
    Abdelki, Fadi
    et al.
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Kakar, Hasib
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Det digitala gränssnittet i en restaurangverksamhet: En fallstudie om utmaningar och möjligheter när det digitala gränssnittet ersätter det mänskliga gränssnittet2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Digitalization has increased over the past decade and changed our ways of solving problems. Studies have shown that digitalization has made a dramatic change in our lives and it's a huge challenge for government, organization, company and citizens. In about 15 years half of today's job will be disappears and will be replaced by digitalization, automatization and robotization. The purpose of the study is to describe and create an understanding of the new digital service that has been implemented in restaurant businesses, a new way of interaction between customers and company. A literature study has been made to give a fair picture of the theory and interviews with the purpose to gathering new information on how the digital restaurant works and get the knowledge of efficiency in business. Qualitative material has been analyzed and compared to theories from the literature study. The results of the study showed that there is immense difference between the employees view and company view of digital service in restaurant.

    Download full text (pdf)
    Abdelki_kakar
  • 16.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronics and Communications Department, Al-Madina Higher Institute for Engineering and Technology, Giza, Egypt.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. Faculty of Engineering, Al-Alzhar University, P.O. Box 83513, Qena, Egypt.
    Hamed, Hesham F. A.
    Department of Telecommunications Eng., Egyptian Russian University, Cairo, Egypt. Department of Communications and Electronics, Faculty of Engineering, Minia University, Minia, Egypt.
    Khalaf, Ashraf A. M.
    Department of Communications and Electronics, Faculty of Engineering, Minia University, Minia, Egypt.
    Parallel Deep CNN Structure for Glioma Detection and Classification via Brain MRI Images2019In: IEEE-ICM 2019 CAIRO-EGYPT: The 31st International Conference on Microelectronics, IEEE, 2019, p. 304-307Conference paper (Other academic)
    Abstract [en]

    Although most brain tumor diagnosis studies have focused on tumor segmentation and localization operations, few studies have focused on tumor detection as a time- and effort-saving process. This study introduces a new network structure for accurate glioma tumor detection and classification using two parallel deep convolutional neural networks (PDCNNs). The proposed structure is designed to identify the presence and absence of a brain tumor in MRI images and classify the type of tumor images as high-grade gliomas (HGGs, i.e., glioblastomas) or low-grade gliomas (LGGs). The introduced PDCNNs structure takes advantage of both global and local features extracted from the two parallel stages. The proposed structure is not only accurate but also efficient, as the convolutional layers are more accurate because they learn spatial features, and they are efficient in the testing phase since they reduce the number of weights, which reduces the memory usage and runtime. Simulation experiments were accomplished using an MRI dataset extracted from the BraTS 2017 database. The obtained results show that the proposed parallel network structure outperforms other detection and classification methods in the literature.

  • 17.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Al-Madina Higher Institute for Engineering and Technology.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Minia University, Egypt.
    Hamed, Hesham F. A.
    Minia University, Egypt.
    Classification of Brain Tumor MRIs Using a Kernel Support Vector Machine2016In: Building Sustainable Health Ecosystems: 6th International Conference on Well-Being in the Information Society, WIS 2016, Tampere, Finland, September 16-18, 2016, Proceedings / [ed] Hongxiu Li, Pirkko Nykänen, Reima Suomi, Nilmini Wickramasinghe, Gunilla Widén, Ming Zhan, Springer International Publishing , 2016, p. 151-160Conference paper (Refereed)
    Abstract [en]

    The use of medical images has been continuously increasing, which makes manual investigations of every image a difficult task. This study focuses on classifying brain magnetic resonance images (MRIs) as normal, where a brain tumor is absent, or as abnormal, where a brain tumor is present. A hybrid intelligent system for automatic brain tumor detection and MRI classification is proposed. This system assists radiologists in interpreting the MRIs, improves the brain tumor diagnostic accuracy, and directs the focus toward the abnormal images only. The proposed computer-aided diagnosis (CAD) system consists of five steps: MRI preprocessing to remove the background noise, image segmentation by combining Otsu binarization and K-means clustering, feature extraction using the discrete wavelet transform (DWT) approach, and dimensionality reduction of the features by applying the principal component analysis (PCA) method. The major features were submitted to a kernel support vector machine (KSVM) for performing the MRI classification. The performance evaluation of the proposed system measured a maximum classification accuracy of 100 % using an available MRIs database. The processing time for all processes was recorded as 1.23 seconds. The obtained results have demonstrated the superiority of the proposed system.

  • 18.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Al-Madina Higher Institute for Engineering and Technology, Giza, Egypt .
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. Faculty of Engineering, Al-Azhar University, Qena, Egypt.
    Khalaf, Ashraf A. M.
    Minia University, Minia, Egypt .
    Hamed, Hesham F. A.
    Egyptian Russian University, Cairo, Egypt. Minia University, Minia, Egypt .
    Deep Convolutional Neural Networks: Foundations and Applications in Medical Imaging2020In: Deep Learning in Computer Vision: Principles and Applications / [ed] Mahmoud Hassaballah, Ali Ismail Awad, CRC Press, 2020, 1st, p. 233-260Chapter in book (Other academic)
  • 19.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronic and Communication Department Al-Madina Higher Institute for Engineering and Technology, Giza.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Khalaf, Ashraf A. M.
    Faculty of Engineering, Minia University.
    Hamed, Hesham F. A.
    Faculty of Engineering, Minia University.
    Design and implementation of a computer-aided diagnosis system for brain tumor classification2017In: 2016 28th International Conference on Microelectronics (ICM), 2017, p. 73-76, article id 7847911Conference paper (Refereed)
    Abstract [en]

    Computer-aided diagnosis (CAD) systems have become very important for the medical diagnosis of brain tumors. The systems improve the diagnostic accuracy and reduce the required time. In this paper, a two-stage CAD system has been developed for automatic detection and classification of brain tumor through magnetic resonance images (MRIs). In the first stage, the system classifies brain tumor MRI into normal and abnormal images. In the second stage, the type of tumor is classified as benign (Noncancerous) or malignant (Cancerous) from the abnormal MRIs. The proposed CAD ensembles the following computational methods: MRI image segmentation by K-means clustering, feature extraction using discrete wavelet transform (DWT), feature reduction by applying principal component analysis (PCA). The two-stage classification has been conducted using a support vector machine (SVM). Performance evaluation of the proposed CAD has achieved promising results using a non-standard MRIs database.

  • 20.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronics and Communications Department, Al-Madina Higher Institute for Engineering and Technology, Giza, Egypt.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science. Faculty of Engineering, Al-Azhar University, Qena, Egypt.
    Khalaf, Ashraf A.M.
    Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt.
    Hamed, Hesham F.A.
    Electronics and Communications Department, Faculty of Engineering, Minia University, Minia, Egypt.
    A Review on Brain Tumor Diagnosis from MRI Images: Practical Implications, Key Achievements, and Lessons Learned2019In: Magnetic Resonance Imaging, ISSN 0730-725X, E-ISSN 1873-5894, Vol. 61, p. 300-318Article in journal (Refereed)
    Abstract [en]

    The successful early diagnosis of brain tumors plays a major role in improving the treatment outcomes and thus improving patient survival. Manually evaluating the numerous magnetic resonance imaging (MRI) images produced routinely in the clinic is a difficult process. Thus, there is a crucial need for computer-aided methods with better accuracy for early tumor diagnosis. Computer-aided brain tumor diagnosis from MRI images consists of tumor detection, segmentation, and classification processes. Over the past few years, many studies have focused on traditional or classical machine learning techniques for brain tumor diagnosis. Recently, interest has developed in using deep learning techniques for diagnosing brain tumors with better accuracy and robustness. This study presents a comprehensive review of traditional machine learning techniques and evolving deep learning techniques for brain tumor diagnosis. This review paper identifies the key achievements reflected in the performance measurement metrics of the applied algorithms in the three diagnosis processes. In addition, this study discusses the key findings and draws attention to the lessons learned as a roadmap for future research.

  • 21.
    Abd-Ellah, Mahmoud Khaled
    et al.
    Electronics and Communications Department, Al-Madina Higher Institute for Engineering and Technology, Giza, Egypt.
    Khalaf, Ashraf A. M.
    Faculty of Engineering, Minia University, Minia, Egypt.
    Awad, Ali Ismail
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Digital Services and Systems. Faculty of Engineering, Al-Azhar University, Qena, Egypt.
    Hamed, Hesham F. A.
    Faculty of Engineering, Minia University, Minia, Egypt.
    TPUAR-Net: Two Parallel U-Net with Asymmetric Residual-Based Deep Convolutional Neural Network for Brain Tumor Segmentation2019In: Image Analysis and Recognition: 16th International Conference, ICIAR 2019, Waterloo, ON, Canada, August 27–29, 2019, Proceedings, Part II / [ed] Fakhri Karray, Aurélio Campilho, Alfred Yu, Springer, 2019, p. 106-116Conference paper (Refereed)
    Abstract [en]

    The utilization of different types of brain images has been expanding, which makes manually examining each image a labor-intensive task. This study introduces a brain tumor segmentation method that uses two parallel U-Net with an asymmetric residual-based deep convolutional neural network (TPUAR-Net). The proposed method is customized to segment high and low grade glioblastomas identified from magnetic resonance imaging (MRI) data. Varieties of these tumors can appear anywhere in the brain and may have practically any shape, contrast, or size. Thus, this study used deep learning techniques based on adaptive, high-efficiency neural networks in the proposed model structure. In this paper, several high-performance models based on convolutional neural networks (CNNs) have been examined. The proposed TPUAR-Net capitalizes on different levels of global and local features in the upper and lower paths of the proposed model structure. In addition, the proposed method is configured to use the skip connection between layers and residual units to accelerate the training and testing processes. The TPUAR-Net model provides promising segmentation accuracy using MRI images from the BRATS 2017 database, while its parallelized architecture considerably improves the execution speed. The results obtained in terms of Dice, sensitivity, and specificity metrics demonstrate that TPUAR-Net outperforms other methods and achieves the state-of-the-art performance for brain tumor segmentation.

  • 22.
    Abdi, Asma Ibrahim
    University of Skövde, School of Informatics.
    Etiska och social konsekvenser av ML-modeller inom cyberbrottsbekämpning2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Denna studie syftar till att undersöka de etiska och sociala konsekvenserna av att använda maskininlärning inom cyberbrottbekämpning. Maskininlärning är en växande teknik inom cybersäkerhetsvärlden, men det finns inte tillräckligt med forskning om de utmaningar som kan uppstå vid användning av maskininlärning för cyberbrottbekämpning. För att undersöka dessa utmaningar har en kvalitativ ansats använts, där intervjuer har genomförts för att förstå vad personer som arbetar med cybersäkerhet tycker om cybersäkerhetssystem som inkorporerar maskininlärningsmodeller. 

    Resultatet av intervjuerna visar att det finns många fördelar med att använda en effektiv teknik som maskininlärning. Men det finns också många utmaningar, såsom algoritmer som är partiska och förstärker fördomar. Maskininlärning kräver stora mängder träningsdata, vilket kan leda till förlust av människors integritet. Denna studie kommer att fördjupa sig i dessa och andra utmaningar med maskininlärning.

    Download full text (pdf)
    fulltext
  • 23.
    Abdirizak, Mohamed
    et al.
    University of Skövde, School of Informatics.
    Abobaker, Ivan
    University of Skövde, School of Informatics.
    What are the gaps in teaching the cybersecurity threats landscape, and what teachers need to include the subject in their curriculum?2024Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This thesis examines the current gaps in cybersecurity education in junior high and high schools in Sweden, with a focus on the challenges of integration and the resources required for teachers to effectively instruct on cybersecurity topics. Despite the critical importance of cybersecurity in protecting digital interactions and personal data, existing curricula often lack deep and systematic integration of this essential subject. Based on qualitative interviews with 12 teachers from junior high and high schools, the researchers’ findings underscore a significant need for structured cybersecurity curricula and enhanced teacher training. The research reveals that while students are extensively engaged with digital technologies, their vulnerability to various cybersecurity threats remains due to inadequate educational frameworks. The study highlights the urgent need for curricular improvements to include comprehensive cybersecurity courses, aligned with current technological threats and the digital behaviors of students.

    Download full text (pdf)
    fulltext
  • 24.
    Abdul Hussein, Mohamed
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    Bogren, William
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    Social Media's Take on Deepfakes: Ethical Concerns in the Public Discourse2023Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The rapid advancement of artificial intelligence has led to the emergence of deepfake, digital media that has been manipulated to replace a person's likeness with another. This technology has seen significant improvements, becoming easier to use and producing results increasingly difficult to distinguish from reality. This development has raised ethical discussions surrounding its deceiving nature. Furthermore, deepfakes have had a considerable impact and application on social media, enabling their spread. Despite this, the public discourse on social media, along with its societal and personal values associated with deepfakes, remains underexplored. This study addresses this gap by examining social media discourse and perception surrounding the prominent ethical concerns of deepfakes, and situating these concerns within the broader landscape of AI ethics. Through a qualitative method resembling netnography, 320 posts from Reddit and Youtube were thematically analyzed through a passive observation, along with their respective comment section. The findings reveal various concerns, surrounding misinformation and consent to deeper fears about deepfakes' role in fostering distrust, as well as more abstract apprehensions regarding the technology's abuse and harmful applications. These concerns further revealed how generalized established AI ethical principles might be interpreted in the deepfake context, also showing how and why these principles might be violated by this technology. Particularly it revealed terms how principles such as dignity, transparency, privacy and non-maleficence might be diverged in deepfake applications.

    Download full text (pdf)
    Social Media's Take on Deepfakes: Ethical Concerns in the Public Discourse
  • 25.
    Abdulhadi, Osama
    University of Skövde, School of Informatics.
    The human connection to information security: A qualitative study on policy development, communication and compliance in government agencies2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The human factor and insider threats play a crucial role in information security. In today’s digital age, protecting organizational data requires a deep understanding of human behaviour and its impact on information security. The increasing volume of electronically stored data has led to a rise in cyber threats and breaches, necessitating effective information security policies and regulations.

    This study focuses on the experiences and perspectives of employees and top management in government agencies regarding the development, communication, compliance, and attitudes towards information security policies and regulations. Semi-structured interviews were conducted with participants from both top management or information security officers and regular employees, which allowed for an in-depth exploration of their experiences and perspectives.

    The findings show that government agencies systematically develop policies by engaging stakeholders, ensuring accessibility, and adhering to legal frameworks. Addressing the human factor involves training, awareness programs, and top management support. Policy development and implementation include risk assessment, stakeholder identification, objective setting, continuous review, and integration into daily operations. Communication channels such as intranets, training, coordinators, and awareness events are utilized, but their effectiveness is not directly measured. Proposed improvements include enhancing accessibility, improving policy document management, and using clearer language.

    Employees generally possess a positive attitude towards information security, though their understanding varies, and challenges to their understanding include complex language and unclear instructions. Compliance also varies, with difficulties arising from technical terminology and information overload. Enhanced compliance can be achieved through simplified language, providing better resources, and top management support. Proactive incident management focuses on learning and risk minimization. The human factor and insider threats remain significant concerns, which emphasizes the need for further education, awareness training, and motivation. 

    Download full text (pdf)
    fulltext
  • 26.
    Abdulkader, Mohamad
    University of Skövde, School of Informatics.
    Why do people use public Wi-Fi?: An investigation of risk-taking behaviour and factors lead to decisions2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. Hackers can exploit vulnerabilities present in public Wi-Fi networks, such as the "Evil Twin" attack, to deceive users and unlawfully obtain their personal information. The main objective of the research was to investigate people's awareness of the security risks associated with public Wi-Fi usage and to identify the factors that contribute to their willingness to take such risks. The research adopted a qualitative approach, utilising semi-structured interviews with 14 participants to gain valuable insights into their understanding and knowledge of the risks connected with public Wi-Fi. The majority of respondents employed public Wi-Fi for educational purposes, browsing the Internet, and engaging with social media platforms. Additionally, the findings of the study explored the motivations and influences that lead individuals to take risks when using public Wi-Fi. Factors such as convenience, cost-effectiveness, saving mobile data usage, limited mobile network coverage, and a lack of awareness concerning privacy and security risks emerged as the most significant reasons and influences behind the utilisation of public Wi-Fi.

    Download full text (pdf)
    fulltext
  • 27.
    Abdullah, Mohammed
    University of Skövde, School of Informatics.
    Säkerhetsmedvetenhet och dess inverkan på informationssäkerhet inom hälso-och sjukvården2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Framväxten av digitalisering och skillnader i utvecklingstakt mellan digitalisering och informationssäkerhet har lett till ökade utmaningar för många sektorer i samhället, inklusive hälso- och sjukvården. En central del i att hantera dessa utmaningar är att förstå hur viktigt det är att ha en god säkerhetsmedvetenhet hos anställda. Säkerhetsmedvetenhet är därför en nödvändig komponent för att skydda och bevara informationssäkerheten i en organisation. Informationssäkerhet innefattar mer än tekniska och administrativa säkerhetsåtgärder, eftersom människor är involverade i alla aspekter av informationssäkerhet och ofta anses vara den svagaste länken i säkerhetskedjan. Till följd av detta kan ökad medvetenhet bland personalen bidra till mer effektiv informationssäkerhet. Studien fokuserade på att undersöka följande frågeställning: Hur kan IT-chefer inom hälso- och sjukvårdssektorn arbeta systematiskt för att öka personalens säkerhetsmedvetenhet?

    Resultatet visade att ledningens engagemang kan påverka personalens medvetenhet och bidra till att skapa en stark säkerhetskultur, vilket är i linje med vad litteraturen beskriver. Genom ökad medvetenhet bland personalen kan många säkerhetsincidenter relaterade till mänskliga misstag undvikas. Studien genomfördes med stöd av kvalitativa forskningsmetoder och semistrukturerade intervjuer, där ledande roller inom hälso- och sjukvården intervjuades. I nuläget visar resultatet att det finns utrymme för förbättring när det gäller personalens nuvarande medvetenhet. Dessutom visade resultatet att det inte finns en effektiv metod för att utvärdera och mäta denna medvetenhet. Däremot visar både praktiken och litteraturen att antalet ökade cyberattacker ökar och att det finns betydande utmaningar kopplade till att säkerställa informationssäkerhet. Samtidigt påvisar resultatet ett tydligt behov av ytterligare forskning samt utveckling av metoder för att mäta och förbättra personalens säkerhetsmedvetenhet.

  • 28. Abenius, Sara
    Green IT & Green Software - Time and Energy Savings Using Existing Tools2009In: Environmental Informatics and Industrial Environmental Protection: Concepts, Methods and Tools (Part 1) / [ed] Volker Wohlgemuth, Bernd Page, Kristina Voigt, Shaker Verlag, 2009, p. 57-66Conference paper (Refereed)
    Abstract [en]

    Green IT is steadily gaining ground among companies and organizations worldwide but the understanding of its actual significance is often indistinct. The purpose of this paper is to investigate Green Software and to summarize different points of view on Green IT and clarify some actions to be taken towards using computers more wisely. Special attention will be paid to Green Software and exploring what factors could make software being used and developed with the environmental impact in mind. A descriptive research method based on available literature has been used. Finally a test was set up to control if the amount of data sent over the Internet could be lowered during navigation by changing a server setting. The intention was to prove that Green Software can be simple use of tools we have at hand, just adding a small amount of knowledge. The result showed that there are savings to gain with no effect on overall performance. To conclude, a holistic approach towards Green IT and all it’s including parts is necessary, together with appropriate ways of measuring progress towards improvement.

  • 29.
    Abeywickrama, Madawa
    et al.
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Rosca, Victoria
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Public organizations flying in the cloud: A case study of cloud computing value creation in Moldova central public administration2015Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    As information technology (IT)  becomes an integral part of society, public sector organizations have witnessed an increasing shift in how they deliver services to citizens. One area of IT that has  contributed to this transformation in service delivery has been in the domain of cloud computing. Extant research  has focused on the  factors related to the  adoption of cloud computing within public sector organizations, however, little is known about how cloud computing creates value in public sector administration. Addressing this, we conduct a case study research on the Moldova central public administration to investigate how cloud computing enhances value in public service delivery. Accordingly, we identify seven ways cloud computing enhances value creation in public administration. Among those values, faster service delivery, transparency and accountability are values rarely highlighted in the previous academic research. Based on our results, we propose solutions that public administration should take into consideration when utilizing cloud computing as a service delivery model.

    Download full text (pdf)
    fulltext
  • 30.
    Abovarda, Adam
    et al.
    University West, School of Business, Economics and IT.
    Vallo Hult, Helena
    University West, School of Business, Economics and IT, Divison of Informatics.
    Master Östlund, Christian
    University West, School of Business, Economics and IT, Divison of Informatics.
    Pålsson, Paul
    NU Hospital Group (SWE); University of Gothenburg (SWE).
    E-learning as Part of Residency Education2023In: Caring is Sharing: Exploiting the Value in Data for Health and Innovation. Proceeddings of MIE 2023 / [ed] Maria Hägglund, Madeleine Blusi, Stefano Bonacina, Lina Nilsson, Inge Cort Madsen, Sylvia Pelayo, Anne Moen, Arriel Benis, Lars Lindsköld, Parisis Gallos, IOS Press, 2023, Vol. 302, p. 496-497Conference paper (Refereed)
    Abstract [en]

    Through a literature review in combination with qualitative analysis of course evaluations, this study examines aspects that contribute to enhancing elearning for physicians in a residency education program. The literature review and the qualitative analysis outline three main factors (pedagogical, technological, and organizational), highlighting the importance of a holistic approach that includes learning and technology in context when integrating e-learning strategies in adult learning programs. The findings contribute insights and practical guidance for education organizers on how to conduct e-learning during and after the pandemic.

    Download full text (pdf)
    fulltext
  • 31.
    Abraham, Robel
    et al.
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Saleman, Egal
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Framtidens verktyg för arbetsmiljöarbete: En studie om vilka förutsättningar IT erbjuder verksamheter i deras arbetsmiljöarbete2019Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The influence and impact that digitalisation have in our society has not gone unnoticed, every aspect of our daily lives have more or less been digitalized so that we can effectively communicate, share and gain information and knowledge through IT solutions. Businesses and organisations are being more effective and efficient by embedding IT solutions as a strategy into their daily work. A particular field that has been stagnant through this revolution is how businesses and organisations manage their workplace environment and the purpose of this study is therefore to shed light on, and contribute with knowledge about, the potential that IT have when it comes to managing organisational occupational health and safety. We look further into a graphical user interface such as dashboard to gain an insight on how it could be used as a tool to monitor progress within occupational health and safety. The methods used in this exploration are integrated approaches which contains both qualitative and quantitative methods, the data was collected through interviews and surveys in a public organisation. The results of the study displays three main concerns which are caused by the lack of systematic approach while working with occupational health and safety. These three concerns are identified as feedback challenges, lack of consistency and absence of appropriate actions. The study further highlights which key factors that need to be successful in order to create and maintain a healthy occupational health and safety. With the result of our study, businesses and organisations can gain an understanding and insight on what type of advantages can be gained by using IT in order to promote a systematic approach while dealing with a challenging task as the workplace environment. 

    Download full text (pdf)
    fulltext
  • 32.
    Abrahamsson, Ebba
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media.
    Waern-Bugge, Fredrik
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media.
    Framgångsfaktorer vid en agil övergång2018Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 33.
    Abrahamsson, Linnea
    University of Skövde, School of Informatics.
    Challenges in designing a game for an outside client: An advergame case study2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Serious games are well known for their application outside the games, but how they are developed is seldom explored. This study looks at the development process for an advergame for an outside client and what challenges and opportunities presented themselves when creating it. By looking at the context of development the study finds an understanding for what affected the development and how it affected it. The results show that the development context can have varying effects on development. Part of this is the motivations and background behind the project and goals of the company. The developers’ work can become dependent on the project company and work can be halted if the connection is not maintained. Further the study proposes guidelines based on the results that developers can use when working with interdisciplinary collaboration.

    Download full text (pdf)
    fulltext
  • 34.
    Abrahamsson, Linnea
    et al.
    University of Skövde, School of Informatics.
    Almkvist, Simon
    University of Skövde, School of Informatics.
    Paratexter och spelupplevelsen: Hur kan digitala uppslagsverk påverka spelupplevelsen i överlevnadsspel?2021Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Paratexter är verk som ger konsumenter en uppfattning om en produkt utan att interagera med själva produkten. Denna undersökning har studerat hur spelupplevelsen kan påverkas av en viss typ av paratext, digitala uppslagsverk, i överlevnadsspel. Spelupplevelsen är ett subjektivt fenomen, vilket ligger till grund för undersökningens kvalitativa ansats. En prototyp av ett generiskt överlevnadsspel, samt ett digitalt uppslagsverk för spelet, producerades. Därefter användes observationer och semistrukturerade intervjuer för att jämföra tio respondenters handlingar med deras åsikter. Resultatet bekräftade att det finns många olika attityder gentemot digitala uppslagsverk. Bland annat påvisades att dessa paratexter aktivt bidrar till att skapa mål för spelaren, och kan komplettera eventuella brister i spelets design. Spelupplevelsen kan också försämras, eftersom spelaren redan ”upplevt spelet” genom uppslagsverket. Framtida studier bör förslagsvis utnyttja denna introducerande studie för att skapa ett paratextuellt ramverk som spelutvecklare kan använda för att skapa så genomtänkta spelupplevelser som möjligt.

    Download full text (pdf)
    fulltext
  • 35.
    Abrahamsson, Viktor
    University of Skövde, School of Informatics.
    Visualisering av geospatialdata från firms i heatmaps: En jämförelse av visualiseringstekniker med D3.js och Heatmap.js baserat på utritningstid2020Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Stora mängder miljödata samlas hela tiden in och för att använda all data behöver den förstås av användarna så de kan applicera kunskapen inom deras område. Visualisering skapar förståelse om data. Heatmaps kan användas för att visualisera geospatial data och interaktivitet är ett hjälpmedel för att skapa ytterligare grafiska representationer. I detta arbete evalueras JavaScript-teknikerna D3.js, Heatmap.js och Vue.js angående vad som är mest lämpligt för att visualisera geospatial data utifrån effektiviteten vid utritning av heatmaps. Ett experiment genomförs där biblioteken D3.js, Heatmap.js testas i ramverket Vue.js. Detta för att ta reda på vilket bibliotek som föredras vid utritning av heatmaps och om ett ramverk påverkar resultatet. En miljö sätts upp för att genomföra undersökningen och tester för att påvisa detta. Resultatet indikerar att Heatmap.js och mindre datamängder ger en lägre utritningstid i den tillämpning som undersökts. I framtiden är det intressant att undersöka flera bibliotek och flera datamängder.

    Download full text (pdf)
    fulltext
  • 36.
    Abrahamsson, Åsa
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013).
    En jämförande studie mellan Canvas och Moodle: Att skapa kursinnehåll genom GUI och API2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Ingen hade nog förväntat sig att världen skulle drabbas av den Covid-19 pandemi som började spridas 2019, och som än idag hänger i juni 2021. En långdragen världsomfattande kris. Det är dock inte den enda typ av kris som kan uppstå, skogsbränder och skolskjutning är även exempel på kriser och något vi sett ske flera gånger tidigare. Kriser kräver övning och då skogsbränder och skolskjutning är något som varit återkommande är det viktigt att övning sker inför nästa eventuella kris. CriseIT-projektet är ett samarbete mellan Sverige och Norge, mer specifikt Värmland och Hedmark med syfte att ta fram verktyg och metoder för att utöka digital krisövning. Lärplattformen Canvas (Learning Management System LMS) har i en tidigare studie visats relevant som plattform för krisövning, då den uppfyllde önskad användarbarhet och gav rätt förutsättningar. En funktionalitet som CriseIT har efterfrågat är möjligheten till import av data, eftersom den saknas i dag.I en tidigare studie genomförde CriseIT en seminarieövning i Canvas, som då skrevs in manuellt via Canvas grafiska gränssnitt. Något som är tidskrävande och som önskas effektiviseras genom att i stället importera krisövningar till LMS:et. CriseIT’s mål är dock att kunna importera övningar oavsett LMS och de önskade därmed att även Moodle undersöktes för dess möjlighet att importera data. Två jämföranden genomfördes därmed i denna studie mellan lärplattformarna Canvas och Moodle av vad för funktionalitet respektive gränssnitt erbjuder, samt vilka möjligheter som finns för att importera data via Canvas REST API och Moodle Web Services API. Jämförelsen bygger på en komparativ metod och är baserad på åtta kriterier som kan tänkas ingå i en seminarieövning. Dessa kriterier testades via respektive lärplattforms gränssnitt, samt via verktyget Postman genom API-anrop bestående av testdata för att undersöka respektive API:s funktionalitet och möjlighet till dataimport. Ytterligare genomfördes ett tredje jämförande av vilka skillnader och/eller likheter som finns mellan Canvas LMS REST API och Moodle Web Services API.Resultatet av studien visade att Canvas via dess REST API kan importera alla önskade kriterier medan Moodle:s API Web Services i dagsläget inte innehåller funktionalitet för att importera några av kriterierna. Därmed genomfördes även en jämförelse av kriterierna via respektive lärplattforms grafiska gränssnitt för att studera om funktionaliteten fanns via gränssnittet. Resultatet av jämförelsen visade att både Canvas och Moodle via dess grafiska gränssnitt klarar av att genomföra alla åtta kriterier. Vidare visar resultatet av studien att Canvas REST API från ett tekniskt perspektiv är mer utvecklat än Moodle:s Web Services REST API.

    Download full text (pdf)
    Kandidatuppsats Åsa Abrahamsson
    Download (pdf)
    Bilagor till kandidatuppsats av Åsa Abrahamsson
  • 37.
    Abramian, Fredrik
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    Wedholm, Joel
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    BYOD och Cloud Computing: En vägledande studie för hur BYOD bör bedrivas säkert tillsammans med cloud computing2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The aim of this thesis is to gain a richer insight into how information security is affected by Bring Your Own Device (BYOD) in combination with cloud computing. This study has come to its conclusion by performing interviews and sending out questionaries that has later been analyzed using current theory. A specification has been established out of this and will serve as a guiding contribution for organisations.

    Download full text (pdf)
    BYOD och Cloud Computing
  • 38.
    Acarsoy, Sara Nil
    University of Skövde, School of Informatics.
    Effects of interactivity on narrative-driven games: A heuristic approach for narrative-driven games2021Independent thesis Advanced level (degree of Master (One Year)), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    In narrative-driven games, the story is an essential part of the gameplay, and understanding the story is of great importance. Given that what separates this genre from other storytelling media is interactivity, this thesis focuses on the elements in narrative-driven video games that effects the players' perception of narrative through interactivity. Using players' likes and dislikes from their previous experiences in narrative-driven games, this thesis aims to develop a heuristic approach for interactive narrative elements that offer the narrative through players' input to the game's system and create an effective gameplay experience that delivers the story to the players.

    Download full text (pdf)
    fulltext
  • 39.
    Acheampong, Faustina
    et al.
    Jönköping University, Jönköping International Business School, JIBS, Informatics.
    Vimarlund, Vivian
    Jönköping University, Jönköping International Business School, JIBS, Informatics. Jönköping University, Jönköping International Business School, JIBS, Centre for Information Technology and Information Systems (CenITIS). Jönköping University, School of Health and Welfare, HHJ. IMPROVE (Improvement, innovation, and leadership in health and welfare).
    Innovating healthcare through remote monitoring: Effects and business model2017In: Health Care Delivery and Clinical Science: Concepts, Methodologies, Tools, and Applications, IGI Global, 2017, p. 247-268Chapter in book (Other academic)
    Abstract [en]

    Information technology has been suggested to improve patient health outcomes and reduce healthcare cost. This study explored the business model and effects of collaborative innovation between caregivers and patients on healthcare delivery through remote patient monitoring by interviewing caregivers and surveying atrial fibrillation patients. Findings indicate that remote monitoring enhanced early detection of potential risks and quality of clinical decision-making with patients feeling more empowered and involved in their own care. The remote monitoring system which consisted of a home-based ECG and a web-based service and was offered free to patients, brought together caregivers, patients, service provider and the government as actors. The introduction of remote monitoring increased the workload of caregivers and facilitation of timely diagnostics and decision-making were not realized. IT is an enabler of innovation in healthcare, but it must be integrated into work processes with a viable business model to realize potential benefits and sustain it. 

  • 40.
    Achi, Abdelkader
    et al.
    Centre de Recherche en Informatique, Université Paris 1 Panthéon-Sorbonne, Paris, France.
    Salinesi, Camille
    Centre de Recherche en Informatique, Université Paris 1 Panthéon-Sorbonne, Paris, France.
    Viscusi, Gianluigi
    College of Management of Technology (CDM), École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland.
    Information Systems for Innovation: A Comparative Analysis of Maturity Models’ Characteristics2016In: CAiSE 2016 International Workshops / [ed] John Krogstie, Haralambos Mouratidis, Jianwen Su, Cham: Springer International Publishing , 2016, Vol. 249, p. 78-90Conference paper (Other academic)
    Abstract [en]

    Nowadays, virtually all industries are impacted by the digitalization of business enabled by information and communication technologies. Consequently, it is a major challenge to any business to increase its ability to innovate through information systems. However the effort and the investments of companies are extremely varied, they do not have the same level of maturity with respect to their innovation strategy. While some highly mature use effective approaches, others still act as novices or use inadequate practices. The question raised in this paper is how to evaluate the level of maturity of an organization with respect to information systems based innovation. Also, the question concerns the identification of the salient features of ICT centred innovation maturity models. Taking these issues into account, the paper makes the following contributions: (i) a review of sixteen innovation maturity models collected from the research and the practitioners community, gathering facts about the models and about their effectiveness; (ii) a comparative analysis of these models.

  • 41. Achi, Abdelkader
    et al.
    Salinesi, Camille
    Viscusi, Gianluigi
    Linköping University, Department of Management and Engineering, Information Systems and Digitalization.
    Innovation capacity and the role of information systems: a qualitative study2016In: Journal of Management Analytics, ISSN 2327-0012, Vol. 3, no 4, p. 333-360Article in journal (Refereed)
    Abstract [en]

    Today businesses are facing radical transformations through digitalization of services and products. Accordingly, their ability to innovate is increasingly linked to the capacity to innovate through information and communication technologies (ICTs). This article investigates the role of information systems (IS) as a key factor for innovation capacity. To this end, the article discusses an interpretive framework for understanding the degree of capacity of innovation through information systems (IS) reached by a given company and the contradictions that bound its evolution. An interpretive study is also presented, where the framework has been applied to seven French companies from various industries. Consistently with the framework, the interviews address process areas and practices related to three core categories: management, innovation engineering and support. The study reveals seven fundamental contradictions that can explain the main tendencies observed across the companies.

  • 42.
    Ackerstierna, Linda
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    Söder, Mikka
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media, Information Systems.
    The Future of Podcasts: A Case Study based on Usability Heuristics of a Podcast Service User Interface of an iOS Application2021Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This study investigates the Usability of the podcast service User Interface (UI) of the iOS app Aftonbladet. The method used originates from a heuristic evaluation technique where semi- structured interviews were conducted with users of the podcast service to explore the usability and to find usability problems. The conducted interviews determined that there existed usability problems with the UI and thus, usability heuristics have been violated in the UI.

     

    Nielsen’s Ten Usability Heuristics for User Interface Design and Nielsen’s Severity Ratings for Usability Problems are applied to the interview answers for evaluating the usability of the podcast service UI.

     

    The heuristics that are interpreted as being of critical importance are:

     

    • Heuristic 3. User Control and Freedom 
    • Heuristic 4. Consistency and Standards 
    • Heuristic 5. Error Prevention 
    • Heuristic 6. Recognition rather than Recall 
    • Heuristic 7. Flexibility and Efficiency of Use 
    • Heuristic 8. Aesthetic and Minimalist Design 
    • Heuristic 10. Help and Documentation   

    Three out of the ten heuristics were not of critical importance: 

     

    • Heuristic 1. Visibility of System Status 
    • Heuristic 2. Match Between System and Real World 
    • Heuristic 9. Help Users Recognize, Recover and Diagnose from Errors 
    Download full text (pdf)
    fulltext
  • 43.
    Ackrell, Simon
    et al.
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Landelius, Mathias
    Linnaeus University, Faculty of Technology, Department of Informatics.
    Molnbaserade affärssystem: Viktiga aspekter vid övergång till molnet2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Det saknades teori kring vilka aspekter som var viktiga för potentiella kunder att väga in i ett beslut om övergång till molnbaserade affärssystem. I undersökningen har vi samlat tidigare forskning kring molntjänster generellt och sedan jämfört den med empiri från respondenter med erfarenhet av molnbaserade affärssystem. På så sätt har vi försökt koppla tidigare forskning och undersökt huruvida den är applicerbar på vår studie. Vi kom fram till att det framförallt är aspekter rörande säkerhet, ekonomi och affärsstrategi som kunder bör vara medvetna om när de planerar en övergång till molnbaserade affärssystem. Rörande säkerhet fann vi att det är viktigt att tänka på hur den fysiska lagringen sker och säkerhetsrutiner kring vem som handhar data och hur den säkerhetskopieras samt vem som äger datan. Ekonomiskt kan beslutet om en övergång påverkas av molntjänsters olika prismodeller, hur kostnader skiljer sig mot lokalt installerade system samt potentiellt dolda kostnader. Slutligen kan det affärsstrategiskt finnas avgörande aspekter i hur system interagerar med varandra, hur anpassad en tjänst är till mobila enheter samt att molntjänster enkelt kan skalas upp i storlek vid behov.

    Download full text (pdf)
    fulltext
  • 44.
    Adam, Paul
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media.
    Billing, Björn
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Social Sciences, Department of Informatics and Media.
    Vad utmärker användbarhet för expertanvändare i ett gränssnitt mot big data?2014Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Download full text (pdf)
    Vad utmärker användbarhet för expertanvändare i ett gränssnitt mot big data?
  • 45.
    Adamson, Victor
    et al.
    University of Skövde, School of Informatics.
    Bägerfeldt, Johan
    University of Skövde, School of Informatics.
    Assessing the effectiveness of ChatGPT in generating Python code2023Independent thesis Basic level (degree of Bachelor), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This study investigated ChatGPT’s Python code generation capabilities with a quasi-experiment and a case study, incorporating quantitative and qualitative methods respectively. The quantitative analysis compared ChatGPT-generated code to human-written solutions in terms of accuracy, quality, and readability, while the qualitative study interviewed participants with varying levels of programming experience about the usability of ChatGPT for code generation. The findings revealed significant differences in quality between AI-generated and human-written solutions but maintained overall similarities in accuracy and readability. The interviewees reported that ChatGPT showed potential for generating simple programs but struggled with complex problems and iterative development, though most participants were optimistic about its future capabilities. Future research could involve larger samples, more programming languages, and increased problem complexities. 

    Download full text (pdf)
    fulltext
  • 46.
    Adebahr, Johan
    et al.
    University West, Department of Economics and Informatics, Divison of Informatics.
    Andersson, Victor
    University West, Department of Economics and Informatics, Divison of Informatics.
    Övervakning: Var går gränsen?: En studie av lastbilschaufförer som arbetar i Bohuslän och hur de ser på IT som hjälpmedel och övervakning på jobbet2013Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Nowadays companies and organizations are implementing IT-systems that enable surveillances, particularly within the transport business. The implementation within the surveillances systems enables a better security and a more efficient workflow. The systems make it possible for companies to see fuel consumption, the position off the truck and also to plan the most efficient routes. The truck drivers have learned to accept that they are being watched through the companies surveillance systems just because it leads to a more efficient route-planning. The drivers understand why they’re being monitored and they feel safe. Since IT-systems came into the transport business drivers are able to see the fuel consumption and by seeing that they can drive more ecological and save money for their company. The truck driver that works in Bohuslän is well aware that these services are crucial for the companies, by having these systems the companies can compete with the foreign hauliers that takes the same job for a much smaller fee. But where is the limit for acceptable surveillance? We answered the issue by doing interviews in two rounds, first with ten truck drivers then with six. We also did a literature study. The drivers where all driving for companies in Bohuslän. The drivers we interviewed had different experience within the business, some drivers worked at big companies and some drivers worked at smaller companies. By sorting the drivers out we were able to sort out our answers and see if there were a difference in the way the drivers were thinking. We wanted to get knowledge of how different business surveilled their employees and how the employees reacted. So we performed a literature study where we read different case studies from the home care, the sales industry and the elementary school. We compared the result from our study with the result from our interviews. We managed to see that truck drivers generally had more loyal thoughts to their company. The drivers that were interviewed where well aware of the hard competition within the industry. As long as surveillance makes the company more efficient and the surveillance don’t violate their private integrity it´s okay to use it.Keywords: Surveillance, loyal workers, IT-system, competition

    Download full text (pdf)
    fulltext
  • 47.
    Adewunmi, Oluwafemi
    et al.
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Arts, Department of Game Design.
    Gouda, Sahashransu
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Arts, Department of Game Design.
    Song, Zhechao
    Uppsala University, Disciplinary Domain of Humanities and Social Sciences, Faculty of Arts, Department of Game Design.
    Gamification for Community Involvement2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This study investigates the feasibility of enhancing community engagement through gamification, using a prototype third-person 3D adventure game called Harmoni. The research targets international students in Gotland, Sweden, aiming to reduce cultural barriers and promote community involvement. By integrating game elements such as altruistic missions, language learning, and historical exploration, the prototype seeks to motivate real-life participation in community activities. Data collected from pre- and post-surveys and follow-up interviews with a small sample size (n=10) suggest that gamification can positively impact community involvement. Despite the limitations of sample size, the findings indicate that thoughtfully designed gamified experiences can foster a sense of belonging and encourage active participation in community life. The study underscores the potential of gamification in educational and social contexts, offering insights for future applications and improvements in game-based community engagement strategies.

    Download full text (pdf)
    Gamification for Community Involvement
  • 48.
    Adisa, Femi
    et al.
    Copenhagen Business Sch, Denmark.
    Schubert, Petra
    Copenhagen Business Sch, Denmark.
    Sudzina, Frantisek
    Slovak Acad Sci, Slovakia.
    Johansson, Bjorn
    Lund Univ, Sweden.
    Living Requirements Space An open access tool for enterprise resource planning systems requirements gathering2010In: Online information review (Print), ISSN 1468-4527, E-ISSN 1468-4535, Vol. 34, no 4, p. 540-564Article in journal (Refereed)
    Abstract [en]

    Purpose - This paper aims to discuss a new tool for requirements gathering in the Web 2.0 era. It seeks to investigate the features that this kind of tool should have in order to be as widely applicable and useful as possible. Further, it aims to explore the extent to which business requirements for enterprise resource planning (ERP) systems can be collected and discussed collaboratively in a worldwide community of business process experts. Design/methodology/approach - The paper is a combination of empirical research, hermeneutics and design research. Findings - The proposed Living Requirements Space (LRS) platform has the potential of becoming an international forum for collecting and discussing business requirements for ERP systems. Practical implications - The LRS platform will allow ERP developers, ERP systems implementers, and academics to better understand the evolution of business requirements for ERP systems. It will create a knowledge base of ERP business requirements, that is, a repository that guarantees open and unrestricted access to content. It will thus allow for more international ERP systems and far more comprehensive education on and understanding of business processes and ERP systems. Originality/value - LRS is an open access tool that allows for the gathering of ERP systems requirements in a vendor-and project-independent approach that is unbiased towards any geographic region.

  • 49.
    Adjei, David
    et al.
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    Nilsson, Stina
    Umeå University, Faculty of Social Sciences, Department of Informatics.
    From project to practice: Creating conditions for digital healthcare implementation using the CFIR framework2021Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Despite the phenomenal innovations and huge investments in healthcare, it is evident that some digital transformation innovations in the healthcare context fail to meet their desired outcomes. Whilst some researchers argue that this is partly due to ineffective implementation, others argue otherwise. Essentially, there is an outspoken need to evaluate implementation processes, and one way to do so is through the use of an implementation framework, where one such framework showing great potential is the Consolidated Framework for Implementation Research (CFIR). By using a qualitative case study through the lenses of the CFIR, the study carries out a summative evaluation and examination of a previously conducted implementation process in a region in the north of Sweden, with the purpose of developing a greater understanding of implementation processes in order to improve patient care, as well as experiences and outcomes of digital transformation implementations. The study successfully identifies factors of both success and challenge in relation to implementation processes, where some of the success factors include the involvement of caregivers in the process and competition of private healthcare providers, whilst some of the challenges include deficient involvement of end-users as well as lack of structure. The study unearths some lessons which can be used as a guide for future implementations within the healthcare context, but also other contexts as well.

    Download full text (pdf)
    Adjei & Nilsson
  • 50.
    Adolfsson, Andreas
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School.
    Uppföljning av affärsnytta inom IT-projekt: En kvalitativ studie om möjliggörande av uppföljning.2016Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    IT-projekt har ofta ett bakomliggande syfte att bidra med ökad affärsnytta, ökad flexibilitet, effektivare arbetssätt, eller ökad kundnöjdhet. Uppföljning av affärsnytta förpassas ofta till förmån för klassiskt definierade framgångsparametrar inom projektledning, tid, budget och resultat. Mycket fokus hamnar på tekniska aspekter kring införande av system och affärsnyttan glöms bort. Vissa anledningar till att uppföljning av affärsnytta bortprioriteras anses vara att det är för svårt, råder oklarhet kring ansvar, och att affärsnyttor är av övervägande ogreppbar karaktär. Affärsnyttorna berör ofta flera olika verksamhetsområden vilket medför svårigheter gällande identifikation och hög kostnad för att involvera berörda resurser. IT-projekt initieras däremot grundat på explicita greppbara värden med tillhörande kostnadskalkyl som visar hur verksamheten kommer få igen investerat kapital. När affärsnytta inte är explicit uttryckt, utan har en ogreppbar karaktär leder det till låg prioritet, då kunskap kring mätning och styrning saknas. IT-projekt innebär en stor investering i tid, pengar, personal och den förväntade affärsnyttan har stor genomslagskraft. Uppfyllelse av affärsnytta kan påverka hela företagets lönsamhet. Teorier gällande Benefits Management Process (BMP) utgör basen för denvetenskapliga plattformen och har kompletterats medrelevant forskning vid behov.

    Syftet med undersökning är att se vilka aktiviteter som behöver föregå för att möjliggöra framgångsrik uppföljning av affärsnytta inom IT-projekt så att måluppfyllelse kan säkerställas.Även undersöka om utformning av projektmål kan bidra till att underlätta uppföljnings aktivitet.Undersökningen genomförs som en kvalitativ studie där en verksamhet inom små och mellanstora företagssegmentet (SMF), undersökts då de bedriver ett aktivt IT-projekt gällande byte av affärssystem. Undersökningen resulterade i fem konkreta slutsatser som är av en förklarande och upplysande karaktär.

     

    Undersökningen visar att:

    • BMP möjliggör uppföljning av affärsnytta inom IT-projekt, men är inte en förutsättning.
    • BMP kräver ett omfattande åtagande för att bidra till ökat värde för en verksamhet.
    • En genomarbetad målformulering enligt akronymen SMART kan öka en verksamhets möjlighet till styrning och kontroll av dess projektmål.
    • Tydligare koppling till identifiering och mätningsmetoder krävs för att maximera värdet av att ta sig an BMP.
    • Systemleverantörs och kundrelationen behöver belysas inom BMP i takt med färre egna utvecklingsprojekt inom affärssystem initieras.

     

    Brister i teorin rör konkreta metoder för att mäta affärsnytta och hur Key Peformance Indictors (KPI) kan användas på ett effektivt sätt. Tillsammans med att forskningen inte redogör för hur en verksamhet kan arbeta med uppföljning av affärsnytta i en kund- och systemleverantörsrelation. Explicit uttryckt när en verksamhet genomför upphandling av affärssystem ifrån en systemleverantör. Detta rekommenderas ligga till grund för framtida undersökningar.

    Download full text (pdf)
    fulltext
1234567 1 - 50 of 6483
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf