Change search
Refine search result
12 1 - 50 of 74
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Adolfsson, Elin
    Blekinge Institute of Technology, School of Computing.
    Sociala medier för att hantera kundkontakter2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    KONTEXT. I takt med att Internets framväxt och fler och fler människor ansluter sig till sociala medieplattformar som Facebook, uppkommer nya sätt att interagera och kommunicera mellan varandra. Samtidigt ökar antalet organisationer och företag, som i sin tur måste hitta nya vägar för att deras marknadsföring ska sticka ut och bli uppfattad. För att nå ut till målgruppen med budskap, måste organisationen vara där målgruppen är. Därför har Facebook blivit en ny del av företags marknadsföringsredskap. Denna studie är fokuserad på Malmö stadsbiblioteks användning av Facebook som ett kommunikationsverktyg i hanteringen av kundkontakter. MÅL. Syftet med denna magisteruppsats är att undersöka Malmö stadsbiblioteks användning av Facebook, med ett huvudsakligt fokus på undperception och kundens upplevelse av kommunikationen, för att utreda hur Malmö stadsbibliotek bör använda Facebook i marknadsföringssyfte. METOD. Denna studie är baserad på en empirisk undersökning innehållandes en innehållsanalys av Malmö stadsbiblioteks Facebooksida, och också en onlineenkät gjord på de som ”gillar” och följer Facebooksidan. RESULTAT. Resultatet av den empiriska studien visar att Malmö stadsbibliotek står inför en bred målgrupp där segmentering är nödvändigt för att skapa och sprida rätt budskap till den primära målgruppen. Malmö stadsbibliotek publicerar statusuppdateringar relativt jämnt fördelat på månadens dagar och det är möjligt att peka ut olika kategorier av uppdateringar med olika målgruppsresponser och upplevelser från följarna. Resultatet av studien presenteras som diagram och tabeller med beskrivningar för att förbättra illustrationen och därför öka förståelsen. SLUTSATS. Slutsatsen av denna magisteruppsats är att de flesta respondenterna är positiva inför Malmö stadsbiblioteks användning av Facebook. Baserat på diverse befintliga teorier är marknadsföring på sociala nätverk ett bra sätt att interagera, kommunicera och få feedback från kunder för att kunna bygga goda relationer med kunderna. Detta är någonting som är väldigt viktigt i nuläget när antalet företag och reklambruset är så högt som det är. Det finns ingen enkel väg till framgång, med enbart en korrekt väg. Det är beroende av varje specifik organisation och deras specifika primärmålgrupp.

  • 2.
    Ahmet, Zeynep
    Blekinge Institute of Technology, School of Computing.
    What Are You Doing And Feeling Right Now?2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Understanding and capturing game play experiences of players have been of great interest for some time, both in academia and industry. Methods used for eliciting game play experiences have involved the use of observations, biometric data and post-game techniques such as surveys and interviews. This is true for games that are played in fixed settings, such as computer or video games. Pervasive games however, provide a greater challenge for evaluation, as they are games that typically engage players in outdoor environments, which might mean constant movement and a great deal of the players' motor skills engaged for several hours or days. In this project I explored a new method for eliciting different aspects of the game play experience of pervasive game players, specifically focusing on motional states and different qualities of immersion. I have centered this work on self-reporting as a means for reporting these aspects of the game play experiences. However, this required an approach to selfreporting as non-obtrusive, not taking too much of the players’ attention from the game activities as well as provide ease of use. To understand the challenges in introducing a new method into a gaming experience, I focused my research on understanding experience, which is a subjective concept. Even though there are methods aiming at capturing the physiological changes during game play, they don’t capture players’ interpretations of the gaming situation. By combining this with objective measurements, I was able to gain a comprehensive understanding of the context of use. The resulting designs were two tools, iteratively developed and pre-tested in a tabletop role-playing session before a test run in the pervasive game Interference. From my findings I was able to conclude that using self-reporting tools for players to use while playing was successful, especially as the data derived from the tools supported post-game interviews. There were however challenges regarding the design and functionality, in particular in outdoor environments, that suggests improvements, as well as considerations on the use of selfreporting as an additional method for data collection.

  • 3.
    Amin, Khizer
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Minhas, Mehmood ul haq
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Facebook Blocket with Unsupervised Learning2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The Internet has become a valuable channel for both business-to- consumer and business-to-business e-commerce. It has changed the way for many companies to manage the business. Every day, more and more companies are making their presence on Internet. Web sites are launched for online shopping as web shops or on-line stores are a popular means of goods distribution. The number of items sold through the internet has sprung up significantly in the past few years. Moreover, it has become a choice for customers to do shopping at their ease. Thus, the aim of this thesis is to design and implement a consumer to consumer application for Facebook, which is one of the largest social networking website. The application allows Facebook users to use their regular profile (on Facebook) to buy and sell goods or services through Facebook. As we already mentioned, there are many web shops such as eBay, Amazon, and applications like blocket on Facebook. However, none of them is directly interacting with the Facebook users, and all of them are using their own platform. Users may use the web shop link from their Facebook profile and will be redirected to web shop. On the other hand, most of the applications in Facebook use notification method to introduce themselves or they push their application on the Facebook pages. This application provides an opportunity to Facebook users to interact directly with other users and use the Facebook platform as a selling/buying point. The application is developed by using a modular approach. Initially a Python web framework, i.e., Django is used and association rule learning is applied for the classification of users’ advertisments. Apriori algorithm generates the rules, which are stored as separate text file. The rule file is further used to classify advertisements and is updated regularly.

  • 4.
    Amiri, Javad Mohammadian
    et al.
    Blekinge Institute of Technology, School of Computing.
    Padmanabhuni, Venkata Vinod Kumar
    Blekinge Institute of Technology, School of Computing.
    A Comprehensive Evaluation of Conversion Approaches for Different Function Points2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Software cost and effort estimation are important activities for planning and estimation of software projects. One major player for cost and effort estimation is functional size of software which can be measured in variety of methods. Having several methods for measuring one entity, converting outputs of these methods becomes important. Objectives: In this study we investigate different techniques that have been proposed for conversion between different Functional Size Measurement (FSM) techniques. We addressed conceptual similarities and differences between methods, empirical approaches proposed for conversion, evaluation of the proposed approaches and improvement opportunities that are available for current approaches. Finally, we proposed a new conversion model based on accumulated data. Methods: We conducted a systematic literature review for investigating the similarities and differences between FSM methods and proposed approaches for conversion. We also identified some improvement opportunities for the current conversion approaches. Sources for articles were IEEE Xplore, Engineering Village, Science Direct, ISI, and Scopus. We also performed snowball sampling to decrease chance of missing any relevant papers. We also evaluated the existing models for conversion after merging the data from publicly available datasets. By bringing suggestions for improvement, we developed a new model and then validated it. Results: Conceptual similarities and differences between methods are presented along with all methods and models that exist for conversion between different FSM methods. We also came with three major contributions for existing empirical methods; for one existing method (piecewise linear regression) we used a systematic and rigorous way of finding discontinuity point. We also evaluated several existing models to test their reliability based on a merged dataset, and finally we accumulated all data from literature in order to find the nature of relation between IFPUG and COSMIC using LOESS regression technique. Conclusions: We concluded that many concepts used by different FSM methods are common which enable conversion. In addition statistical results show that the proposed approach to enhance piecewise linear regression model slightly increases model’s test results. Even this small improvement can affect projects’ cost largely. Results of evaluation of models show that it is not possible to say which method can predict unseen data better than others and it depends on the concerns of practitioner that which model should be used. And finally accumulated data confirms that empirical relation between IFPUG and COSMIC is not linear and can be presented by two separate lines better than other models. Also we noted that unlike COSMIC manual’s claim that discontinuity point should be around 200 FP, in merged dataset discontinuity point is around 300 to 400. Finally we proposed a new conversion approach using systematic approach and piecewise linear regression. By testing on new data, this model shows improvement in MMRE and Pred(25).

  • 5.
    Andersson, Lars
    Blekinge Institute of Technology, School of Computing.
    Inblick i fenomenet webbskrapning2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Föreliggande kandidatarbete har till syfte att undersöka fenomenet Webskrapning. Webbskrapnings-program (också kända som Web Wanderers, Crawlers, Spiders eller skrapare) är program som söker igenom webben automatiskt för att extrahera information från webbsidor. Ett exempel på web skrapning är när ett företag samlar in data om prissättningar på en vara eller en tjänst och sen använder informationen för att producera billigare erbjudanden. Detta ger företaget en fördel så att de kan fokusera mera på att marknadsföra sin sida/tjänster. Utöver detta så blir de utsatta företagens servrar också hårt belastade med trafik (skrapning) från ”icke kunder”. Efter att ha genomsökt både akademiska och allmänna källor via informationsinsamling, av denna information så dras slutsatsen att man inte fullt ut kan hindra skrapning av hemsidor. Detta på samma sätt som man inte fullt ut kan hindra någon IT-attack, det finns inga 100 % vattentäta system. Av utfallet ifrån informationssökningen var det bara ett akademiskt arbete, av de hundra, som genomsöktes som hade inriktat sig på att förhindra skrapningsbotar.

  • 6.
    Anwar, Naveed
    et al.
    Blekinge Institute of Technology, School of Computing.
    Kwoka, Adam
    Blekinge Institute of Technology, School of Computing.
    Web Site Usability, Technical and Social Perspectives2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    World Wide Web (www) has achieved an important role in communication, information sharing and service delivery now-a-days. World Wide Web consists of millions of web sites and web based applications which are deployed and can be visited all over the world without the limitation of time and geographical boundaries. Web site usability, security and reliability consider some of the core aspects in designing of web sites. In this thesis, we explore possible tensions and tradeoffs between usability and security issues in web site design. We discuss web site usability issues in terms of technical and social aspects. We discuss web site security in terms of usability and offer some recommendations for secure website design without compromising the web site performance. We also highlight the importance of ease of navigation and other aspects of user interface design. In order to explore these issues, we have chosen to review the related literature. We have also conducted interviews with professionals who are mainly concerned with web site usability. Two sample interviews are available at the end of this thesis report.

  • 7.
    Bajramovic, Kemal
    Blekinge Institute of Technology, School of Computing.
    Implementing e-Government in Bosnia and Herzegovina: Practices and Challenges for the State government2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Context: Electronic Government (sometimes referred to as digital government, online government) is the use of information and communication technologies to: a) enable optimization and innovation of all government internal processes in the back-office and external processes by providing government services to customers through Internet and other electronic means; and b) facilitate achieving goals of all government policies and strategies. Objectives: In this study we are explaining e-Government practices, perceptions and performances of state institutions of Bosnia and Herzegovina (BiH) and analyzing obstacles and challenges of current approach to e-Government management, in order to propose immediate and middle-term e-Government actions for BiH state institutions to start delivering integrated and useful e-Government services. Methods: In this, three sources of information are used: a) comprehensive survey of state employees, b) interviews with some of the e-Government practitioners and c) systematic review of a number of relevant article sources. All questions/reviews have been done in order to find out what measures could be taken and what guidelines should be followed by the BiH state institutions so they become more IT savvy in taking advantage of e-Government implementations. Results: Measures for improvements have been proposed in several distinct areas: building human capacities for e-Government development, changing management and leadership practices, building regulatory and organizational framework for e-Government and resolving interpersonal issues in e-Government systems design. Additionally, a Phase plan for e-Government project implementation is proposed to those having a vision and idea on some e-Government project, but maybe lacking the skills and knowledge on how to actually initiate, design and implement it. Conclusions: We conclude that BiH state government should realize that e-Government is not just about implementing some IT projects; it is an overall public administration reform process which has to be adequately supported by regulative and organizational measures. This thesis provided arguments for such strategic e-Government decision-making and necessity for government-wide management and development capacity. We conclude that there is a need for BiH state government to understand the current situation and arguments presented, and take steps in building its capacities in this field.

  • 8.
    Brodka, Piotr
    et al.
    Wroclaw Univ Technol, Inst Informat, PL-50370 Wroclaw, Poland..
    Sobas, Mateusz
    Wroclaw Univ Technol, Inst Informat, PL-50370 Wroclaw, Poland..
    Johnson, Henric
    Blekinge Institute of Technology, School of Computing.
    Profile Cloning Detection in Social Networks2014In: 2014 EUROPEAN NETWORK INTELLIGENCE CONFERENCE (ENIC), IEEE Computer Society, 2014, 63-68 p.Conference paper (Refereed)
    Abstract [en]

    Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates a possibility to detect frauds that would use people's trust to gather social information. This paper proposes two novel methods of profile cloning detection and also presents state-of-the-art research. The first method is based on the similarity of attributes from both profiles and the second method is based on the similarity of relationship networks. The methods are further evaluated with experiments and the results clearly describes that the proposed methods are useful and efficient compared to existing methods. The paper also stress that profile cloning in Facebook is not only possible but also fairly easy to perform.

  • 9.
    Bródka, Piotr
    Blekinge Institute of Technology, School of Computing.
    Key User Extraction Based on Telecommunication Data2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The number of systems that collect vast amount of data about users rapidly grow during last few years. Many of these systems contain data not only about people characteristics but also about their relationships with other system users. From this kind of data it is possible to extract a social network that reflects the connections between system’s users. Moreover, the analysis of such social network enables to investigate different characteristics of its users and their linkages. One of the types of examining such network is key users extraction. Key users are these who have the biggest impact on other network users as well as have big influence on network evolution. The obtained knowledge about these users enables to investigate and predict changes within the network. So this knowledge is very important for the people or companies who make a profit from the network like telecommunication company. The second important issue is the ability to extract these users as quick as possible, i.e. developed the algorithm that will be time-effective in large social networks where number of nodes and edges is equal few millions.

  • 10.
    Bukhari, Syed Asif Abbas
    et al.
    Blekinge Institute of Technology, School of Computing.
    Hussain, Sajid
    Blekinge Institute of Technology, School of Computing.
    Intelligent Support System for Health Monitoring of elderly people2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The use of information and communications technology (ICT) to provide medical information, interaction between patients and health-service providers, institution-to-institution transmission of data, in known as eHealth. ICT have become an inseparable part of our life, it can integrate health care more seamlessly to our everyday life. ICT enables the delivery of accurate medical information anytime anywhere in an efficient manner. Cardiovascular disease (CVD) is the single leading cause of death, especially in elderly people. The condition of heart is monitor by electrocardiogram (ECG). The Electrocardiogram (ECG) is widely used clinical tool to diagnose complex heart diseases. In clinical settings, resting ECG is used to monitor patients. Holter-based portable monitoring solutions capable of 24 to 48-hour ECG recording, they lack the capability of providing any real-time feedback in case of alarming situation. The recorded ECG data analyzed offline by doctor. To address this issue, authors propose a functionality of intelligence decision support system, in heart monitoring system. The proposed system has capability of generate an alarm in case of serious abnormality in heart, during monitoring of heart activity.

  • 11.
    Chtivelband, Igor
    Blekinge Institute of Technology, School of Computing.
    HistoryLane: Web Browser History Visualization Method2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    With the evolution of Internet, users exploit it increasingly intensively for achieving their goals: sending emails, playing games, watching videos, reading news. They do it through Web browsers, that may vary in exact implementation, but have similar core functionalities . One of these core functionalities is the access to a browsing history. However, as browsing patterns are getting more complex, the traditional history tools become insufficient. Visualization of browsing history might be helpful in that case. In this study we propose a novel approach for browsing history visualization, named HistoryLane, which ts the parallel browsing paradigm, common for modern browsers. The main goal of HistoryLane is enabling the user to gain insight into his own or into other users' parallel browsing patterns over time. Principles of HistoryLane visualization approach are formulated based on recommendations, found during structured literature review. These principles constitute the base for a prototype, which was implemented as a Fire- fox extension. To evaluate the e ffectiveness of HistoryLane we conducted a survey and a quantitative experiment. The results of the evaluation show that HistoryLane is perceived by users as effective and intuitive method for browsing history visualization.

  • 12.
    Delgado, Sergio Mellado
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Velasco, Alberto Díaz
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Indoor Positioning using the Android Platform2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    In recent years, there has been a great increase in the development of wireless technologies and location services. For this reason, numerous projects in the location field, have arisen. In addition, with the appearance of the open Android operating system, wireless technologies are being developed faster than ever. This Project approaches the design and development of a system that combines the technologies of wireless, location and Android with the implementation of an indoor positioning system. As a result, an Android application has been obtained, which detects the position of a phone in a simple and useful way. The application is based on the WIFI manager API of Android. It combines the data stored in a SQL database with the wifi data received at any given time. Afterwards the position of the user is determined with the algorithm that has been implemented. This application is able to obtain the position of any person who is inside a building with Wi-Fi coverage, and display it on the screen of any device with the Android operating system. Besides the estimation of the position, this system displays a map that helps you see in which quadrant of the room are positioned in real time. This system has been designed with a simple interface to allow people without technology knowledge. Finally, several tests and simulations of the system have been carried out to see its operation and accuracy. The performance of the system has been verified in two different places and changes have been made in the Java code to improve its precision and effectiveness. As a result of the several tests, it has been noticed that the placement of the access point (AP) and the configuration of the Wireless network is an important point that should be taken into account to avoid interferences and errors as much as possible, in the estimation of the position.

  • 13.
    Denys, Paul
    Blekinge Institute of Technology, School of Computing.
    Security of Personal Information in Cloud Computing: Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The emergence and subsequent growth of Cloud computing has brought with it a great deal of change in the manner in which the world undertakes to compute and store information. This new technology has brought with it immense possibilities as far as processing of information and the pooling of resources is concerned. This potential has also been noticed by the public sector, as Governments all over the world have undertaken to introduce what has come to be known as e-Government, the provisioning of Government services and communications via Web based applications, rather than the traditional means of in person contact and paper based collection of personal information. While the move to Web based Government has been occurring for the last 20 or so years, a new development in this area is the introduction of Cloud computing and Cloud-based computing platforms, most notably Software-as-a-Service (SaaS) in the provisioning of these services. The computing and efficiency potential of this technology cannot be disputed, yet it’s important to recognize that taking advantage of this computing power does come at a price. That price being significant threats to personal privacy and security of personally identifiable information. This thesis will make it easier for government agencies to make informed decisions about whether or not to migrate data and applications into the cloud. The identification and analysis of potential risks to data security and personal information has drawn together key information from a multitude of both academic and industry sources to make such a decision plausible.

  • 14.
    Duc, Tran Huy
    Blekinge Institute of Technology, School of Computing.
    Designing distance learning for the 21st century: Constructivism, Moore’s transactional theory and Web 2.02012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Distance learning has been playing an ever more influential role. Yet there remains little rigorous academic research into distance learning pedagogy, lacking of serious study in management, delivery and organization of distance learning has destabilized the field. Recently, the boom of Web 2.0 has made websites a lot more intuitive, interactive and interesting; Web 2.0 is also widely used in distance education. Study of distance education as a result sometimes has been misdirected, instead of understanding and solving the real issues facing distance education, research in the field devoted entirely to technology usage discarding the very issue of effective education in distance context. In other words, instead of pursuing technology-relevant policies we focus on technology-driven policies. This thesis starts by reviewing learning theories and arguing for the case of why one is more suitable for distance learning than others. The author argues that constructivism, which favors a dynamic learning process, encourages people to interact, share ideas and bounce ideas is the more effective learning theory. But deploying constructivist pedagogy into real life is difficult. We need more concrete ideas as to how to organize distance learning, a framework to benchmark distance education, to evaluate distance education. That is where Moore’s transactional theory which actually derives from constructivist pedagogy comes into the picture. Moore pointed out 3 key areas of distance education: dialogue, structure and learner autonomy. Moore argues that by having enough constructive dialogue, flexible structure catering individualism and a high level of learner autonomy to execute learning; we can reduce “distance” in distance education. Moore is equally concerned about pedagogy as he is about technologies and he has incorporated into his theory how technological changes have influenced the way distance education has been delivered for the better. This is the brilliance of Moore’s, he has not sided with either pedagogy or technology, he observed the rise of technology and the influence it has on distance education but refused to see technology as the sole factor that makes distance learning more effective or reduces “distance” in distance education. The linkage between constructivism and Moore’s theory is of significance although it is only barely acknowledged in Moore’ writing. The magnitude of this connection is that first it highlights that the work that Moore has done has been based on strong theoretical pedagogy, his contribution is that he has simplified a grand ideology into something that can be applied in the class room. Also he has succeeded in refining elements of constructivism into working variables for quantitative research. His theory is still highly relevant today but his analysis of technologies’ roles has not yet included the latest explosion of technologies in the post-1993 age: the Internet, the booming Web and especially the new Web 2.0. The aim of this thesis is to extend his analysis to these new technologies. We studied how the explosion of Web 2.0 services have been facilitating rich dialogue among peers, teachers and learning materials, allowing more individualization to educational settings and structures. Also Web 2.0 lowers the barrier to participation and content generation and thus would be expected to encourage learner autonomy. A large part of the thesis has been dedicated to literature review. This is because the author believes that in order to improve distance education, it is necessary to first understand learning theory to know when and how people learn, and explore the nature of distance education to see the differences between distance and non-distance education, and then have a comprehensive plan to implement distance education, and evaluate that plan. The implementation bit is of course a practical project; the author used a real-life course at Umeå University where students from various backgrounds signed-up to learn about how Web 2.0 can be leveraged to enhance distance education. A constructivist approach was adopted so we had a chance to see how it actually turned out. We used Moore’s transactional distance theory to evaluate the impact of introducing Web 2.0.

  • 15.
    Eivazzadeh, Shahryar
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Anderberg, Peter
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Larsson, Tobias
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Fricker, Samuel
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering. University of Applied Sciences and Arts Northwestern Switzerland.
    Berglund, Johan
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Evaluating Health Information Systems Using Ontologies2016In: JMIR Medical Informatics, ISSN 2291-9694, Vol. 4, no 2, e20Article in journal (Refereed)
    Abstract [en]

    Background: There are several frameworks that attempt to address the challenges of evaluation of health information systems by offering models, methods, and guidelines about what to evaluate, how to evaluate, and how to report the evaluation results. Model-based evaluation frameworks usually suggest universally applicable evaluation aspects but do not consider case-specific aspects. On the other hand, evaluation frameworks that are case specific, by eliciting user requirements, limit their output to the evaluation aspects suggested by the users in the early phases of system development. In addition, these case-specific approaches extract different sets of evaluation aspects from each case, making it challenging to collectively compare, unify, or aggregate the evaluation of a set of heterogeneous health information systems.

    Objectives: The aim of this paper is to find a method capable of suggesting evaluation aspects for a set of one or more health information systems—whether similar or heterogeneous—by organizing, unifying, and aggregating the quality attributes extracted from those systems and from an external evaluation framework.

    Methods: On the basis of the available literature in semantic networks and ontologies, a method (called Unified eValuation using Ontology; UVON) was developed that can organize, unify, and aggregate the quality attributes of several health information systems into a tree-style ontology structure. The method was extended to integrate its generated ontology with the evaluation aspects suggested by model-based evaluation frameworks. An approach was developed to extract evaluation aspects from the ontology that also considers evaluation case practicalities such as the maximum number of evaluation aspects to be measured or their required degree of specificity. The method was applied and tested in Future Internet Social and Technological Alignment Research (FI-STAR), a project of 7 cloud-based eHealth applications that were developed and deployed across European Union countries.

    Results: The relevance of the evaluation aspects created by the UVON method for the FI-STAR project was validated by the corresponding stakeholders of each case. These evaluation aspects were extracted from a UVON-generated ontology structure that reflects both the internally declared required quality attributes in the 7 eHealth applications of the FI-STAR project and the evaluation aspects recommended by the Model for ASsessment of Telemedicine applications (MAST) evaluation framework. The extracted evaluation aspects were used to create questionnaires (for the corresponding patients and health professionals) to evaluate each individual case and the whole of the FI-STAR project.

    Conclusions: The UVON method can provide a relevant set of evaluation aspects for a heterogeneous set of health information systems by organizing, unifying, and aggregating the quality attributes through ontological structures. Those quality attributes can be either suggested by evaluation models or elicited from the stakeholders of those systems in the form of system requirements. The method continues to be systematic, context sensitive, and relevant across a heterogeneous set of health information systems.

  • 16.
    Fagerström, Cecilia
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Tuvesson, Hanna
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Axelsson, Lisa
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Nilsson, Lina
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    The role of ICT in nursing practice: An integrative literature review of the Swedish context2017In: Scandinavian Journal of Caring Sciences, ISSN 0283-9318, E-ISSN 1471-6712, 434-448 p.Article in journal (Refereed)
    Abstract [en]

    Background: The Swedish healthcare system employs information and communication technologies (ICT) in nursing practice to meet quality-, security- and efficiency-related demands. Although ICT is integrated with nursing practices, nurses do not always feel that they are convenient to use it. We need to improve our knowledge of the role of ICT in healthcare environments and so we decided to complement existing experience of how ICT influences nursing practice. Aim: This study aimed to review and synthesise the available literature on the role of ICT in nursing practice in Swedish healthcare settings. Method: To consolidate previous studies based on diverse methodologies, an integrative literature review was carried out. Three databases were used to search for literature, 20 articles met the inclusion criteria. Results: The literature review indicates that ICT integration into nursing practice is a complex process that impacts nurses’ communication and relationships in patient care, working conditions, and professional identities and development. Nurses are found to express ambiguous views on ICT as a usable service in their everyday practice since it impacts both positively and negatively. Discussion and conclusion: Although ICT cannot replace physical presence, it can be considered a complementary service that gives rise to improved patient care. However, nonverbal communication cues may be missed when ICT is used as mediating tool and ICT can be limiting because it is not always designed to meet nurse and patient needs. The meaning of an encounter appears to change when ICT is used in nursing practice, not only for patient relationships but also for interpersonal communication.

  • 17.
    Feyh, Markus
    Blekinge Institute of Technology, School of Computing.
    Lean software development measures: A systematic mapping2013Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Context. Process improvement using lean software development uses measures to answer information needs. Measures are important in process improvement as they identify whether improvements have been made or further improvements are needed. Objectives. This study aims to identify the measures proposed in literature for lean software development and structure them according to ISO/IEC 15939. Methods. The research methodology consists of systematic mapping and uses thematic analysis. Results. Lean software development literature has become more frequently published from 1996 to 2013. The most common research types were evaluation research and experience reports. Themes were identified in measures resulting in the identification of 22 base measures, 13 derived measures and 14 indicators in total. Identified measures were then structured using a proposed meta-model adapted from ISO/IEC 15939. Using the proposed meta-model twelve models of measures were instantiated. Conclusions. Gaps exist in the lean principles for deferring commitment and respecting people. Structuring measures in models presents opportunities to identify shared dependencies in measures. Lean software development research guidelines were defined. Further research into the comparison of indicators, the industrial use of measures and the representation of models of measures is needed.

  • 18.
    Fotrousi, Farnaz
    et al.
    Blekinge Institute of Technology, School of Computing.
    Izadyan, Katayoun
    Blekinge Institute of Technology, School of Computing.
    Analytics-based Software Product Planning2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Successful software product management concerns about developing right software products for right markets at the right time. The product manager, who carries responsibilities of planning, requires but does not always have access to high-quality information for making the best possible planning decisions. The following master thesis concentrates on proposing a solution that supports planning of a software product by means of analytics. Objectives. The aim of the master thesis is to understand potentials of analytics in product planning decisions in a SaaS context. This thesis focuses on SaaS based analytics used for portfolio management, product roadmapping, and release planning and specify how the analytics can be utilized for planning of a software product. Then the study devises an analytics-based method to enable software product planning. Methods. The current study was designed with a mixed methodology approach, which includes the literature review and survey researches as well as case study under the framework of the design science. Literature review was conducted to identify product planning decisions and the measurements that support them. A total of 17 interview based surveys were conducted to investigate the impact of analytics on product planning decisions in product roadmapping context. The result of the interviews ended in an analytics-based planning method provided under the framework of design science. The designed analytics-based method was validated by a case study in order to measure the effectiveness of the solution. Results. The identified product planning decisions were summarized and categorized into a taxonomy of decisions divided by portfolio management, roadmapping, and release planning. The identified SaaS-based measurements were categorized into six categories and made a taxonomy of measurements. The result of the survey illustrated that importance functions of the measurement- categories are not much different for planning-decisions. In the interviews 61.8% of interviewees selected “very important” for “Product”, 58.8% for “Feature”, and 64.7% for “Product healthiness” categories. For “Referral sources” category, 61.8% of responses have valuated as “not important”. Categories of “Technologies and Channels” and “Usage Pattern” have been rated majorly “important” by 47.1% and 32.4% of the corresponding responses. Also the results showed that product use, feature use, users of feature use, response time, product errors, and downtime are the first top measurement- attributes that a product manager prefers to use for product planning. Qualitative results identified “product specification, product maturity and goal” as the effected factors on analytics importance for product planning and in parallel specified strengths and weaknesses of analytical planning from product managers’ perspectives. Analytics-based product planning method was developed with eleven main process steps, using the measurements and measurement scores resulted from the interviews, and finally got validated in a case. The method can support all three assets of product planning (portfolio management, roadmapping, and release planning), however it was validated only for roadmapping decisions in the current study. SaaS-based analytics are enablers for the method, but there might be some other analytics that can assist to take planning decisions as well. Conclusion. The results of the interviews on the roadmapping decisions indicated that different planning decisions consider similar importance for measurement-categories to plan a software product. Statistics about feature use, product use, response time, users, error and downtime have been recognized as the most important measurements for planning. Analytics increase knowledge about product usability and functionality, and also can assist to improve problem handling and client-side technologies. But it has limitations regarding to receiving formed-based customer feedback, handling development technologies and also interpreting some measurements in practice. Immature products are not able to use analytics. To create, remove, or enhance a feature, the data trend provides a wide view of feature desirability in the current or even future time and clarifies how these changes can impact decision making. Prioritizing features can be performed for the features in the same context by comparing their measurement impacts. The analytics-based method covers both reactive and proactive planning.

  • 19.
    Garlapati, Rambabu
    et al.
    Blekinge Institute of Technology, School of Computing.
    Biswas, Rajib
    Blekinge Institute of Technology, School of Computing.
    Interoperability in Healthcare: A focus on the Social Interoperability2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Now a days Information technology has become a part of health-care delivery this makes life much easier for patients and health-care professionals. The increase in demand for communication among the different health information systems and health professionals has made interoperability complex and whereas interoperability is mainly focused at semantic and technical levels of communication. Yet, the social interoperability, an important part of communication between computerized systems and health professionals, is overlooked. Obje ctive s: In this study we explore the differences between interoperability and social interoperability. Furthermore investigate the social interoperability in practice and the problems that affect the health-care. Methods: We start with the literature survey to learn the definitions of interoperability and social interoperability. Later, case study approach is carried out to investigate the social interoperability in Interoperability. Interviews were also conducted as part of the observations in cases. Re sults: The similarities and differences in definitions of interoperability and social interoperability are sorted out from the literature study. Five cases have been investigated to identify the social interoperability in practice. Analyses of these cases have identified some of the major problems for health information systems that do not meet social interoperability. Conclusions: Interoperability definitions agree that interoperability is undoubtedly important for health data communication, but their goals in achieving interoperability is concerned only about computerized systems and very less focused on social interoperability. The case studies are used to find out the social communication using in health information systems. We realize that the communication between the users and the information systems are quite complex. The developed systems are witnessing the usability difficulties to the health-care providers that affect the patient care.

  • 20.
    Ge, Quanyi
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Chai, Yi
    Blekinge Institute of Technology, School of Engineering.
    RFID Emergency System for Tumble Detection of Solitary People2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    RFID (Radio Frequency Identification) system is a wireless system without any kinds of mechanical or optical connection between identifying and detected objects. It consists of two basic devices: a reader and tag. Recently with the development of the technology, SAW-RFID (Surface Acoustic Wave Radio Frequency Identification) tags come into market with acceptable price, as well as its size tends to miniaturization. We propose to use 3D wireless indoor localization system to detect the position of the tags. The reader converts radio waves returned from the SAW-RFID tag into a form, which can be useful to process the information. The system consists of SAW-RFID tags placed on the object and several RF Readers in the room. The readers sequentially transmit the impulse signals which are then reflected from different tags and received by readers. Then a signal round-trip TOA (Time of Arrival) between tags and readers can be estimated. We define a 3D coordinate system of the readers and calculate the positions of the tags using suitable specific algorithm. Our system is design to monitor a human body position. The goal is to detect a tumble of solitary living people. A case when the tag positions are identified to be below a per-set threshold means that something happened, and maybe a man has fallen on the ground. This emergency situation can be detected by the monitoring system which then sends information to an alarm system which can call the health centre to take care of the patient. In this paper, a 5 m×5 m×3 m indoor localization system is implemented in Matlab. The simulation results show a correct identification of a fallen man and accuracy of the high measurement below 30 cm.

  • 21.
    Georgsson, Mattias
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Kushniruk, A.
    School of Health Information Science, University of Victoria, VIC, Canada.
    Mediating the cognitive walkthrough with patient groups to achieve personalized health in chronic disease self-management system evaluation2016In: Studies in Health Technology and Informatics, IOS Press, 2016, Vol. 224, 146-151 p.Conference paper (Refereed)
    Abstract [en]

    The cognitive walkthrough (CW) is a task-based, expert inspection usability evaluation method involving benefits such as cost effectiveness and efficiency. A drawback of the method is that it doesn’t involve the user perspective from real users but instead is based on experts’ predictions about the usability of the system and how users interact. In this paper, we propose a way of involving the user in an expert evaluation method by modifying the CW with patient groups as mediators. This along with other modifications include a dual domain session facilitator, specific patient groups and three different phases: 1) a preparation phase where suitable tasks are developed by a panel of experts and patients, validated through the content validity index 2) a patient user evaluation phase including an individual and collaborative process part 3) an analysis and coding phase where all data is digitalized and synthesized making use of Qualitative Data Analysis Software (QDAS) to determine usability deficiencies. We predict that this way of evaluating will utilize the benefits of the expert methods, also providing a way of including the patient user of these self-management systems. Results from this prospective study should provide evidence of the usefulness of this method modification. © 2016 The authors and IOS Press. All rights reserved.

  • 22.
    Gislen, Mikael
    Blekinge Institute of Technology, School of Computing.
    Dysfunctional aspects of Software Development: An analysis of how lip-service, deception and organisational politics may side-track the result of well-intended methodologies2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This paper tries to identify and understand the human social obstacles for developing quality software. These include lip-service, cutting corners, deception and effects of internal politics. These obstacles can undermine the good intentions behind the software methodologies. The paper draws from the literature in different disciplines and uses an ethnographic research methodology to create a rich picture of the concerning aspects in the framework of one software development company in India. What stands out among the findings are that internal audits has mainly focused on finding errors in documentation procedures but study of the actual practices has often been shallow. In addition the understanding of business risks by the internal auditors have often been weak. Context. The human based obstacles affecting Software Development Methodology analysed in the context of an ISO 9000 quality system in an Indian Software Development company working mainly with Swedish companies. Objectives. Identifying and increasing the understanding of intrinsic negative social aspects such as lip service, cheating and politics which are affecting the results of Software Development Methodologies and if possible suggest some means to mitigate them. In particular to create a deeper understanding of why people cheat and pay lip service to methodologies and to try to understand the political aspects of methodology and quality systems. There are other positive social aspects, but they are not considered since the objective is about understanding the negative aspects and possibly mitigate them. Methods. Ethnographic research using analysis of ISO 9000 and design artefacts, semi-structured interviews, participation in internal audits, Results. Most focus in audits was on documentation and very less focus on underlying methodologies, some indications of lip-service to process and processes were also mainly managed on a higher level in the organization while the understanding and practices were less well established on lower level. It was hard to get a grip on the internal political aspects since the perception of the subject in the informants view was that it is mainly malicious and therefore embarrassing to speak about. Some conflicts between internal quality goals and customers’ needs were also identified. Conclusions. An ethnographic research methodology gives a rich picture. The analysis gives deeper understanding of the problem areas, but not necessary solutions. The author suggests that at the heart of the problem is a difference in world view. Software professionals generally tend to resolve [technical] problems using a reductionist approach, while these intricate challenges cannot easily be resolved by this approach. A more holistic systemic approach is required and while the software methodology is useful to structure the development it does not resolve these dysfunctions. They have to be resolved on another level. It was also found that further studies is required in particular to better understand Internal politics, the effect of Positive and Negative Incentives, the effect of software metrics on quality performance and subjectivity in customers’ perception and expectation.

  • 23.
    Hagos, Samuel
    Blekinge Institute of Technology, School of Computing.
    Assessment of Business Process Reengineering Implementation and Result within Ethiopian Ministry of Health and Gambella Regional Health Bureau Contexts2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    For many years, the tight bureaucratic and task centered approaches of civil service institutions of Ethiopia led to fragmentation, overlap and duplications of efforts than being responsive, flexible and customer focus. To this end, Business Process Reengineering (BPR) has been considered as a government sector technique to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational costs, become responsive, flexible and customer focus. BPR has great potential for increasing productivity through reduced process time and cost, improved quality, and greater customer satisfaction, but it often requires a fundamental organizational change. Despite the numerous advantages of BPR in terms of responsiveness, flexibility and customer focus, its implementation is perceived to be a difficult task and also many unsuccessful experiences have been reported in the literature. In fact, there are very few survey researches that attempt to highlight the kinds of activities that the organizations should pursue to ensure a reasonable transition to the new process; manage the human and technical issues surrounding implementation of the new process; and assess the results of its reengineering efforts. But these researchers saw the issues from private cooperative organizational perspectives and contexts. Besides, most of the discussions and findings were stretched up to showing that successful BPR implementations process are mainly associated with the organizations capability in managing changes. The researches paid no attention to other factors, like the issues of enabler, tools and techniques which can be utilized to build momentum. Hence, the present research investigated the factors associated with successful implementations of BPR projects in the contexts of public institutions. Based on a case study conducted in Ethiopian Ministry of Health and Gambella Regional Health Bureau; this research attempted to provide guidelines and best practices in public service providing institutions that will help them to achieve dramatic performance gains while implementing BPR projects. A cross sectional, qualitative and quantitative study was conducted taking 90 respondents and 20 interviewees as study subjects. Data were collected from June 1 to July 31 2010. A structured questionnaire was filled by 90 respondents where 43.3 % of them from Gambella Peoples’ National Regional State Health Bureau and 56.7% of them were from Ethiopian Federal Ministry of Health. The questionnaire was employed to collect data on change management and factors associated with the attainment of performance goals whereas in-depth interviews were utilized to substantiate the findings of questionnaire and investigate the use of information technology as enabler. The in-depth interviews included planners, core process owners and directors. Cross tabulation results imply that there is significant associations between attainment of performance goals and availability of written comprehensive plan for pilot test, refinement and implementation of change management plan, availability of communication strategy, placement of performance measures, motivation to take new roles and responsibilities, Use of information technology as enabler and pilot testing to evaluate new process. Hence, the findings of this research suggest that reengineering project implementation is complex, involving many factors. To succeed, it is essential that change be managed and that balanced attention be paid to all identified factors, including those that are more contextual (e.g., management support and technological competence), performance management, availability of comprehensive implementation plan, communication strategies, refinement and implementation of change management plan, use of pilot testing to evaluate new process, motivation to take new roles and responsibilities and usage information technology as enabler.

  • 24.
    Harengel, Peter
    Blekinge Institute of Technology, School of Computing.
    Three Tales of Dominant Technological Artifacts: Tracing the Paths from Success to Domination of Software Applications with the Help of Latour's Actor-Network-Theory and Bourdieu's Capital Theory2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Domination in the software application industry has been an issue since its early years. But how do these situations of market domination come into existence? This thesis discusses conventional approaches towards understanding market domination and their inherent weaknesses. As a result a new understanding, based on Actor-Network-Theory and Capital Theory unfolds, which achieves the uncovering of a much deeper complexity on how market domination comes into existence.

  • 25.
    Hartman, Kim
    Blekinge Institute of Technology, School of Computing.
    How do intrinsic and extrinsic motivation correlate with each other in open source software development?2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Open source is growing outside the boundaries of hackers, amateurs and software development, creating a humongous potential in many different areas and aspects of society. The intrinsic and extrinsic motivations that drives open source have been in the subject of much research recently, but how they affect each other when paid and unpaid contributors come together is still hidden in obscurity. In this study I investigate how intrinsic and extrinsic motivation correlates with each other and how those correlations affect paid and unpaid open source software contributors. The literature synthesis is based on of systematic reviews through searches in library databases, identification of articles by searching on the Internet and by reading relevant books. My results indicate that intrinsic and extrinsic motivations continuously affect each other and that paid contributors are more vulnerable since their extrinsic motivation in terms of money is reached only when many other motivations are fulfilled. The paid contributor’s lower autonomy may result in a decrease in intrinsic motivation while social interaction may result in an increase of the same. The unpaid contributors are more likely to be intrinsically motivated than the paid contributors, resulting in higher psychological satisfaction, less stress, creativity and input of higher work effort among unpaid contributors.

  • 26.
    Haxhixhemajli, Denis
    Blekinge Institute of Technology, School of Computing.
    Visibility Aspects Importance of User Interface Reception in Cloud Computing Applications with Increased Automation2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Visibility aspects of User Interfaces are important; they deal with the crucial phase of human-computer interaction. They allow users to perform and at the same time hide the complexity of the system. Acceptance of new systems depends on how visibility aspects of the User Interfaces are presented. Human eyes make the first contact with the appearance of any system by so it generates the very beginning of the human – application interaction. In this study it is enforced that visibility aspects are essential in application development. Furthermore, it is stressed that with practice of automation, habitual and functional visibility fades and users lose control. Users accept visibility loss only at certain points where it does not impact their skillset and understanding of an application. Although, they prefer control over visibility aspects and automation to strengthen the reception of the User Interface. The environments used in this study are Google Docs, Dropbox and cloudHQ with a case study of collaboration involving five users.

  • 27.
    Hossen, Md.Showket
    et al.
    Blekinge Institute of Technology, School of Computing.
    Islam, Md.Neharul
    Blekinge Institute of Technology, School of Computing.
    QoS Performance Evaluation of Video Conferencing over LTE2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Mobile data usage has been on the rise in relation to the streaming media such as video conferencing and online multimedia gaming. As a result, Long-Term Evolution (LTE) has earned a rapid rise in popularity during the past few years. The aim of this master’s thesis is to analyze the quality of service (QoS) performance and its effects when video is streamed over a GBR (Guaranteed bit rate) and non-GBR bearers over LTE. Using OPNET (Optimized Network Engineering Tool), the performance can be simulated having Downlink (DL) and Uplink (UL) scenarios for video conferencing including web traffic. Further we also measured the performance of packet End-to-End (E2E) delay, packet loss and packet delay variation (PDV). This thesis work is an empirical work, which can be followed up by further research propositions.

  • 28.
    Iqbal, Irfan
    et al.
    Blekinge Institute of Technology, School of Computing.
    Qadir, Bilal
    Blekinge Institute of Technology, School of Computing.
    Biometrics Technology: Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. Physical characteristics include fingerprints, palm or hand geometry, iris, retina, and facial characteristics. Behavioral characteristics include signature, keystroke and voice pattern. With the combination of biometric technology products and modern computer technology, it is easy to perform monitoring, management, systems integration, automated management, and security applications. Objective. The aim of this research is to explore and clarify the main influencing factors and attitudes concerning biometrics Security technology by analyzing expert opinions. This is done through informal interviews and a web based survey in Blekinge healthcare. Methods. Literature review was the starting phase to map the current state of research in biometric technology implementation. The literature review helped authors to explore and solve different ambiguities in authors’ minds, related to work flow, methods and procedures for different tasks. In our research, we selected five different interviewees from biometric solution supplier companies in Sweden and Denmark, Blekinge healthcare staff, biometric technology technical staff and IT security concerned to express their experiences, opinions and domain knowledge about the implementation of biometrics system in the county of Blekinge. Due to the resource and limited time constraint authors selected survey as a data collection procedure. In survey we planned a questionnaire with the different people related to healthcare. The questionnaire purpose was to collect the quantitative data and our questionnaire was relying on close ended questions. Results. It is analyzed that people have trust on biometrics system and in future they are agreed to face changing in the current system as well as the people who are related with healthcare system are already aware about biometrics and they will easily adopt the implementation of biometric system in healthcare. Conclusion. In concern of user acceptance it is analyzed that people have trust on biometrics system and in future they are agreed to face changing in the current system. In concern of implementation authors analyzed that it is very necessary to conduct a study in order to analyze the requirement of different actors that will participate in biometrics systems. In concern of cost Authors observed that for cost benefit advantage in the initial implementation stages the finger print technology could be a better selection as compared to other available biometric technologies. In concern of security there are strong reasons that biometrics could be implemented because there are many secure authentication devices related to biometrics are available in the market that could secure data in best possible way. Authors observed that there is a need of legislations for biometrics as the security measures going to be much higher as compared to the traditional password systems. In concern of privacy authors observed that the organizations are demanding strong authentication and focus on suggesting biometrics because it could provide advantages to patients, healthcare staff and healthcare providers.

  • 29.
    Kamara, Lamine
    Blekinge Institute of Technology, School of Computing.
    Challenges and Prospects of Establishing e- government in Liberia with focus on the Ministry of Finance, Ministry of Commerce and the Ministry of Planning and Economic Affairs of the Republic of Liberia.2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The use of ICT in government institutions of the Republic of Liberia has been around for decades though very few institutions implemented it most especially in the old fashion EDP- Electronic Data Processing systems where large departments were created for centralized data processing tasks. The Old fashion EDP proof very costly, less effective, difficult to manage which provides the basis of establishing a more effective, user friendly, collaborative oriented systems in the form of Electronic government. Though in most other government institutions there is less usage or appreciation of the roles ICT in government. Liberia, just emerging from a long 14 years of civil crisis which destroyed its entire human and technical infrastructure, lacks behind most of the African countries and the world at large in the wagon of implementing ICT and its related research With the continuous and ever important requirement for transparency and accountability in the public sector services, With ICT been a tool to assist efficiency and accountability in the public sector, the government of Liberia has embarked on the implementation of ICT projects in governance, though there is limited research work so far done in use of ICT in governance in Liberia. There has been very little known research in ICT or e-government with specific focus on Liberia, with one limited research done by UN in 2010. Though there are records of research on E-government of developing countries including Kenya, Ghana and post war Rwanda, etc. There are lessons learnt from these research works that will be of good input for the Liberia case as per similarities in challenges and obstacles of implementing e-government developing countries. This thesis research is in support of identifying obstacles, challenges, and benefits of transforming the public sector by introducing ICT. There are few known ICT projects in government including the Finance Ministry‘s IFMIS and ASYCUDA projects, the CSA Biometric systems which were evaluated, partly to ascertain government readiness for e-government. The investigation included some key government ministries. The research results using international approved methodologies identified the e-readiness level of the government of Liberia, with given challenges, obstacles and benefits. The findings of the research show that Liberia can successfully implement e-government if the identified obstacles are removed or minimized.

  • 30.
    Karlsson, Josef
    et al.
    Blekinge Institute of Technology, School of Computing.
    Lähdevirta, Jesper Erlandsson
    Blekinge Institute of Technology, School of Computing.
    Den Moderna Webben: Kan HTML5 konkurrera med traditionell programvara?2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Vi ser en förändring i hur vi använder applikationer. Från att tidigare varit associerat till en dator och begränsat till ett par operativsystem finns de numera överallt. Fler plattformar innebär att man måste utveckla en applikation till var och en av dessa. Detta gör att utvecklingstiden och kostnaderna ökar och efterfrågan av crossplattformlösningar i form av webbapplikationer har därför ökat. Vi tittar närmare på hur det går att använda sig av HTML5, och övriga tekniker som en modern webbläsare har integrerat stöd för, för att utveckla webbaserade applikationer. Vi tar reda på om det finns några hinder eller begränsningar i detta och om det finns några fördelar i att använda webben som plattform. Resultatet indikerar att med de nya tekniker som är på ingång kan man utveckla webbbaserade applikationer med prestanda motsvarande Java eller C#. Nya tekniker är ständigt på ingång. Genom att uppdatera kunskapen om dessa, tillför vi ny kunskap om hurvida HTML5, tillsammans med dessa nya tekniker kan utveckla webbaserade applikationer som är kraftfulla nog att börja ersätta plattformsspecifik programvara.

  • 31.
    Karlstedt, Johan M
    Blekinge Institute of Technology, School of Computing.
    An ISD study of Extreme Information Management challenges in IoT Systems - Case: The “OpenSenses”eHealth/Smarthome project2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Internet of Things (IoT) is an exciting new development and opportunity in the global ICT field. In short, IoT means that all objects will have their own IP address and be constantly online, connected to other similar actors. After this expansion Internet will not only be humans communicate with humans (H2H) more but machines will automatically communicate with machines (M2M) and humans (H2M) as well . The already today big amounts of data will become extreme as a result of this and it will require new and smarter ways of designing future ICT systems. Many more things needs to be taken into account for these demanding ICT development projects to fall out in productive ways. As of right now it does not seem to be clear to developers what all matters need to be looked at and in that order and why. Clear IoT systems design guidelines, templates and view-models are missing or they are at least not available to the mainstream designers. Objectives: In this study the objective is to investigate a) what views and concepts would need to be taken into account for developers to design better Information Systems for IoT type of setups and b) what kind of an ISD framework such design could result in. Methods: In this thesis a number of research methods have been used, such as: a) conducting a broad literature review on related IS concepts; b) analyzing how the found concepts tie togehter; c) compiling an ISD framework based on the concepts and 2) apply the ISD framework on a real eHealth case. Results: The result of the study was that there is a need for a new ISD framework for larger systems design based on a stakeholder centric viewpoint. This work puts forward an example of such an ISD framework. Conclusions: Designing and developing large Information Systems for IoT setups is a very demanding task and a logical/clear design frameworks will help in this matter. If nothing else, a predefined view-model will help in asking the right (kind) of questions and keeping the communication about the objectives on track and focused. eHealth is a field where IoT systems should be implemented but if it's not done in the correct way taking matters like stakeholders objectives and IPR's on both systems and data into account very little productive results will be achieved.

  • 32.
    Khoshniyat, Fahimeh
    et al.
    Linköpings universitet, SWE.
    Törnquist Krasemann, Johanna
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Analysis of strengths & weaknesses of a MILP model for revising railway traffic timetables2017In: OpenAccess Series in Informatics, Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing , 2017, Vol. 59, 131022Conference paper (Refereed)
    Abstract [en]

    A railway timetable is typically planned one year in advance, but may be revised several times prior to the time of operation in order to accommodate on-demand slot requests for inserting additional trains and network maintenance. Revising timetables is a computationally demanding task, given the many dependencies and details to consider. In this paper, we focus on the potential of using optimization-based scheduling approach for revising train timetables during short term planning, from one week to few hours before the actual operation. The approach relies on a MILP (Mixed Integer Linear Program) model which is solved by using the commercial solver Gurobi. In a previous experimental study, the MILP approach was used to revise a significant part of the annual timetable for a sub-network in Southern Sweden to insert additional trains and allocate time slots for urgent maintenance. The results showed that the proposed MILP approach in many cases generates feasible, good solutions rather fast. However, proving optimality was in several cases time-consuming, especially for larger problems. Thus, there is a need to investigate and develop strategies to improve the computational performance. In this paper, we present results from a study, where a number of valid inequalities has been selected and applied to the MILP model with the aim to reduce the computation time. The experimental evaluation of the selected valid inequalities showed that although they can provide a slight improvement with respect to computation time, they are also weakening the LP relaxation of the model.

  • 33.
    Kongyai, Budsadee
    et al.
    Blekinge Institute of Technology, School of Computing.
    Edi, Edi
    Blekinge Institute of Technology, School of Computing.
    Adaptation of Agile Practices: A Systematic Review and Survey2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Due to the uniqueness of software projects there is no single Agile development approach that ideally fits all project contexts. Each software project is unique, whether in its subject area, development team, or project size. Because of this, adapting Agile practices according to project circumstances is a must. There has been a number of literature published discussing Agile practices adaptation topic. However, it is still unclear how to adapt Agile practices. Therefore, researchers as well as practitioners need to find out the knowledge of how the Agile practices adaptation should be applied in software development project. Objectives. In this study we investigate how companies adapt their software development practices when they claim they use Agile software development. Knowledge about this can assist Agile software practitioners to apply Agile practices adaptation in their own context and obtain the most benefit out of Agile software development. Methods. We used systematic literature review using guidelines from Kitchenham and survey in this research study. In the systematic review, a number of relevant article sources were used including peer-reviewed papers and grey literature. Peer-reviewed papers were searched from several electronic databases. Grey literature was also included, which covered books, theses and dissertations, white papers and website/blog articles. The survey was executed using a web based survey tool which invited Agile practitioners from a broad range of industries. In total there are 79 selected literature reviewed in the systematic review comprising 63 peer-reviewed papers and 16 grey literature. Data extraction results were categorized into used and unused Agile practices, adapted practices, additional practices, importance of practices, adaptation challenges and solutions recommended by Agile practitioners. Furthermore, an online survey was conducted with a total of 700 respondents of which 468 responses completed the survey. Only the completed and valid responses were considered in the results analysis. We classify the survey results into several categories: Agile practices usage scale, importance of practices, details of adaptation, Agile practices instruction/guidelines, and Agile practitioners‟ adherence to the instruction/guidelines. Results. Our systematic review shows that some companies used Agile practices in literature with various degrees of adaptation. Several companies creatively used a hybrid of Agile practices from various Agile approaches. In addition, we found that most of the Agile practices, especially in the XP approach, have to be adapted appropriately according to company software development context. On the other hand, survey results show that most of the Scrum practitioners apply Scrum practices without adaptation. Regarding importance of practices, unit testing/Test-Driven Development and continuous integration are identified by XP practitioners as the most important practices. For Scrum practitioners, the most important practices are product/feature backlog and Sprint. Conclusions. Many reasons are discovered why adaptation of Agile practice is necessary e.g. to suit with software development context or for effectiveness reason. Therefore, better support from management and developers is needed to facilitate Agile practices adaptation. Different degrees of adaptation also depend on the type of implemented Agile approach. XP as a technical approach requires more adaptation when compared to project management approach such as Scrum. Findings regarding respondents‟ adherence to the Agile instruction/guidelines indicate the need to improve quality of Agile instructions/guidelines and Agile leadership and enforce the implementation of instructions/guidelines as well.

  • 34.
    Landström, Oscar
    et al.
    Blekinge Institute of Technology, School of Planning and Media Design.
    Odervall, Oskar
    Blekinge Institute of Technology, School of Planning and Media Design.
    Agil projektmetodik: En studie av den agila metodiken och Scrums inverkan på IT-projekt2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Denna undersökning syftar till att undersöka och utvärdera den agila projektmetodiken med inriktning på Scrum. Vattenfallsmetoden berörs även med avsikt att tjäna som kontrast till agil projektmetodik och Scrum. Att arbeta utefter en specifik projektmetod eller anamma ett agilt förhållningssätt kan bidra till att rätt produkt utvecklas och att undvika att projektet misslyckas. Undersökningen baseras på tre grundpelare; litteraturstudie, intervjuer och undersökning av befintliga studier. Dessa ligger till grund för de resultat som presenteras och diskuteras i uppsatsen med avsikt att kartlägga förekommande fenomen i projekt bedrivna efter en agil metod. I uppsatsen redogörs för och diskuteras resultatet av bedrivna intervjuer med personer i IT-branschen samt resultatet av befintliga studier utförda på bland annat Microsoft och Adobe Systems. Resultatet som redogörs i undersökningen pekar på tydliga fördelar med den agila projektmetodiken och Scrum, men även vilka nackdelar metodiken medför. Delar som diskuteras är bland annat den iterativa utvecklingens inverkan, kundinteraktionen i en agil process samt kravspecifikationen och planeringens roll.

  • 35.
    Lindberg, Susanne
    Blekinge Institute of Technology, School of Computing.
    Involving Children in the Design of Online Peer Support for Children with Cancer2013Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Information Technology (IT) in health services has become increasingly important for people's wellbeing. The nature of design of these technologies is complex – even more so when the context is of a sensitive nature, such as the user's health. Furthermore, when the users are children, several additional difficulties surface. Apart from the design context being sensitive, children have cognitive and communicational limitations that make any design method employed require adaptations. This thesis is conducted within the research project Child Health Interactive Peer Support (CHIPS) at Halmstad University. The project aims at developing Online Peer Support (OPS) for advancing the wellbeing of children who have or have had cancer. The project thus presents a unique design situation, and the aim of this thesis is to answer the question: How can children participate in the design of Online Peer Support for children with cancer? In order to answer this question, a literature review was performed to identify common properties of design methods with children, children were involved in the design of OPS for children with cancer, and the lessons learned from the empirical case were discussed. The properties of design methods with children were organised into three categories and later supplemented with properties of methods for performing research in a sensitive context. The empirical material was made up of six design workshops with two groups of children who were, or had previously been treated for cancer. From the design workshops and the subsequent discussions several lessons were learned, in addition to the result from the literature review, about how children can be involved in the design of OPS for children with cancer. Based on this, seven suggestions were made for adapting methods to suit design with children in a sensitive context.

  • 36.
    Lindqvist, Monika Adamson
    Blekinge Institute of Technology, School of Computing.
    BeAKKta: ett kommunikationshjälpmedel som möter behoven av djupare kommunikation hos personer med autism2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Personer med autism är en utsatt grupp i samhället – en grupp som tycks öka främst på grund av genetiska faktorer men också på grund av miljöfaktorer. Den medicinska forskningen intensifieras både i USA och i Europa. Det största problemet för dessa funktionshindrade handlar om en oförmåga att kommunicera, såväl verbalt som socialt. Parallellt utvecklas kommunikationstekniken starkt, en teknik som skulle kunna hjälpa dessa personer avsevärt om bara det fanns en anpassning till deras behov. Det finns ju visserligen redan tekniska kommunikationshjälpmedel utvecklade för personer med autism. Det är bara det att dessa fortfarande inte passar målgruppens behov av kommunikation särskilt väl. Hjälpmedlen är konstruerade att hantera en mer ytlig kommunikation, det vill säga en kommunikationsform som personer med autism inte använder, än mindre förstår sig på. De vill ofta istället ha en djupare relation som kan stötta dem i viktigare frågor. Det kan till exempel handla om att reda ut huruvida det finns ett ”inuti” och ett ”bortom”; att det finns många hus bortom dem som man kan se närmast. Att se stora sammanhang är nästintill obegripligt för dem. Här behövs verklig hjälp och stöttningen bör förmedlas av en nära vän. Den omfattande kontaktlista som nuvarande kommunikationshjälpmedel tillhandahåller, står alltså inte högt i kurs. I mitt magisterarbete tittar jag framför allt på de centrala behoven bakom kommunikationen hos personer med autism. Men jag presenterar också ett designförslag i form av några enklare skisser med utgångspunkt i just dessa behov. Anledningen till att fokus ligger på analysskedet är att flertalet hittillsvarande tekniska kommunikationshjälpmedel aldrig tycks ha ifrågasatt grunden till de beslut som formar designen det vill säga behoven hos de funktionshindrade personerna. Alltför ofta tas fel designbeslut på grund av en grundlös analys. Flera funktioner sammanfogas här inom ett och samma hjälpmedel som kan stödja de funktionshindrade att tala, tänka klarare tankar, att reflektera, formulera sin åsikt och att drömma. Jag vill att de ska nå djupare tankar än vad som hittills varit möjligt. Funktionerna är identifierade men finns inte inom ett och samma hjälpmedel. Sju funktioner sammanfogas inom ett och samma hjälpmedel: ”Betonad överföring”, ”överblickbarhet”, ”struktur à la Talking Mats”, ”bildhantering”, ”digitalkamera”, ”reellt möte” samt ”närstående som viktiga förebilder”. Båda parter bör befinna sig geografiskt nära varandra och båda måste ha med sig sin egen ”BeAKKta”. Jag identifierar kommunikationsbehoven hos personer med autism och ger förslag på hur behoven skulle kunna mötas genom analys och skisser. Resultatet blir en ny design som sammanför tidigare förvisso identifierade funktioner, varav dock fåtalet utvecklats med tanke på den digitala tekniken. Lovisa, min dotter och hennes brist på kommunikationsförmåga, är upprinnelsen till mitt försök och det är också hon som givit mig både insikter och inspiration.

  • 37.
    Lumor, Truth
    Blekinge Institute of Technology, School of Management.
    IT Process and Governance Framework Adoption in Ghanaian Firms; Extent of Progress and Influencing Factors2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Gradually, the physical and geographically restricted marketplace is eroding and giving room to a more vibrant and competitive virtual marketplace – J.F Rayport and J.J Sviokla referred to it as the ―marketspace‖ (J.F. Payport, 1995). Technological advancement is the causative agent of this rapid change. As customers become increasingly complex and find sustained satisfaction in the marketspace, pressure keeps mounting on enterprises to adjust and seek suitable dance to the new rhythm. More prepared enterprises like e-bay and FEDEX have taken advantage of this rapid change to emerge competitive in the marketspace whist others dawdle behind. Enterprises especially in developing economies like Ghana, are increasingly investing enterprise resources in IT infrastructure, and accompanying applications and services to take advantage of the new marketplace and emerge competitive nationally and perhaps, in the process, gain global competitiveness. Are firms having strategic frameworks that guide these investments? And what are the factors that influence the adoption of these frameworks? Are there enabling national and firm level mechanisms to support IT investments? These are the questions that the research seeks to respond to. The research discovered Ghana’s strategic initiatives aimed at providing enabling infrastructure, regulatory and business environment to support the adoption of ICTs into public and civil service, and to also promote the performance and competitiveness of its industries and firms. At firm level, the research investigated the factors that influence the adaptation and effective implementation of IT Governance frameworks in enterprises. The research found education, external business environment, and extent of IT investment, statistically significant in driving IT process and governance framework adoption. It was therefore, recommended that regulatory institutions, educational institutions, market players and managers of firms contribute to the enhancement of these predictor variables to further improve ICT, IT process and IT governance framework adoption in Ghana. It was also recommended that later research should be undertaken to re-evaluate the performance and progress made by Ghanaian firms, and to possibly discover other drivers of ICT, ITprocess and IT governance framework adoption.

  • 38.
    Majoka, Muhammad Asif
    et al.
    Blekinge Institute of Technology, School of Computing.
    Tahir, Naveed
    Blekinge Institute of Technology, School of Computing.
    NFC Enabled Smartphone Application For Instant Cognitive Support2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Abstract Context: Advancement in mobile technology is truth of this Century. Mobile phone is used mainly for calling and Short Message Service, but Smartphone are advanced form of mobile phone which have multiple features. Smartphone can have Global Positioning System, Wi-Fi, Bluetooth and Near Field Communication like features. These Smartphone devices are designed considering general public and can be difficult to use by people with limited cognition. But proper use of Smartphone features while developing applications to support people with cognitive disabilities is vital. The interfaces and structure of information can have impact on the success of application. Although, some special systems exist to support these people but they create a distinction among functional and non-functional population. Smartphone with Near Field Communication (NFC) technology feature was considered in this research work as a cognitive support for independence in their daily life activities. Objectives: The objectives were the Identification of issues to be considered while providing cognitive support through technology for cognitive disabled persons. And if technology used to support them is Smartphone then to investigate the appropriate structure of information to be displayed on screen to make them able to perform their activities by following instruction provided by application. To know how NFC Smartphone feature can be helpful to start an application designed to provide cognitive support i.e. providing them information of weather and suggesting appropriate clothes to wear. Methods: The systematic literature review was conducted to find the issues which should be considered while supporting cognitive disabled. The survey was used to identify the needs, abilities and disabilities of cognitive disabled persons. Interviews with higher administration involved in support facilities to the cognitive disabled were conducted to get in-depth knowledge from their experience which can be helpful for developing the application. The Participatory design workshop was conducted by involving stakeholders. Appropriate structure of information for weather and clothes scenario was decided. The NFC enabled Smartphone application was implemented and tested in real environment. For validation focus group interviews were conducted. Conclusions: The NFC enabled Smartphone application to assist in deciding clothes to be worn according to outside weather condition was evaluated in real environment. The results of user testing and focus group interviews indicate that Smartphone application through NFC feature can support people with cognitive disabilities. Furthermore, for validation purpose ethnographic methods can be used for validation of proposed NFC enabled Smartphone application.

  • 39.
    Makhdum, Farah
    et al.
    Blekinge Institute of Technology, School of Computing.
    Mian, Kamran
    Blekinge Institute of Technology, School of Computing.
    Smarter City: A System to Systems2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Developments in the technological fields have opened doors to sustain quality of life for making cities smarter and democratic by allowing citizens to play active roles rather being just passive participants along with their governments. Therefore, in this study we have proposed an idealized interaction system- a process used for organizational development based on Interactive Planning Approach, where citizen and government adopt more effective and efficient ways to coordinate, collaborate and communicate for the development and growth of different systems in the city, which ultimately serves as “system to systems”. By using Delphi methodology- a reaserch approach by Norman Dalkey (1946), we invited 25 people representing a wide variety of interests participated in the series two rounds of surveys to suggest more effective and efficient methods of interaction for the citizens and government. All proposed ways after second round of survey are used to design the Idealized Smarter City model – a model of knowledge-based sustainable development. However, structural and behavioral comparisons suggest the need of further improvement to get the proposed system implemented, in review of rapidly increasing population and resulting deteriorating resource availability to sustain the social and technological needs.

  • 40.
    Mandhapati, Venkata Srikanth
    et al.
    Blekinge Institute of Technology, School of Computing.
    Bajwa, Kamran Ali
    Blekinge Institute of Technology, School of Computing.
    Evaluation of Idempotency & Block Size of Data on the Performance of Normalized Compression Distance Algorithm2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Normalized compression distance (NCD) is a similarity distance metric algorithm which is used for the purpose of analyzing the type of file fragments. The performance of NCD depends upon underlying compression algorithm to be used. We have studied three compressors bzip2, gzip and ppmd, the compression ratio of ppmd is better than bzip2 and the compression ratio of bzip2 is better than gzip, but which one out of these three is better than one another in the viewpoint of idempotency is evaluated by us. Then we have applied NCD along with k nearest neighbour as a classification algorithm to a randomly selected public corpus data with different block sizes (512 byte, 1024 bytes, 1536 bytes, 2048 bytes). The performance of two compressors bzip2 and gzip is also compared for the NCD algorithm in the perspective of idempotency. Objectives: In this study we have investigated the In this study we have investigated the combine effect of both of the parameters namely compression ratio versus idempotency and varying block size of data on the performance of NCD. The objective is to figure out that in order to have a better performance of NCD either a compressor for NCD should be selected on the basis of better compression ratio of compressors or better idempotency of compressors. The whole purpose of using different block sizes was to evaluate either the performance of NCD will improve or not by varying the block size of data to be used for making the datasets. Methods: Experiments are performed to test the hypotheses and evaluate the effect of compression ratio versus idempotency and block size of data on the performance of NCD. Results: The results obtained after the analysis of null hypotheses of main experiment are retained, which showed that there is no statistically significant difference on the performance of NCD when varying block size of data is used and also there is no statistically significant difference on the NCD’s performance when a compressor is selected for NCD on the basis of better compression ratio or better idempotency. Conclusions: As the results obtained from the experiments are unable to reject the null hypotheses of main experiment so no conclusion could be drawn of the effect of the independent variables on the dependent variable i.e. there is no statistically significant effect of compression ratio versus idempotency and varying block size of data on performance of the NCD.

  • 41.
    Maric, Borislav
    Blekinge Institute of Technology, School of Computing.
    Enhanced Four Paradigms of Information Systems Development in Network Societies2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The main aim of this research is to relate the theory of ISD discussed in Hirschheim’s and Klein’s article ”Four Paradigms of Information Systems Development” (ISD) to Churchman’s theory of ISD discussed in his book ”The Design of Inquiring Systems”. It has been important to relate those two assumptions of ISD in order to enhance both of them and to get a more explicit understanding of ISD. The main hypothesis in this research has been that it is possible to relate them to each other and to clarify and enhance them since they are both based on philosophical assumptions of knowledge generation i.e. epistemology. Epistemological and ontological aspects of knowledge generation and nature of societies are very important for understanding of IS since knowledge transfer is more and more common because of ICT development. The synthesis of those two well-known approaches to ISD is the main contribution of this research master thesis. The other contributions are the solution for double-loop learning through multi-agent system development and the solution for developing sustainable network societies through peer-to-peer networking combined with centralised networking functioning as a library. I also have given an explicit explanation of the differences between monism (holism) and pluralism, in this case regarding to Leibniz’s and Locke’s philosophical views. Singerian epistemology has been generated from his explanation of insufficiency of either rationalist or interpretative approaches for explanation of natural laws and this is also one of my contributions in this research. I also recommended a complementary use of the rationalist, empirical and interpretative research methodologies for research in theoretical, experimental, applied and social science fields. It has been also examined which methodologies are predominating at universities offering degrees in social informatics and it has appeared that on the most of universities offering degree in social informatics, proper research methodologies for studying societies are used what had been expected.

  • 42.
    Markov, Georgi
    et al.
    Blekinge Institute of Technology, School of Computing.
    Druzhinina, Olga
    Blekinge Institute of Technology, School of Computing.
    Towards an industrial ALM (Application Lifecycle) Tool Integration2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Application Lifecycle Management refers to the coordination of all aspects of software engineering, through a collection of integrated software development tools. More and more organizations are heavily relying on the ALM tools nowadays. Objectives. In this study we research ALM first as a business strategy, its roots, its advantages and disadvantages. As well as making a theoretical research, we seek out the setbacks of the practical side of ALM in order to find the areas needed for improvement, by investigating the ALM’s existing tools, interviewing ALM’s users, and using gained statistical data to derive practical facts about ALM. The goal of the thesis is to find out how ALM can be improved. Methods. The vast amount of sources, including articles, books, and journals is used to support our arguments and conclusions. A long online survey was carried with many participants to understand the practical side of ALM, as well as gain access to information about ALM’s setbacks. Results. The problems of ALM are recognized and named. Proposals are made in respect of how to deal with these problems. A list of what options need to be studied in the future, in order to improve the overall ALM design, and make it a powerful tool, is presented. A detailed plan for further research regarding this highly important issue is presented. Conclusions. We conclude that there are several ALM tool options on the market, all having their strengths and weaknesses. But in order for ALM to become an industrial solution and to be truly successful and effective in supporting the broader goals of the different organizations using it, the requests of the stakeholders towards deeper semantic integration between the various tool involved in the ALM processes need to be embodied in the current ALM offerings. We conclude that further research is needed in order to assess the proposals, and test the design ideas that are presented in the last chapter of this thesis.

  • 43.
    Martin, Eva Garcia
    Blekinge Institute of Technology, School of Computing.
    Hashtags and Followers: An experimental study of the online social network Twitter2013Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Context. Social media marketing is constantly gaining interest as a powerful tool, for advertisement campaigns, in order to maximize their audience to reach potential new customers. To efficiently target customers, the knowledge of social network structure and user behavior is of crucial importance. Among these online social networks, Twitter’s popularity is rapidly increasing. Its key feature is to link different topics and posts by using the hashtag symbol. This particular characteristic is one of the principal causes that direct users to specific topics, and lead them to expand their network. Objectives. In this study we investigate a correlation between hashtags and increase of followers motivated by a specific research question. The question is whether the addition of hashtags to tweets produces new followers. Methods. We designed a controlled experiment in which we gather tweets from two types of users: users tweeting with hashtags and users tweeting without hashtags. Users tweeting with hashtags will belong to the experimental group and users tweeting without hashtags will form part of the control group. Their statistical behavior is analyzed by conducting the non-parametrical Mann-Whitney U-test. Results. The results of the Mann-Whitney U-Test show that the null hypothesis is rejected at confidence level 0.05. Based on that, a correlation is shown between hashtags and followers, therefore tweets that contain hashtags are more likely to lead to a higher increase in the number of followers than tweets without hashtags. Conclusions. This thesis contributes to describe the functionality of hahstags in the online social network Twitter. It provides an original correlational study on the use of hashtags and increase of followers. We discover that users tweeting with hashtags are more likely to increase their number of followers than users that tweet without hashtags. This discovery opens a new research direction regarding hashtags and followers, specifically to discover which hashtags increase the number of followers and which do not.

  • 44.
    Mbiydzenyuy, Gideon
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Persson, Jan A.
    Davidsson, Paul
    Exploring synergy relationships between telematic services and functionalities using cluster analysis2015In: IET Intelligent Transport Systems, ISSN 1751-956X, E-ISSN 1751-9578, Vol. 9, no 4, 366-374 p.Article in journal (Refereed)
    Abstract [en]

    A method for assessing potential synergies among different sets of transport telematic services (TTSs) is suggested. An Intelligent Transport System enhances transport by delivering one or more TTSs. The ability to deliver multiple TTSs to address a wide range of stakeholder needs is gaining momentum, not only from a marketing perspective but also from a technological perspective. The total cost of TTSs can be reduced if they share functionalities (i.e., sub-services provided by telematic systems). We show how this synergy can be assessed with the help of clustering methods. Knowledge about possible synergies of functionalities is useful in the (re)design and eventual deployment of TTSs, especially when the underlying telematic systems are able to support multiple TTSs. To adapt the clustering method for this purpose, we suggest a mathematical formulation of synergy among functionalities of TTSs. By applying the method to a set of 32 TTSs, we obtain a cluster formation of these TTSs according to their synergy measures. Overall, the results suggest that the joint implementation of TTSs targeted toward some problem domains can lead to significant cost savings, for example, Road User Charging, Infrastructure Repair and Maintenance, and Information on the Transport of extra large goods for the management of road transport infrastructure. © The Institution of Engineering and Technology 2015.

  • 45.
    Meresa, Raya
    et al.
    Blekinge Institute of Technology, School of Computing.
    Sabore, Yeshiwondem
    Blekinge Institute of Technology, School of Computing.
    Study the Effect of FEC on Video Streaming over the Networks2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Video streaming over best-effort networks is complicated by a number of factors including unknown and time-varying bandwidth, transmission delay, and high packet losses. Excessive packet loss can causes significant degradation in quality of video perceived by users of real-time video applications. Recent studies suggest that error control schemes using Forward Error Correction (FEC) is a good candidate for decreasing the negative impact of packet loss on video quality. With FEC scheme, redundant information is transmitted along with the original information so that the lost original video data can be recovered at least in part from the redundant information. Although sending additional redundancy increases the probability of recovering lost packets, it also increases the bandwidth requirements which in turn increase loss rate of the video stream due to congestion. For this reason FEC is characterized as effective when the redundancy is sufficient to recover the lost data, ineffective when the redundancy is little to recover the lost data and inefficient when the redundancy is high for the lost data. To provide best performance for the streaming application and the network, it is important to determine, in real time, the proper amount of redundant information according to the loss behavior of the network. However it not clears how to choose optimal redundancy given the constraints mentioned above at any given point in time. Objective: This thesis investigated the limitations of existing static FEC schemes and suggested alternative approaches that can achieve effectiveness through sending the appropriate amount of FEC redundancy in real-time. Three dynamic redundancy adaptation control systems On-Off, Proportional, Proportional-Integral have been design and implemented based on existing conventional FEC mechanisms. Moreover the performance evaluation of each mechanism is performed on simulated environment. Method: A performance evaluation methodology using network simulation and key evaluation criteria to test the mechanisms under different network conditions and the scenarios for each different network are considered. The proposed mechanisms were implemented in a simulation environment by using NS2. After the implementation and validation of the techniques, several simulation experiments have been conducted to study the performance of each redundancy adjustment schemes. Results: The result of the simulation experiments and performance analysis showed that both Proportional and Proportional-Integral (PI) redundancy controller based on Adaptive Forward Error Correction (AFEC) mechanisms significantly reduce the number of discarded video blocks as compared with the On-Off based scheme. On the other hand On-Off based AFEC mechanisms added small number of excess redundancy. The amount of excess redundancy added by the Proportional and PI controllers significantly increases as the packet drop rate of the transmission channel increases. Conclusion: Based on the findings of this study, using the PI adaptation based AFEC mechanisms is potentially viable option for enhancing the performance of video streaming applications over the network.

  • 46.
    Mullapudi, Mahesh
    et al.
    Blekinge Institute of Technology, School of Computing.
    Tadiparthi, Hari Praveen
    Blekinge Institute of Technology, School of Computing.
    Empirically Designed Framework for Junior Software Product Managers2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Software Product Management (SPM) is an activity done by software product managers to develop products from the very first idea till the product is release to the market and providing service to customers. SPM helps software product managers to successfully maintain their product throughout product lifecycle till it is disposed of from the market. In this thesis we have studied about SPM both from the state of knowledge and state of practice to understand the different activities being followed by software product managers and concepts in those activities. Objectives. The study identifies the practices followed in SPM, both from the literature and industrial practitioners. The study also unravels the order in which they implement SPM activities. We have focused on what activities need to be focused by junior software product manager when implementing SPM and based on the inputs from software practitioners a preliminary framework was designed. Methods. Literature review was conducted to identify what are the different practices in SPM. To cover the literature related to SPM different international databases like Compendex, Inspec, IEEE Xplore, ACM Digital Library, Wiley Inter Science, Scopus, Science Direct, and Business Source Premier are selected. Articles from databases are selected between the years 1995-2011. Text books related to SPM, conference proceedings and grey literature are also used. Interviews and Survey are conducted with practitioners to identify how SPM is being implemented in organizations. We have also focused on what activities need to be implemented in SPM by junior software product managers after they take up their job. Results. Totally 133 different practices are identified related to SPM and are grouped in to their respective activities. Based on the findings a preliminary framework was designed for junior software product managers where they need to implement 22 concepts and these concepts are grouped into their respective activities which are Requirements Management, Release Planning, Product Planning, Product Roadmapping and Marketing. Conclusions. We conclude that the SPM frameworks identified through literature relate to each other and use similar activities. We also conclude that the frameworks identified from literature cover almost all of the activities implemented by software product managers during SPM when empirical research was conducted. The frameworks identified from literature don’t give a clear picture about what activities need to be focused by junior software product managers when implementing SPM. To overcome this, a preliminary framework was designed for junior software product managers based on the empirical evidence identified from interviews and survey. Moreover we conclude that a curriculum needs to be designed for SPM which clearly teaches junior software product managers regarding the activities and concepts involved in SPM and focusing more on the activities which need to be implemented by junior software product managers.

  • 47.
    Munir, Sameer
    et al.
    Univ Faisalabad, Sch Elect Engn, Faisalabad, Pakistan..
    Khan, Faraz
    Univ Faisalabad, Sch Elect Engn, Faisalabad, Pakistan..
    Riaz, Muhammad Atif
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    An Instance Based Schema Matching Between Opaque Database Schemas2014In: 2014 4TH INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND TECHNOPRENEURSHIP (ICE2T), IEEE Computer Society, 2014, 177-182 p.Conference paper (Refereed)
    Abstract [en]

    Schema matching is always needed amoung schemas of relational datasets in database integration applications. Heterogeneous database integration involves a significant role of schema matching Most of the previous solution to schema matching problem based on the identification of similarity between the columns names or by recognizing common domains in the data stored in the schemas. These approaches are not applicable on those datasets with unaligned schemas where the name of the columns in the schemas and the data in the columns are opaque. In this paper we proposed an instance based approach to find the matching between the schemas of heterogeneous datasets that share a common primary keys but it is unknown which columns are primary keys. The proposed approach consists of two main phases Row Similarity and Attribute Similarity. In the row similarity phase proposed approach determines all the pairs of rows among datasets that are representing same real world entity based on the same primary keys values. In attribute similarity phase, by comparing the data values within those similar pairs of rows our approach able to find the corresponding attributes. Different experiments are performed to validate proposed approach by using real world datasets. The results demonstrated the viability of the proposed approach.

  • 48.
    Natraj, Shailendra
    Blekinge Institute of Technology, School of Computing.
    An Empirical Evaluation & Comparison of Effectiveness & Efficiency of Fault Detection Testing Techniques2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: The thesis is the analysis work of the replication of software experiment conducted by Natalia and Sira at Technical University of Madrid, SPAIN. The empirical study was conducted for the verification and validation of experimental data, and to evaluate the effectiveness and efficiency of the testing techniques. The analysis blocks, considered for the analysis were observable fault, failure visibility and observed faults. The statistical data analysis involved the ANOVA and Classification package of SPSS. Objective: To evaluate and compare the result obtained from the statistical data analysis. To establish the verification and validation of effectiveness and efficiency of testing techniques by using ANOVA and Classification tree analysis for percentage subject, percentage defect-subject and values (Yes / No) for each of the blocks. RQ1: Empirical evaluation of effectiveness of fault detection testing technique, using data analysis (ANOVA and Classification tree package). For the blocks (observable fault, failure visibility and observed faults) using ANOVA and Classification tree. RQ2: Empirical evaluation of efficiency of fault detection technique, based on time and number of test cases using ANOVA. RQ3: Comparison and inference of the obtained results for both effectiveness and efficiency. Method:The research will be focused on the statistical data analysis to empirically evaluate the effectiveness and efficiency of the fault detection technique for the experimental data collected at UPM (Technical university of Madrid, SPAIN). Empirical Strategy Used: Software Experiment. Results: Based on the planned research work. The analysis result obtained for the observable fault types were standardized (Ch5). Within the observable fault block, both the techniques, functional and structural were equally effective. In the failure visibility block, the results were partially standardized. The program types nametbl and ntree were equally effective in fault detection than cmdline. The result for observed fault block was partially standardized and diverse. The list for significant factors in this blocks were program types, fault types and techniques. In the efficiency block, the subject took less time in isolating the fault in the program type cmdline. Also the efficiency in fault detection was seen in cmdline with the help of generated test cases. Conclusion:This research will help the practitioners in the industry and academic in understanding the factors influencing the effectiveness and efficiency of testing techniques.This work also presents a comprehensive analysis and comparison of results of the blocks observable fault, failure visibility and observed faults. We discuss the factors influencing the efficiency of the fault detection techniques.

  • 49.
    Nilsson, Daniel
    et al.
    Blekinge Institute of Technology, School of Computing.
    Åberg, Hampus
    Blekinge Institute of Technology, School of Computing.
    HTML5 Web application security with OWASP2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    HTML5 has gained a lot of interest the last couple of years from web developers. HTML5 is the new upcoming standard for HTML set to be released in the end of 2014 (W3C). In this report HTML5 is reviewed in order to determine if it has made web applications more secure. This is done with information study and the use of experimental test cases. We use the latest OWASP top ten list of security risks in web applications as a benchmark. As a result we found ve correlations between OWASP top ten list and HTML5 functionality. The results clearly indicates that HTML5 is a ecting web application security. The security risks that was successfully exploited is Cross-site scripting, Security Miscon guration, Sensitive Data Exposure, Cross-site request forgery and Unvalidated redirects and forwards. We suggest countermeasures for the tests performed and discuss how developers should have security in mind when it comes to developing with HTML5.

  • 50.
    Norling, Sebastian
    Blekinge Institute of Technology, School of Computing.
    En säkerhetsgranskning av Secure Application Framework2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Företaget Wireless Independent Provider (WIP) har tagit fram ett säkerhetsramverk vid namn Secure Application Framework (SAF) som är ett väldokumenterat ramverk för att skapa säkra interna företagsappar. Syftet med detta ramverk är att lösa problematiken kring Bring Your Own Device (BYOD) – hur man ska skilja på privat data och företagets data i enheten. Med ett sådant system så finns det mycket att tänka på rörande säkerheten. Genom att identifiera ett antal olika hot och genomföra en riskanalys på dessa kommer man fram till att systemet är skyddat mot majoriteten av hoten, det finns dock förslag till förbättringar på enstaka delar av systemet. Det genomförs även prestandatester och undersökning av lavineffekten för ett antal olika symmetriska krypteringsalgoritmer i syfte att fastslå om den använda algoritmen i systemet har fördelar jämfört med andra moderna krypteringsalgoritmer. Utifrån resultaten som tagits fram i detta arbete så konstateras det att skyddet mot de identifierade hoten är mycket bra samt att det inte finns någonting som skulle motivera ett byte av den symmetriska krypteringsalgoritmen.

12 1 - 50 of 74
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf