Change search
Refine search result
123 1 - 50 of 109
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abrahão, Silvia
    et al.
    Universitat Politècnica de València, ESP.
    Mendez, Daniel
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Message from the Artifact Evaluation Chairs of ICSE 20212021In: Proceedings - International Conference on Software Engineering, IEEE Computer Society , 2021Conference paper (Other academic)
  • 2.
    Adolfsson, Elin
    Blekinge Institute of Technology, School of Computing.
    Sociala medier för att hantera kundkontakter2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    KONTEXT. I takt med att Internets framväxt och fler och fler människor ansluter sig till sociala medieplattformar som Facebook, uppkommer nya sätt att interagera och kommunicera mellan varandra. Samtidigt ökar antalet organisationer och företag, som i sin tur måste hitta nya vägar för att deras marknadsföring ska sticka ut och bli uppfattad. För att nå ut till målgruppen med budskap, måste organisationen vara där målgruppen är. Därför har Facebook blivit en ny del av företags marknadsföringsredskap. Denna studie är fokuserad på Malmö stadsbiblioteks användning av Facebook som ett kommunikationsverktyg i hanteringen av kundkontakter. MÅL. Syftet med denna magisteruppsats är att undersöka Malmö stadsbiblioteks användning av Facebook, med ett huvudsakligt fokus på undperception och kundens upplevelse av kommunikationen, för att utreda hur Malmö stadsbibliotek bör använda Facebook i marknadsföringssyfte. METOD. Denna studie är baserad på en empirisk undersökning innehållandes en innehållsanalys av Malmö stadsbiblioteks Facebooksida, och också en onlineenkät gjord på de som ”gillar” och följer Facebooksidan. RESULTAT. Resultatet av den empiriska studien visar att Malmö stadsbibliotek står inför en bred målgrupp där segmentering är nödvändigt för att skapa och sprida rätt budskap till den primära målgruppen. Malmö stadsbibliotek publicerar statusuppdateringar relativt jämnt fördelat på månadens dagar och det är möjligt att peka ut olika kategorier av uppdateringar med olika målgruppsresponser och upplevelser från följarna. Resultatet av studien presenteras som diagram och tabeller med beskrivningar för att förbättra illustrationen och därför öka förståelsen. SLUTSATS. Slutsatsen av denna magisteruppsats är att de flesta respondenterna är positiva inför Malmö stadsbiblioteks användning av Facebook. Baserat på diverse befintliga teorier är marknadsföring på sociala nätverk ett bra sätt att interagera, kommunicera och få feedback från kunder för att kunna bygga goda relationer med kunderna. Detta är någonting som är väldigt viktigt i nuläget när antalet företag och reklambruset är så högt som det är. Det finns ingen enkel väg till framgång, med enbart en korrekt väg. Det är beroende av varje specifik organisation och deras specifika primärmålgrupp.

    Download full text (pdf)
    FULLTEXT01
  • 3.
    Ahmad, Al Ghaith
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Abd ULRAHMAN, Ibrahim
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market: Evaluating the Effectiveness of a Language Model2023Independent thesis Basic level (degree of Bachelor), 12 credits / 18 HE creditsStudent thesis
    Abstract [en]

    Background: As the demand for cybersecurity professionals continues to rise, it is crucial to identify the key skills necessary to thrive in this field. This research project sheds light on the cybersecurity skills landscape by analyzing the recommendations provided by the European Cybersecurity Skills Framework (ECSF), examining the most required skills in the Swedish job market, and investigating the common skills identified through the findings. The project utilizes the large language model, ChatGPT, to classify common cybersecurity skills and evaluate its accuracy compared to human classification.

    Objective: The primary objective of this research is to examine the alignment between the European Cybersecurity Skills Framework (ECSF) and the specific skill demands of the Swedish cybersecurity job market. This study aims to identify common skills and evaluate the effectiveness of a Language Model (ChatGPT) in categorizing jobs based on ECSF profiles. Additionally, it seeks to provide valuable insights for educational institutions and policymakers aiming to enhance workforce development in the cybersecurity sector.

    Methods: The research begins with a review of the European Cybersecurity Skills Framework (ECSF) to understand its recommendations and methodology for defining cybersecurity skills as well as delineating the cybersecurity profiles along with their corresponding key cybersecurity skills as outlined by ECSF. Subsequently, a Python-based web crawler, implemented to gather data on cybersecurity job announcements from the Swedish Employment Agency's website. This data is analyzed to identify the most frequently required cybersecurity skills sought by employers in Sweden. The Language Model (ChatGPT) is utilized to classify these positions according to ECSF profiles. Concurrently, two human agents manually categorize jobs to serve as a benchmark for evaluating the accuracy of the Language Model. This allows for a comprehensive assessment of its performance.

    Results: The study thoroughly reviews and cites the recommended skills outlined by the ECSF, offering a comprehensive European perspective on key cybersecurity skills (Tables 4 and 5). Additionally, it identifies the most in-demand skills in the Swedish job market, as illustrated in Figure 6. The research reveals the matching between ECSF-prescribed skills in different profiles and those sought after in the Swedish cybersecurity market. The skills of the profiles 'Cybersecurity Implementer' and 'Cybersecurity Architect' emerge as particularly critical, representing over 58% of the market demand. This research further highlights shared skills across various profiles (Table 7).

    Conclusion: This study highlights the matching between the European Cybersecurity Skills Framework (ECSF) recommendations and the evolving demands of the Swedish cybersecurity job market. Through a review of ECSF-prescribed skills and a thorough examination of the Swedish job landscape, this research identifies crucial areas of alignment. Significantly, the skills associated with 'Cybersecurity Implementer' and 'Cybersecurity Architect' profiles emerge as central, collectively constituting over 58% of market demand. This emphasizes the urgent need for educational programs to adapt and harmonize with industry requisites. Moreover, the study advances our understanding of the Language Model's effectiveness in job categorization. The findings hold significant implications for workforce development strategies and educational policies within the cybersecurity domain, underscoring the pivotal role of informed skills development in meeting the evolving needs of the cybersecurity workforce.

    Download full text (pdf)
    Matching ESCF Prescribed Cyber Security Skills with the Swedish Job Market: Evaluating the Effectiveness of a Language Model
  • 4.
    Ahmet, Zeynep
    Blekinge Institute of Technology, School of Computing.
    What Are You Doing And Feeling Right Now?2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Understanding and capturing game play experiences of players have been of great interest for some time, both in academia and industry. Methods used for eliciting game play experiences have involved the use of observations, biometric data and post-game techniques such as surveys and interviews. This is true for games that are played in fixed settings, such as computer or video games. Pervasive games however, provide a greater challenge for evaluation, as they are games that typically engage players in outdoor environments, which might mean constant movement and a great deal of the players' motor skills engaged for several hours or days. In this project I explored a new method for eliciting different aspects of the game play experience of pervasive game players, specifically focusing on motional states and different qualities of immersion. I have centered this work on self-reporting as a means for reporting these aspects of the game play experiences. However, this required an approach to selfreporting as non-obtrusive, not taking too much of the players’ attention from the game activities as well as provide ease of use. To understand the challenges in introducing a new method into a gaming experience, I focused my research on understanding experience, which is a subjective concept. Even though there are methods aiming at capturing the physiological changes during game play, they don’t capture players’ interpretations of the gaming situation. By combining this with objective measurements, I was able to gain a comprehensive understanding of the context of use. The resulting designs were two tools, iteratively developed and pre-tested in a tabletop role-playing session before a test run in the pervasive game Interference. From my findings I was able to conclude that using self-reporting tools for players to use while playing was successful, especially as the data derived from the tools supported post-game interviews. There were however challenges regarding the design and functionality, in particular in outdoor environments, that suggests improvements, as well as considerations on the use of selfreporting as an additional method for data collection.

    Download full text (pdf)
    FULLTEXT01
  • 5.
    Al-Dhaqm, Arafat
    et al.
    Univ Teknol Malaysia UTM, MYS.
    Ikuesan, Richard Adeyemi
    Community Coll Qatar, QAT.
    Kebande, Victor R.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Abd Razak, Shukor
    Univ Teknol Malaysia UTM, MYS.
    Grispos, George
    Univ Nebraska, USA.
    Choo, Kim-Kwang Raymond
    Univ Texas San Antonio, USA.
    Al-Rimy, Bander Ali Saleh
    Univ Teknol Malaysia UTM, MYS.
    Alsewari, Abdulrahman A.
    Univ Malaysia Pahang, MYS.
    Digital Forensics Subdomains: The State of the Art and Future Directions2021In: IEEE Access, E-ISSN 2169-3536, Vol. 9, p. 152476-152502Article in journal (Refereed)
    Abstract [en]

    For reliable digital evidence to be admitted in a court of law, it is important to apply scientifically proven digital forensic investigation techniques to corroborate a suspected security incident. Mainly, traditional digital forensics techniques focus on computer desktops and servers. However, recent advances in digital media and platforms have seen an increased need for the application of digital forensic investigation techniques to other subdomains. This includes mobile devices, databases, networks, cloud-based platforms, and the Internet of Things (IoT) at large. To assist forensic investigators to conduct investigations within these subdomains, academic researchers have attempted to develop several investigative processes. However, many of these processes are domain-specific or describe domain-specific investigative tools. Hence, in this paper, we hypothesize that the literature is saturated with ambiguities. To further synthesize this hypothesis, a digital forensic model-orientated Systematic Literature Review (SLR) within the digital forensic subdomains has been undertaken. The purpose of this SLR is to identify the different and heterogeneous practices that have emerged within the specific digital forensics subdomains. A key finding from this review is that there are process redundancies and a high degree of ambiguity among investigative processes in the various subdomains. As a way forward, this study proposes a high-level abstract metamodel, which combines the common investigation processes, activities, techniques, and tasks for digital forensics subdomains. Using the proposed solution, an investigator can effectively organize the knowledge process for digital investigation.

    Download full text (pdf)
    fulltext
  • 6.
    Amin, Khizer
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Minhas, Mehmood ul haq
    Blekinge Institute of Technology, Faculty of Engineering, Department of Applied Signal Processing.
    Facebook Blocket with Unsupervised Learning2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    The Internet has become a valuable channel for both business-to- consumer and business-to-business e-commerce. It has changed the way for many companies to manage the business. Every day, more and more companies are making their presence on Internet. Web sites are launched for online shopping as web shops or on-line stores are a popular means of goods distribution. The number of items sold through the internet has sprung up significantly in the past few years. Moreover, it has become a choice for customers to do shopping at their ease. Thus, the aim of this thesis is to design and implement a consumer to consumer application for Facebook, which is one of the largest social networking website. The application allows Facebook users to use their regular profile (on Facebook) to buy and sell goods or services through Facebook. As we already mentioned, there are many web shops such as eBay, Amazon, and applications like blocket on Facebook. However, none of them is directly interacting with the Facebook users, and all of them are using their own platform. Users may use the web shop link from their Facebook profile and will be redirected to web shop. On the other hand, most of the applications in Facebook use notification method to introduce themselves or they push their application on the Facebook pages. This application provides an opportunity to Facebook users to interact directly with other users and use the Facebook platform as a selling/buying point. The application is developed by using a modular approach. Initially a Python web framework, i.e., Django is used and association rule learning is applied for the classification of users’ advertisments. Apriori algorithm generates the rules, which are stored as separate text file. The rule file is further used to classify advertisements and is updated regularly.

    Download full text (pdf)
    FULLTEXT01
  • 7.
    Amiri, Javad Mohammadian
    et al.
    Blekinge Institute of Technology, School of Computing.
    Padmanabhuni, Venkata Vinod Kumar
    Blekinge Institute of Technology, School of Computing.
    A Comprehensive Evaluation of Conversion Approaches for Different Function Points2011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Software cost and effort estimation are important activities for planning and estimation of software projects. One major player for cost and effort estimation is functional size of software which can be measured in variety of methods. Having several methods for measuring one entity, converting outputs of these methods becomes important. Objectives: In this study we investigate different techniques that have been proposed for conversion between different Functional Size Measurement (FSM) techniques. We addressed conceptual similarities and differences between methods, empirical approaches proposed for conversion, evaluation of the proposed approaches and improvement opportunities that are available for current approaches. Finally, we proposed a new conversion model based on accumulated data. Methods: We conducted a systematic literature review for investigating the similarities and differences between FSM methods and proposed approaches for conversion. We also identified some improvement opportunities for the current conversion approaches. Sources for articles were IEEE Xplore, Engineering Village, Science Direct, ISI, and Scopus. We also performed snowball sampling to decrease chance of missing any relevant papers. We also evaluated the existing models for conversion after merging the data from publicly available datasets. By bringing suggestions for improvement, we developed a new model and then validated it. Results: Conceptual similarities and differences between methods are presented along with all methods and models that exist for conversion between different FSM methods. We also came with three major contributions for existing empirical methods; for one existing method (piecewise linear regression) we used a systematic and rigorous way of finding discontinuity point. We also evaluated several existing models to test their reliability based on a merged dataset, and finally we accumulated all data from literature in order to find the nature of relation between IFPUG and COSMIC using LOESS regression technique. Conclusions: We concluded that many concepts used by different FSM methods are common which enable conversion. In addition statistical results show that the proposed approach to enhance piecewise linear regression model slightly increases model’s test results. Even this small improvement can affect projects’ cost largely. Results of evaluation of models show that it is not possible to say which method can predict unseen data better than others and it depends on the concerns of practitioner that which model should be used. And finally accumulated data confirms that empirical relation between IFPUG and COSMIC is not linear and can be presented by two separate lines better than other models. Also we noted that unlike COSMIC manual’s claim that discontinuity point should be around 200 FP, in merged dataset discontinuity point is around 300 to 400. Finally we proposed a new conversion approach using systematic approach and piecewise linear regression. By testing on new data, this model shows improvement in MMRE and Pred(25).

    Download full text (pdf)
    FULLTEXT01
  • 8.
    Andersson, Lars
    Blekinge Institute of Technology, School of Computing.
    Inblick i fenomenet webbskrapning2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [sv]

    Föreliggande kandidatarbete har till syfte att undersöka fenomenet Webskrapning. Webbskrapnings-program (också kända som Web Wanderers, Crawlers, Spiders eller skrapare) är program som söker igenom webben automatiskt för att extrahera information från webbsidor. Ett exempel på web skrapning är när ett företag samlar in data om prissättningar på en vara eller en tjänst och sen använder informationen för att producera billigare erbjudanden. Detta ger företaget en fördel så att de kan fokusera mera på att marknadsföra sin sida/tjänster. Utöver detta så blir de utsatta företagens servrar också hårt belastade med trafik (skrapning) från ”icke kunder”. Efter att ha genomsökt både akademiska och allmänna källor via informationsinsamling, av denna information så dras slutsatsen att man inte fullt ut kan hindra skrapning av hemsidor. Detta på samma sätt som man inte fullt ut kan hindra någon IT-attack, det finns inga 100 % vattentäta system. Av utfallet ifrån informationssökningen var det bara ett akademiskt arbete, av de hundra, som genomsöktes som hade inriktat sig på att förhindra skrapningsbotar.

    Download full text (pdf)
    FULLTEXT01
  • 9.
    Anwar, Naveed
    et al.
    Blekinge Institute of Technology, School of Computing.
    Kwoka, Adam
    Blekinge Institute of Technology, School of Computing.
    Web Site Usability, Technical and Social Perspectives2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    World Wide Web (www) has achieved an important role in communication, information sharing and service delivery now-a-days. World Wide Web consists of millions of web sites and web based applications which are deployed and can be visited all over the world without the limitation of time and geographical boundaries. Web site usability, security and reliability consider some of the core aspects in designing of web sites. In this thesis, we explore possible tensions and tradeoffs between usability and security issues in web site design. We discuss web site usability issues in terms of technical and social aspects. We discuss web site security in terms of usability and offer some recommendations for secure website design without compromising the web site performance. We also highlight the importance of ease of navigation and other aspects of user interface design. In order to explore these issues, we have chosen to review the related literature. We have also conducted interviews with professionals who are mainly concerned with web site usability. Two sample interviews are available at the end of this thesis report.

    Download full text (pdf)
    FULLTEXT01
  • 10.
    Bajramovic, Kemal
    Blekinge Institute of Technology, School of Computing.
    Implementing e-Government in Bosnia and Herzegovina: Practices and Challenges for the State government2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Context: Electronic Government (sometimes referred to as digital government, online government) is the use of information and communication technologies to: a) enable optimization and innovation of all government internal processes in the back-office and external processes by providing government services to customers through Internet and other electronic means; and b) facilitate achieving goals of all government policies and strategies. Objectives: In this study we are explaining e-Government practices, perceptions and performances of state institutions of Bosnia and Herzegovina (BiH) and analyzing obstacles and challenges of current approach to e-Government management, in order to propose immediate and middle-term e-Government actions for BiH state institutions to start delivering integrated and useful e-Government services. Methods: In this, three sources of information are used: a) comprehensive survey of state employees, b) interviews with some of the e-Government practitioners and c) systematic review of a number of relevant article sources. All questions/reviews have been done in order to find out what measures could be taken and what guidelines should be followed by the BiH state institutions so they become more IT savvy in taking advantage of e-Government implementations. Results: Measures for improvements have been proposed in several distinct areas: building human capacities for e-Government development, changing management and leadership practices, building regulatory and organizational framework for e-Government and resolving interpersonal issues in e-Government systems design. Additionally, a Phase plan for e-Government project implementation is proposed to those having a vision and idea on some e-Government project, but maybe lacking the skills and knowledge on how to actually initiate, design and implement it. Conclusions: We conclude that BiH state government should realize that e-Government is not just about implementing some IT projects; it is an overall public administration reform process which has to be adequately supported by regulative and organizational measures. This thesis provided arguments for such strategic e-Government decision-making and necessity for government-wide management and development capacity. We conclude that there is a need for BiH state government to understand the current situation and arguments presented, and take steps in building its capacities in this field.

    Download full text (pdf)
    FULLTEXT01
  • 11.
    Bendler, Daniel
    et al.
    University Innsbruck, Austria..
    Felderer, Michael
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Competency Models for Information Security and Cybersecurity Professionals: Analysis of Existing Work and a New Model2023In: ACM Transactions on Computing Education, E-ISSN 1946-6226, Vol. 23, no 2, article id 25Article in journal (Refereed)
    Abstract [en]

    Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the security domain through qualitative content analysis. Additionally, based on the competency model analysis, an evidence-based competency model is proposed. Examining the content of 27 models, we found that the models can benefit target groups in many different ways, ranging from policymaking to performance management. Owing to their many uses, competency models can arguably help to narrow the skills gap from which the profession is suffering. Nonetheless, the models have their shortcomings. First, the models do not cover all of the topics specified by the Cybersecurity Body of Knowledge ( i.e., no model is complete). Second, by omitting social, personal, and methodological competencies, many models reduce the competency profile of a security expert to professional competencies. Addressing the limitations of previous work, the proposed competency model provides a holistic view of the competencies required by security professionals for job achievement and can potentially benefit both the education system and the labor market. To conclude, the implications of the competency model analysis and use cases of the proposed model are discussed.

    Download full text (pdf)
    fulltext
  • 12.
    Bodduluri, Kailash Chowdary
    et al.
    Linnaeus University.
    Kurti, Arianit
    Linnaeus University.
    Palma, Francis
    University of New Brunswick, Canada.
    Jusufi, Ilir
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Löwenadler, Henrik
    Enode, Sweden.
    Dynamic Hybrid Recommendation System for E-Commerce: Overcoming Challenges of Sparse Data and Anonymity2024In: Web Engineering, ICWE 2024 / [ed] Kostas Stefanidis, Kari Systä, Maristella Matera, Sebastian Heil, Haridimos Kondylakis, Elisa Quintarelli, Springer Science+Business Media B.V., 2024, Vol. 14629, p. 435-440Conference paper (Refereed)
    Abstract [en]

    In the evolving landscape of e-commerce, personalizing user experience through recommendation systems has become a way to boost user satisfaction and engagement. However, small-scale e-commerce platforms struggle with significant challenges, including data sparsity and user anonymity. These issues make it hard to effectively implement recommendation systems, resulting in difficulty in recommending the right products to users. This study introduces an innovative Hybrid Recommendation System (HRS) to address challenges in e-commerce personalization caused by data sparsity and user anonymity. By blending multiple dimensions of the data into one unified system for producing recommendations, this system represents a notable advancement in web engineering for achieving personalized user experiences in the context of limited data. This research emphasizes the significance of innovative and tech-driven solutions in transforming small-scale e-commerce platforms, providing direction for future research and development in the field. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.

  • 13.
    Bodduluri, Kailash Chowdary
    et al.
    Linnaeus University.
    Palma, Francis
    University of New Brunswick, Canada.
    Kurti, Arianit
    Linnaeus University.
    Jusufi, Ilir
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Löwenadler, Henrik
    HL Design, Växjö, Sweden.
    Exploring the Landscape of Hybrid Recommendation Systems in E-Commerce: A Systematic Literature Review2024In: IEEE Access, E-ISSN 2169-3536, Vol. 12, p. 28273-28296Article, review/survey (Refereed)
    Abstract [en]

    This article presents a systematic literature review on hybrid recommendation systems (HRS) in the e-commerce sector, a field characterized by constant innovation and rapid growth. As the complexity and volume of digital data increases, recommendation systems have become essential in guiding customers to services or products that align with their interests. However, the effectiveness of single-architecture recommendation algorithms is often limited by issues such as data sparsity, challenges in understanding user needs, and the cold start problem. Hybridization, which combines multiple algorithms in different methods, has emerged as a dominant solution to these limitations. This approach is utilized in various domains, including e-commerce, where it significantly improves user experience and sales. To capture the recent trends and advancements in HRS within e-commerce over the past six years, we review the state-of-the-art overview of HRS within e-commerce. This review meticulously evaluates existing research, addressing primary inquiries and presenting findings that contribute to evidence-based decision-making, understanding research gaps, and maintaining transparency. The review begins by establishing fundamental concepts, followed by detailed methodologies, findings from addressing the research questions, and exploration of critical aspects of HRS. In summarizing and incorporating existing research, this paper offers valuable insights for researchers and outlines potential avenues for future research, ultimately providing a comprehensive overview of the current state and prospects of HRS in e-commerce.

    Download full text (pdf)
    fulltext
  • 14.
    Bouhennache, Rafik
    et al.
    Science and technology institute, university center of Mila, DZA.
    Bouden, Toufik
    ohammed Seddik Ben Yahia University of Jijel, DZA.
    Taleb-Ahmed, Abdmalik
    university of V alenciennes, FRA.
    Cheddad, Abbas
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering. Blekinge Institute of Technology.
    A new spectral index for the extraction of built-up land features from Landsat 8 satellite imagery2019In: Geocarto International, ISSN 1010-6049, E-ISSN 1752-0762, Vol. 34, no 14, p. 1531-1551Article in journal (Refereed)
    Abstract [en]

    Extracting built-up areas from remote sensing data like Landsat 8 satellite is a challenge. We have investigated it by proposing a new index referred as Built-up Land Features Extraction Index (BLFEI). The BLFEI index takes advantage of its simplicity and good separability between the four major component of urban system, namely built-up, barren, vegetation and water. The histogram overlap method and the Spectral Discrimination Index (SDI) are used to study separability. BLFEI index uses the two bands of infrared shortwaves, the red and green bands of the visible spectrum. OLI imagery of Algiers, Algeria, was used to extract built-up areas through BLFEI and some new previously developed built-up indices used for comparison. The water areas are masked out leading to Otsu’s thresholding algorithm to automatically find the optimal value for extracting built-up land from waterless regions. BLFEI, the new index improved the separability by 25% and the accuracy by 5%.

    Download full text (pdf)
    fulltext
  • 15.
    Brodka, Piotr
    et al.
    Wroclaw Univ Technol, Inst Informat, PL-50370 Wroclaw, Poland..
    Sobas, Mateusz
    Wroclaw Univ Technol, Inst Informat, PL-50370 Wroclaw, Poland..
    Johnson, Henric
    Blekinge Institute of Technology, School of Computing.
    Profile Cloning Detection in Social Networks2014In: 2014 EUROPEAN NETWORK INTELLIGENCE CONFERENCE (ENIC), IEEE Computer Society, 2014, p. 63-68Conference paper (Refereed)
    Abstract [en]

    Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates a possibility to detect frauds that would use people's trust to gather social information. This paper proposes two novel methods of profile cloning detection and also presents state-of-the-art research. The first method is based on the similarity of attributes from both profiles and the second method is based on the similarity of relationship networks. The methods are further evaluated with experiments and the results clearly describes that the proposed methods are useful and efficient compared to existing methods. The paper also stress that profile cloning in Facebook is not only possible but also fairly easy to perform.

  • 16.
    Bródka, Piotr
    Blekinge Institute of Technology, School of Computing.
    Key User Extraction Based on Telecommunication Data2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The number of systems that collect vast amount of data about users rapidly grow during last few years. Many of these systems contain data not only about people characteristics but also about their relationships with other system users. From this kind of data it is possible to extract a social network that reflects the connections between system’s users. Moreover, the analysis of such social network enables to investigate different characteristics of its users and their linkages. One of the types of examining such network is key users extraction. Key users are these who have the biggest impact on other network users as well as have big influence on network evolution. The obtained knowledge about these users enables to investigate and predict changes within the network. So this knowledge is very important for the people or companies who make a profit from the network like telecommunication company. The second important issue is the ability to extract these users as quick as possible, i.e. developed the algorithm that will be time-effective in large social networks where number of nodes and edges is equal few millions.

    Download full text (pdf)
    FULLTEXT01
  • 17.
    Bukhari, Syed Asif Abbas
    et al.
    Blekinge Institute of Technology, School of Computing.
    Hussain, Sajid
    Blekinge Institute of Technology, School of Computing.
    Intelligent Support System for Health Monitoring of elderly people2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    The use of information and communications technology (ICT) to provide medical information, interaction between patients and health-service providers, institution-to-institution transmission of data, in known as eHealth. ICT have become an inseparable part of our life, it can integrate health care more seamlessly to our everyday life. ICT enables the delivery of accurate medical information anytime anywhere in an efficient manner. Cardiovascular disease (CVD) is the single leading cause of death, especially in elderly people. The condition of heart is monitor by electrocardiogram (ECG). The Electrocardiogram (ECG) is widely used clinical tool to diagnose complex heart diseases. In clinical settings, resting ECG is used to monitor patients. Holter-based portable monitoring solutions capable of 24 to 48-hour ECG recording, they lack the capability of providing any real-time feedback in case of alarming situation. The recorded ECG data analyzed offline by doctor. To address this issue, authors propose a functionality of intelligence decision support system, in heart monitoring system. The proposed system has capability of generate an alarm in case of serious abnormality in heart, during monitoring of heart activity.

    Download full text (pdf)
    FULLTEXT01
  • 18.
    Chaparadza, Ranganai
    et al.
    ETSI AFI & IPv6Forum.
    Ben Meriem, Tayeb
    Orange, AFI.
    Radier, Benoit
    Orange, AFI.
    Szott, Szymon
    AGH University , AFI.
    Wodczak, Michal
    IT Department of Poznan University of Economics, AFI.
    Prakash, Arun
    FOKUS, AFI.
    Ding, Jianguo
    Högskolan i Skövde, Forskningscentrum för Informationsteknologi.
    Soulhi, Said
    Ericsson, AFI.
    Mihailovic, Andrej
    KCL, AFI.
    Implementation Guide for the ETSI AFI GANA Model: a Standardized Reference Model for Autonomic Networking, Cognitive Networking and Self-Management2013In: Proceedings of 2013 IEEE Globecom Workshops, IEEE Computer Society , 2013, p. 935-940Conference paper (Refereed)
    Abstract [en]

    This paper describes an Implementation Guide for an emerging standard for autonomic management &control of networks and services, namely the ETSI AFI GANA Reference Model for Autonomic Networking, Cognitive Networking and Self-Management (an emerging standard from ETSI). The implementation guide also takes into consideration the impact of emerging paradigms such as SDN and Virtualization. This is because as the standardized Reference Model has been published, it becomes important to provide an associated Implementation Guide that can be followed in implementing autonomic management & control in network architectures.

  • 19.
    Chaparadza, Ranganai
    et al.
    ETSI AFI & IPv6Forum.
    Ben Meriem, Tayeb
    Orange, AFI.
    Radier, Benoit
    Orange, AFI.
    Szott, Szymon
    AGH University, AFI.
    Wodczak, Michal
    IT Department of Poznan University of Economics, AFI.
    Prakash, Arun
    FOKUS, AFI.
    Ding, Jianguo
    Högskolan i Skövde, Forskningscentrum för Informationsteknologi.
    Soulhi, Said
    Ericsson, AFI.
    Mihailovic, Andrej
    KCL, AFI.
    SDN Enablers in the ETSI AFI GANA Reference Model for Autonomic Management & Control (emerging standard), and Virtualization Impact2013In: Proceedings of 2013 IEEE Globecom Workshops, IEEE Computer Society , 2013, p. 818-823Conference paper (Refereed)
    Abstract [en]

    This standardization oriented paper describes the SDN (Software-Driven Networking) Enablers in the ETSI AFI GANA Reference Model for Autonomic Management & Control (an emerging standard from ETSI), and impact of Virtualization. This is because in this study we see that Autonomic Management & Control and SDN (Software-Driven Networking) share the same objective of enabling programmable, manageable, dynamically self-adaptable and cost-effective networks and services. SDN enablers in the AFI GANA Model are: (1) Modularization of Logically centralized Control Software (the GANA Network Level DEs in the GANA Knowledge Plane) and Reference Points Definitions; (2) Primitives for Programmability at various layers; (3) Use of Runtime Executable Behavioral Models to complement the use of Policy-Control and dynamic policies; (4) The role and value the GANA MBTS (Model Based Translation Service) brings in SDN; (5) The role and value the GANA ONIX (Overlay Network for Information eXchange) brings in SDN; (6) Interworking GANA Knowledge Plane Decision Elements and SDN Controllers; (7) GANA “Decision-Making-Elements” logics as “software” that can be loaded into nodes and network (enabling “software-empowered networks”). The study is important because it is now becoming critical to study and explore the relationships between Autonomic Management & Control and SDN paradigms, as well as Virtualization, identify complementarities between the paradigms and close the gaps by unifying SDN concepts and associated frameworks with the emerging ETSI AFI GANA Reference Model standard for Autonomic Networking, Cognitive Networking and Self-Management, a hybrid model enabling to combine both centralized and distributed control.

  • 20.
    Chernenko, Yurii
    et al.
    International University of Business and Law, Ukraine.
    Danchenko, Olena
    Cherkasy State Technology University, Ukraine.
    Mysnyk, Bohdan
    Cherkasy National University named after B. Khmelnytskyi, Ukraine.
    Bielova, Olena
    University of Economics and Law “KROK”, Ukraine.
    Adamov, Oleksandr
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Optimizing Housing and Communal Services Management Through Digital Transformation and Integrated Information Systems2024In: Proceedings of ITEST 2024, Volume 2 / [ed] Emil Faure, Yurii Tryus, Tero Vartiainen, Olena Danchenko, Maksym Bondarenko, Constantine Bazilo, Grygoriy Zaspa, Springer Science+Business Media B.V., 2024, Vol. 222, p. 33-49Conference paper (Refereed)
    Abstract [en]

    Under modern business conditions, it is necessary to increase its competitiveness through the digital transformation of enterprise management, particularly by introducing the latest and modern technologies to improve business operations. It helps businesses to become scalable, efficient, and more profitable. To increase the strategic potential for the possibility of simultaneous implementation of a larger number of projects, the providers of housing and communal services need to constantly improve their organizational management model under conditions of uncertainty. The development of a business management information system is proposed, which allows managing business processes of any degree of complexity in all areas of activity, regardless of their labor intensity, as well as the number of personnel and equipment involved. The implementation of a business management information system in the activities of housing and communal services providers optimizes their activities while taking into account the features of their services, which include intangibility, immediacy, changeability, individuality, irreplaceability, continuity and saturation of needs. The implementation of digital transformation in the activities of housing and communal services providers helps to maximize their efficiency and social significance, which is a key element for improving the quality of life of citizens. 

  • 21.
    Chtivelband, Igor
    Blekinge Institute of Technology, School of Computing.
    HistoryLane: Web Browser History Visualization Method2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    With the evolution of Internet, users exploit it increasingly intensively for achieving their goals: sending emails, playing games, watching videos, reading news. They do it through Web browsers, that may vary in exact implementation, but have similar core functionalities . One of these core functionalities is the access to a browsing history. However, as browsing patterns are getting more complex, the traditional history tools become insufficient. Visualization of browsing history might be helpful in that case. In this study we propose a novel approach for browsing history visualization, named HistoryLane, which ts the parallel browsing paradigm, common for modern browsers. The main goal of HistoryLane is enabling the user to gain insight into his own or into other users' parallel browsing patterns over time. Principles of HistoryLane visualization approach are formulated based on recommendations, found during structured literature review. These principles constitute the base for a prototype, which was implemented as a Fire- fox extension. To evaluate the e ffectiveness of HistoryLane we conducted a survey and a quantitative experiment. The results of the evaluation show that HistoryLane is perceived by users as effective and intuitive method for browsing history visualization.

    Download full text (pdf)
    FULLTEXT01
  • 22.
    Daliparthi, Venkata Satya Sai Ajay
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Momen, Nurul
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Tutschku, Kurt
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    De Prado, Miguel
    Bonseyes Community Association, Switzerland.
    ViSDM 1.0: Vision Sovereignty Data Marketplace a Decentralized Platform for Crowdsourcing Data Collection and Trading2023In: ACM International Conference Proceeding Series, Association for Computing Machinery (ACM), 2023, p. 374-383Conference paper (Refereed)
    Abstract [en]

    The demand for large-scale diverse datasets is rapidly increasing due to the advancements in AI services impacting day-to-day life. However, gathering such massive datasets still remains a critical challenge in the AI service engineering pipeline, especially in the computer vision domain where labeled data is scarce. Rather than isolated data collection, crowdsourcing techniques have shown promising potential to achieve the data collection task in a time and cost-efficient manner. In the existing crowdsourcing marketplaces, the crowd works to fulfill consumer-defined requirements where in the end consumer gains the data ownership and the crowd is compensated with task-based payment. On the contrary, this work proposes a blockchain-based decentralized marketplace named Vision Sovereignty Data Marketplace (ViSDM), in which the crowd works to fulfill global requirements & holds data ownership, the consumers pay a certain data price to perform a computing task (model training/testing), the data price is distributed among the crowd in a one-to-many manner through smart contracts, thus allowing the crowd to gain profit from each consumer transaction occurring on their data. The marketplace is implemented as multiple smart contracts and is evaluated based on blockchain-transaction gas fees for the stakeholder interaction & by running scenarios-based simulations. Furthermore, discussions address the challenges included in maintaining data quality and the future milestones towards deployment. © 2023 Owner/Author.

    Download full text (pdf)
    fulltext
  • 23.
    Delgado, Sergio Mellado
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Velasco, Alberto Díaz
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Indoor Positioning using the Android Platform2014Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    In recent years, there has been a great increase in the development of wireless technologies and location services. For this reason, numerous projects in the location field, have arisen. In addition, with the appearance of the open Android operating system, wireless technologies are being developed faster than ever. This Project approaches the design and development of a system that combines the technologies of wireless, location and Android with the implementation of an indoor positioning system. As a result, an Android application has been obtained, which detects the position of a phone in a simple and useful way. The application is based on the WIFI manager API of Android. It combines the data stored in a SQL database with the wifi data received at any given time. Afterwards the position of the user is determined with the algorithm that has been implemented. This application is able to obtain the position of any person who is inside a building with Wi-Fi coverage, and display it on the screen of any device with the Android operating system. Besides the estimation of the position, this system displays a map that helps you see in which quadrant of the room are positioned in real time. This system has been designed with a simple interface to allow people without technology knowledge. Finally, several tests and simulations of the system have been carried out to see its operation and accuracy. The performance of the system has been verified in two different places and changes have been made in the Java code to improve its precision and effectiveness. As a result of the several tests, it has been noticed that the placement of the access point (AP) and the configuration of the Wireless network is an important point that should be taken into account to avoid interferences and errors as much as possible, in the estimation of the position.

    Download full text (pdf)
    FULLTEXT01
  • 24.
    Denys, Paul
    Blekinge Institute of Technology, School of Computing.
    Security of Personal Information in Cloud Computing: Identifying and mitigating against risks to privacy in the deployment of Enterprise Systems Applications on the Software as a Service platform2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The emergence and subsequent growth of Cloud computing has brought with it a great deal of change in the manner in which the world undertakes to compute and store information. This new technology has brought with it immense possibilities as far as processing of information and the pooling of resources is concerned. This potential has also been noticed by the public sector, as Governments all over the world have undertaken to introduce what has come to be known as e-Government, the provisioning of Government services and communications via Web based applications, rather than the traditional means of in person contact and paper based collection of personal information. While the move to Web based Government has been occurring for the last 20 or so years, a new development in this area is the introduction of Cloud computing and Cloud-based computing platforms, most notably Software-as-a-Service (SaaS) in the provisioning of these services. The computing and efficiency potential of this technology cannot be disputed, yet it’s important to recognize that taking advantage of this computing power does come at a price. That price being significant threats to personal privacy and security of personally identifiable information. This thesis will make it easier for government agencies to make informed decisions about whether or not to migrate data and applications into the cloud. The identification and analysis of potential risks to data security and personal information has drawn together key information from a multitude of both academic and industry sources to make such a decision plausible.

    Download full text (pdf)
    FULLTEXT01
  • 25.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Intrusion Detection, Prevention, and Response System (IDPRS) for Cyber-Physical Systems (CPSs)2015In: Securing Cyber Physical Systems / [ed] Al-Sakib Khan Pathan, Boca Raton, US: Taylor & Francis Group , 2015, p. 371-392Chapter in book (Refereed)
    Abstract [en]

    Cyber-physical systems (CPSs) are integrated physical, engineered, andsocial systems whose operations are monitored, coordinated, controlled, and integratedby a computing and communication core. Due to the dynamic structure ofCPSs, the security measurements are often complex. Given this fact, the objectiveof this chapter is to present the intrusion detection, prevention, and response system(IDPRS) for such a dynamic environment.

  • 26.
    Duc, Tran Huy
    Blekinge Institute of Technology, School of Computing.
    Designing distance learning for the 21st century: Constructivism, Moore’s transactional theory and Web 2.02012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Distance learning has been playing an ever more influential role. Yet there remains little rigorous academic research into distance learning pedagogy, lacking of serious study in management, delivery and organization of distance learning has destabilized the field. Recently, the boom of Web 2.0 has made websites a lot more intuitive, interactive and interesting; Web 2.0 is also widely used in distance education. Study of distance education as a result sometimes has been misdirected, instead of understanding and solving the real issues facing distance education, research in the field devoted entirely to technology usage discarding the very issue of effective education in distance context. In other words, instead of pursuing technology-relevant policies we focus on technology-driven policies. This thesis starts by reviewing learning theories and arguing for the case of why one is more suitable for distance learning than others. The author argues that constructivism, which favors a dynamic learning process, encourages people to interact, share ideas and bounce ideas is the more effective learning theory. But deploying constructivist pedagogy into real life is difficult. We need more concrete ideas as to how to organize distance learning, a framework to benchmark distance education, to evaluate distance education. That is where Moore’s transactional theory which actually derives from constructivist pedagogy comes into the picture. Moore pointed out 3 key areas of distance education: dialogue, structure and learner autonomy. Moore argues that by having enough constructive dialogue, flexible structure catering individualism and a high level of learner autonomy to execute learning; we can reduce “distance” in distance education. Moore is equally concerned about pedagogy as he is about technologies and he has incorporated into his theory how technological changes have influenced the way distance education has been delivered for the better. This is the brilliance of Moore’s, he has not sided with either pedagogy or technology, he observed the rise of technology and the influence it has on distance education but refused to see technology as the sole factor that makes distance learning more effective or reduces “distance” in distance education. The linkage between constructivism and Moore’s theory is of significance although it is only barely acknowledged in Moore’ writing. The magnitude of this connection is that first it highlights that the work that Moore has done has been based on strong theoretical pedagogy, his contribution is that he has simplified a grand ideology into something that can be applied in the class room. Also he has succeeded in refining elements of constructivism into working variables for quantitative research. His theory is still highly relevant today but his analysis of technologies’ roles has not yet included the latest explosion of technologies in the post-1993 age: the Internet, the booming Web and especially the new Web 2.0. The aim of this thesis is to extend his analysis to these new technologies. We studied how the explosion of Web 2.0 services have been facilitating rich dialogue among peers, teachers and learning materials, allowing more individualization to educational settings and structures. Also Web 2.0 lowers the barrier to participation and content generation and thus would be expected to encourage learner autonomy. A large part of the thesis has been dedicated to literature review. This is because the author believes that in order to improve distance education, it is necessary to first understand learning theory to know when and how people learn, and explore the nature of distance education to see the differences between distance and non-distance education, and then have a comprehensive plan to implement distance education, and evaluate that plan. The implementation bit is of course a practical project; the author used a real-life course at Umeå University where students from various backgrounds signed-up to learn about how Web 2.0 can be leveraged to enhance distance education. A constructivist approach was adopted so we had a chance to see how it actually turned out. We used Moore’s transactional distance theory to evaluate the impact of introducing Web 2.0.

    Download full text (pdf)
    FULLTEXT01
  • 27.
    Eivazzadeh, Shahryar
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Anderberg, Peter
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Larsson, Tobias
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Fricker, Samuel
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering. University of Applied Sciences and Arts Northwestern Switzerland.
    Berglund, Johan
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Evaluating Health Information Systems Using Ontologies2016In: JMIR Medical Informatics, E-ISSN 2291-9694, Vol. 4, no 2, article id e20Article in journal (Refereed)
    Abstract [en]

    Background: There are several frameworks that attempt to address the challenges of evaluation of health information systems by offering models, methods, and guidelines about what to evaluate, how to evaluate, and how to report the evaluation results. Model-based evaluation frameworks usually suggest universally applicable evaluation aspects but do not consider case-specific aspects. On the other hand, evaluation frameworks that are case specific, by eliciting user requirements, limit their output to the evaluation aspects suggested by the users in the early phases of system development. In addition, these case-specific approaches extract different sets of evaluation aspects from each case, making it challenging to collectively compare, unify, or aggregate the evaluation of a set of heterogeneous health information systems.

    Objectives: The aim of this paper is to find a method capable of suggesting evaluation aspects for a set of one or more health information systems—whether similar or heterogeneous—by organizing, unifying, and aggregating the quality attributes extracted from those systems and from an external evaluation framework.

    Methods: On the basis of the available literature in semantic networks and ontologies, a method (called Unified eValuation using Ontology; UVON) was developed that can organize, unify, and aggregate the quality attributes of several health information systems into a tree-style ontology structure. The method was extended to integrate its generated ontology with the evaluation aspects suggested by model-based evaluation frameworks. An approach was developed to extract evaluation aspects from the ontology that also considers evaluation case practicalities such as the maximum number of evaluation aspects to be measured or their required degree of specificity. The method was applied and tested in Future Internet Social and Technological Alignment Research (FI-STAR), a project of 7 cloud-based eHealth applications that were developed and deployed across European Union countries.

    Results: The relevance of the evaluation aspects created by the UVON method for the FI-STAR project was validated by the corresponding stakeholders of each case. These evaluation aspects were extracted from a UVON-generated ontology structure that reflects both the internally declared required quality attributes in the 7 eHealth applications of the FI-STAR project and the evaluation aspects recommended by the Model for ASsessment of Telemedicine applications (MAST) evaluation framework. The extracted evaluation aspects were used to create questionnaires (for the corresponding patients and health professionals) to evaluate each individual case and the whole of the FI-STAR project.

    Conclusions: The UVON method can provide a relevant set of evaluation aspects for a heterogeneous set of health information systems by organizing, unifying, and aggregating the quality attributes through ontological structures. Those quality attributes can be either suggested by evaluation models or elicited from the stakeholders of those systems in the form of system requirements. The method continues to be systematic, context sensitive, and relevant across a heterogeneous set of health information systems.

    Download full text (pdf)
    fulltext
  • 28.
    Elfsberg, Jenny
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Johansson Askling, Christian
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Frank, Martin
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Larsson, Andreas
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Larsson, Tobias
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Leifer, Larry
    Stanford University, USA.
    How Covid-19 Enabled a Global Student Design Team to Achieve Breakthrough Innovation2021In: Proceedings of the Design Society 2021, Cambridge University Press, 2021, Vol. 1, p. 1705-1714Conference paper (Refereed)
    Abstract [en]

    This is a qualitative single case study of a geographically distributed student team that experienced a quite different graduate course, compared to previous year's. This was due to the restrictions placed upon them following coronavirus lockdowns. With already ongoing research, and continuous development of the course, the authors had documented individual reflections and identified patterns and behaviours that seemingly determined the quality of the end result, as well as the students expectations and experiences. Semi-structured interviews, surveys and the author's individual reflection notes were already in place as part of the larger research scope and when the student team during the covid-19 year showed unexpected performance and results, the authors decided to pause the larger research scope and focus on this unique single case and capture those learnings. Not knowing how the Covid-19 situation evolves and leaning on insights from previous years, as well as this unique year, the aim with this paper is to describe the unique Covid-19 year amd share knowledge that can help improve and evolve the development of this longlived collaborative graduate student course, and other similar distributed team contexts.

    Download full text (pdf)
    fulltext
  • 29.
    Fagerström, Cecilia
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Tuvesson, Hanna
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Axelsson, Lisa
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    Nilsson, Lina
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health.
    The role of ICT in nursing practice: An integrative literature review of the Swedish context2017In: Scandinavian Journal of Caring Sciences, ISSN 0283-9318, E-ISSN 1471-6712, p. 434-448Article in journal (Refereed)
    Abstract [en]

    Background: The Swedish healthcare system employs information and communication technologies (ICT) in nursing practice to meet quality-, security- and efficiency-related demands. Although ICT is integrated with nursing practices, nurses do not always feel that they are convenient to use it. We need to improve our knowledge of the role of ICT in healthcare environments and so we decided to complement existing experience of how ICT influences nursing practice. Aim: This study aimed to review and synthesise the available literature on the role of ICT in nursing practice in Swedish healthcare settings. Method: To consolidate previous studies based on diverse methodologies, an integrative literature review was carried out. Three databases were used to search for literature, 20 articles met the inclusion criteria. Results: The literature review indicates that ICT integration into nursing practice is a complex process that impacts nurses’ communication and relationships in patient care, working conditions, and professional identities and development. Nurses are found to express ambiguous views on ICT as a usable service in their everyday practice since it impacts both positively and negatively. Discussion and conclusion: Although ICT cannot replace physical presence, it can be considered a complementary service that gives rise to improved patient care. However, nonverbal communication cues may be missed when ICT is used as mediating tool and ICT can be limiting because it is not always designed to meet nurse and patient needs. The meaning of an encounter appears to change when ICT is used in nursing practice, not only for patient relationships but also for interpersonal communication.

  • 30.
    Feyh, Markus
    Blekinge Institute of Technology, School of Computing.
    Lean software development measures: A systematic mapping2013Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Context. Process improvement using lean software development uses measures to answer information needs. Measures are important in process improvement as they identify whether improvements have been made or further improvements are needed. Objectives. This study aims to identify the measures proposed in literature for lean software development and structure them according to ISO/IEC 15939. Methods. The research methodology consists of systematic mapping and uses thematic analysis. Results. Lean software development literature has become more frequently published from 1996 to 2013. The most common research types were evaluation research and experience reports. Themes were identified in measures resulting in the identification of 22 base measures, 13 derived measures and 14 indicators in total. Identified measures were then structured using a proposed meta-model adapted from ISO/IEC 15939. Using the proposed meta-model twelve models of measures were instantiated. Conclusions. Gaps exist in the lean principles for deferring commitment and respecting people. Structuring measures in models presents opportunities to identify shared dependencies in measures. Lean software development research guidelines were defined. Further research into the comparison of indicators, the industrial use of measures and the representation of models of measures is needed.

    Download full text (pdf)
    FULLTEXT01
  • 31.
    Fotrousi, Farnaz
    et al.
    Blekinge Institute of Technology, School of Computing.
    Izadyan, Katayoun
    Blekinge Institute of Technology, School of Computing.
    Analytics-based Software Product Planning2013Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Successful software product management concerns about developing right software products for right markets at the right time. The product manager, who carries responsibilities of planning, requires but does not always have access to high-quality information for making the best possible planning decisions. The following master thesis concentrates on proposing a solution that supports planning of a software product by means of analytics. Objectives. The aim of the master thesis is to understand potentials of analytics in product planning decisions in a SaaS context. This thesis focuses on SaaS based analytics used for portfolio management, product roadmapping, and release planning and specify how the analytics can be utilized for planning of a software product. Then the study devises an analytics-based method to enable software product planning. Methods. The current study was designed with a mixed methodology approach, which includes the literature review and survey researches as well as case study under the framework of the design science. Literature review was conducted to identify product planning decisions and the measurements that support them. A total of 17 interview based surveys were conducted to investigate the impact of analytics on product planning decisions in product roadmapping context. The result of the interviews ended in an analytics-based planning method provided under the framework of design science. The designed analytics-based method was validated by a case study in order to measure the effectiveness of the solution. Results. The identified product planning decisions were summarized and categorized into a taxonomy of decisions divided by portfolio management, roadmapping, and release planning. The identified SaaS-based measurements were categorized into six categories and made a taxonomy of measurements. The result of the survey illustrated that importance functions of the measurement- categories are not much different for planning-decisions. In the interviews 61.8% of interviewees selected “very important” for “Product”, 58.8% for “Feature”, and 64.7% for “Product healthiness” categories. For “Referral sources” category, 61.8% of responses have valuated as “not important”. Categories of “Technologies and Channels” and “Usage Pattern” have been rated majorly “important” by 47.1% and 32.4% of the corresponding responses. Also the results showed that product use, feature use, users of feature use, response time, product errors, and downtime are the first top measurement- attributes that a product manager prefers to use for product planning. Qualitative results identified “product specification, product maturity and goal” as the effected factors on analytics importance for product planning and in parallel specified strengths and weaknesses of analytical planning from product managers’ perspectives. Analytics-based product planning method was developed with eleven main process steps, using the measurements and measurement scores resulted from the interviews, and finally got validated in a case. The method can support all three assets of product planning (portfolio management, roadmapping, and release planning), however it was validated only for roadmapping decisions in the current study. SaaS-based analytics are enablers for the method, but there might be some other analytics that can assist to take planning decisions as well. Conclusion. The results of the interviews on the roadmapping decisions indicated that different planning decisions consider similar importance for measurement-categories to plan a software product. Statistics about feature use, product use, response time, users, error and downtime have been recognized as the most important measurements for planning. Analytics increase knowledge about product usability and functionality, and also can assist to improve problem handling and client-side technologies. But it has limitations regarding to receiving formed-based customer feedback, handling development technologies and also interpreting some measurements in practice. Immature products are not able to use analytics. To create, remove, or enhance a feature, the data trend provides a wide view of feature desirability in the current or even future time and clarifies how these changes can impact decision making. Prioritizing features can be performed for the features in the same context by comparing their measurement impacts. The analytics-based method covers both reactive and proactive planning.

    Download full text (pdf)
    FULLTEXT01
  • 32.
    Galuszka, Jakub
    et al.
    Technische Universität Berlin, DEU.
    Martin, Emilie
    Urban Electric Mobility Initiative (UEMI), DEU.
    Nkurunziza, Alphonse
    University of Rwanda, RWA.
    Oginga, Judith Achieng
    Blekinge Institute of Technology, Faculty of Engineering, Department of Spatial Planning.
    Senyagwa, Jacqueline
    Urban Electric Mobility Initiative (UEMI), DEU.
    Teko, Edmund
    Urban Electric Mobility Initiative (UEMI), DEU.
    Lah, Oliver
    Technische Universität Berlin, DEU.
    East Africa’s policy and stakeholder integration of informal operators in electric mobility transitions: Kigali, Nairobi, Kisumu and Dar es Salaam2021In: Sustainability, E-ISSN 2071-1050, Vol. 13, no 4, p. 1-21, article id 1703Article in journal (Refereed)
    Abstract [en]

    Electric mobility is beginning to enter East African cities. This paper aims to investigate what policy-level solutions and stakeholder constellations are established in the context of electric mobility (e-mobility) in Dar es Salaam, Kigali, Kisumu and Nairobi and in which ways they attempt to tackle the implementation of electric mobility solutions. The study employs two key methods including content analysis of policy and programmatic documents and interviews based on a purposive sampling approach with stakeholders involved in mobility transitions. The study findings point out that in spite of the growing number of policies (specifically in Rwanda and Kenya) and on-the-ground developments, a set of financial and technical barriers persists. These include high upfront investment costs in vehicles and infrastructure, as well as perceived lack of competitiveness with fossil fuel vehicles that constrain the uptake of e-mobility initiatives. The study further indicates that transport operators and their representative associations are less recognized as major players in the transition, far behind new e-mobility players (start-ups) and public authorities. This study concludes by identifying current gaps that need to be tackled by policymakers and stakeholders in order to implement inclusive electric mobility in East African cities, considering modalities that include transport providers and address their financial constraints. © 2021 by the authors. Licensee MDPI, Basel, Switzerland.

    Download full text (pdf)
    fulltext
  • 33.
    Garlapati, Rambabu
    et al.
    Blekinge Institute of Technology, School of Computing.
    Biswas, Rajib
    Blekinge Institute of Technology, School of Computing.
    Interoperability in Healthcare: A focus on the Social Interoperability2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context: Now a days Information technology has become a part of health-care delivery this makes life much easier for patients and health-care professionals. The increase in demand for communication among the different health information systems and health professionals has made interoperability complex and whereas interoperability is mainly focused at semantic and technical levels of communication. Yet, the social interoperability, an important part of communication between computerized systems and health professionals, is overlooked. Obje ctive s: In this study we explore the differences between interoperability and social interoperability. Furthermore investigate the social interoperability in practice and the problems that affect the health-care. Methods: We start with the literature survey to learn the definitions of interoperability and social interoperability. Later, case study approach is carried out to investigate the social interoperability in Interoperability. Interviews were also conducted as part of the observations in cases. Re sults: The similarities and differences in definitions of interoperability and social interoperability are sorted out from the literature study. Five cases have been investigated to identify the social interoperability in practice. Analyses of these cases have identified some of the major problems for health information systems that do not meet social interoperability. Conclusions: Interoperability definitions agree that interoperability is undoubtedly important for health data communication, but their goals in achieving interoperability is concerned only about computerized systems and very less focused on social interoperability. The case studies are used to find out the social communication using in health information systems. We realize that the communication between the users and the information systems are quite complex. The developed systems are witnessing the usability difficulties to the health-care providers that affect the patient care.

    Download full text (pdf)
    FULLTEXT01
  • 34.
    Ge, Quanyi
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Chai, Yi
    Blekinge Institute of Technology, School of Engineering.
    RFID Emergency System for Tumble Detection of Solitary People2012Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    RFID (Radio Frequency Identification) system is a wireless system without any kinds of mechanical or optical connection between identifying and detected objects. It consists of two basic devices: a reader and tag. Recently with the development of the technology, SAW-RFID (Surface Acoustic Wave Radio Frequency Identification) tags come into market with acceptable price, as well as its size tends to miniaturization. We propose to use 3D wireless indoor localization system to detect the position of the tags. The reader converts radio waves returned from the SAW-RFID tag into a form, which can be useful to process the information. The system consists of SAW-RFID tags placed on the object and several RF Readers in the room. The readers sequentially transmit the impulse signals which are then reflected from different tags and received by readers. Then a signal round-trip TOA (Time of Arrival) between tags and readers can be estimated. We define a 3D coordinate system of the readers and calculate the positions of the tags using suitable specific algorithm. Our system is design to monitor a human body position. The goal is to detect a tumble of solitary living people. A case when the tag positions are identified to be below a per-set threshold means that something happened, and maybe a man has fallen on the ground. This emergency situation can be detected by the monitoring system which then sends information to an alarm system which can call the health centre to take care of the patient. In this paper, a 5 m×5 m×3 m indoor localization system is implemented in Matlab. The simulation results show a correct identification of a fallen man and accuracy of the high measurement below 30 cm.

    Download full text (pdf)
    FULLTEXT01
  • 35.
    Georgsson, Mattias
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Kushniruk, A.
    School of Health Information Science, University of Victoria, VIC, Canada.
    Mediating the cognitive walkthrough with patient groups to achieve personalized health in chronic disease self-management system evaluation2016In: Studies in Health Technology and Informatics, IOS Press, 2016, Vol. 224, p. 146-151Conference paper (Refereed)
    Abstract [en]

    The cognitive walkthrough (CW) is a task-based, expert inspection usability evaluation method involving benefits such as cost effectiveness and efficiency. A drawback of the method is that it doesn’t involve the user perspective from real users but instead is based on experts’ predictions about the usability of the system and how users interact. In this paper, we propose a way of involving the user in an expert evaluation method by modifying the CW with patient groups as mediators. This along with other modifications include a dual domain session facilitator, specific patient groups and three different phases: 1) a preparation phase where suitable tasks are developed by a panel of experts and patients, validated through the content validity index 2) a patient user evaluation phase including an individual and collaborative process part 3) an analysis and coding phase where all data is digitalized and synthesized making use of Qualitative Data Analysis Software (QDAS) to determine usability deficiencies. We predict that this way of evaluating will utilize the benefits of the expert methods, also providing a way of including the patient user of these self-management systems. Results from this prospective study should provide evidence of the usefulness of this method modification. © 2016 The authors and IOS Press. All rights reserved.

  • 36.
    Gislen, Mikael
    Blekinge Institute of Technology, School of Computing.
    Dysfunctional aspects of Software Development: An analysis of how lip-service, deception and organisational politics may side-track the result of well-intended methodologies2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    This paper tries to identify and understand the human social obstacles for developing quality software. These include lip-service, cutting corners, deception and effects of internal politics. These obstacles can undermine the good intentions behind the software methodologies. The paper draws from the literature in different disciplines and uses an ethnographic research methodology to create a rich picture of the concerning aspects in the framework of one software development company in India. What stands out among the findings are that internal audits has mainly focused on finding errors in documentation procedures but study of the actual practices has often been shallow. In addition the understanding of business risks by the internal auditors have often been weak. Context. The human based obstacles affecting Software Development Methodology analysed in the context of an ISO 9000 quality system in an Indian Software Development company working mainly with Swedish companies. Objectives. Identifying and increasing the understanding of intrinsic negative social aspects such as lip service, cheating and politics which are affecting the results of Software Development Methodologies and if possible suggest some means to mitigate them. In particular to create a deeper understanding of why people cheat and pay lip service to methodologies and to try to understand the political aspects of methodology and quality systems. There are other positive social aspects, but they are not considered since the objective is about understanding the negative aspects and possibly mitigate them. Methods. Ethnographic research using analysis of ISO 9000 and design artefacts, semi-structured interviews, participation in internal audits, Results. Most focus in audits was on documentation and very less focus on underlying methodologies, some indications of lip-service to process and processes were also mainly managed on a higher level in the organization while the understanding and practices were less well established on lower level. It was hard to get a grip on the internal political aspects since the perception of the subject in the informants view was that it is mainly malicious and therefore embarrassing to speak about. Some conflicts between internal quality goals and customers’ needs were also identified. Conclusions. An ethnographic research methodology gives a rich picture. The analysis gives deeper understanding of the problem areas, but not necessary solutions. The author suggests that at the heart of the problem is a difference in world view. Software professionals generally tend to resolve [technical] problems using a reductionist approach, while these intricate challenges cannot easily be resolved by this approach. A more holistic systemic approach is required and while the software methodology is useful to structure the development it does not resolve these dysfunctions. They have to be resolved on another level. It was also found that further studies is required in particular to better understand Internal politics, the effect of Positive and Negative Incentives, the effect of software metrics on quality performance and subjectivity in customers’ perception and expectation.

    Download full text (pdf)
    FULLTEXT01
  • 37.
    Guo, Hong
    et al.
    Anhui Univ, CHN.
    Li, Jingyue
    Norwegian Univ Sci & Technol, NOR.
    Gao, Shang
    Orebro Univ, SWE.
    Šmite, Darja
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Agile Enterprise Architecture by Leveraging Use Cases2021In: ENASE: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING / [ed] Ali, R, Kaindl, H, Maciaszek, L, SciTePress, 2021, no 16th International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), p. 501-509Conference paper (Refereed)
    Abstract [en]

    Despite benefits Enterprise Architecture (EA) has brought, EA has also been challenged due to its complexity, heavy workload demands, and poor user acceptance. Researchers and practitioners proposed to use EA in an agile and "business outcome-driven" way. This means that EA should not primarily be developed and used according to a pre-defined framework. Instead, EA should be developed and used for specific business purposes and by means of concrete deliverables. By doing so, a more effective and efficient way of EA application could be enabled. However, there is no common agreement on what types of business goals can be expected to be achieved by using EA (The What) and how to achieve these goals through EA solutions (The How). To address these issues, we analysed the information provided by leading EA tool vendors available on their websites to get inspiration. The results showed that Use Cases (UCs) are used generally to motivate potential EA users by focusing on specific business issues. Then, EA solutions to address such business requirements or challenges are scoped and derived accordingly. We expect relevant findings could bring inspiration to agile EA engineering, change the EA heavy-weight" reputation, and improve the application of EA even among its sceptics.

  • 38.
    Guo, Hong
    et al.
    Anhui Univ, CHN.
    Li, Jingyue
    Norwegian Univ Sci & Technol, NOR.
    Gao, Shang
    Orebro Univ, SWE.
    Šmite, Darja
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Boost the Potential of EA: Essential Practices2021In: ICEIS: PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS - VOL 2 / [ed] Filipe, J, Smialek, M, Brodsky, A, Hammoudi, S, SciTePress, 2021, no 23rd International Conference on Enterprise Information Systems (ICEIS), p. 735-742Conference paper (Refereed)
    Abstract [en]

    Enterprise Architecture (EA) has been applied widely in industry as it brings important benefits to ease communication and improve business-IT alignment. However, various challenges were also reported due to the difficulty and complexity of applying it. Some empirical studies showed that EA stilled played a limited role in many organizations. In this research, we showed other findings where the potential of EA could be better used. They are derived from our analysis of advanced EA tool recommendations. Based on these findings, we proposed four essential EA practices and the rationales behind them in order to improve the understanding of current practices and bring insights for future studies to boost the potential of EA.

  • 39.
    Guo, Hong
    et al.
    Anhui University, CHN.
    Li, Jingyue
    Norwegian University of Science and Technology, NOR.
    Gao, Shang
    Örebro University, SWE.
    Šmite, Darja
    Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
    Understanding How Enterprise Architecture Contributes to Organizational Alignment2021In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) / [ed] Dennehy D., Griva A., Pouloudi N., Dwivedi Y.K., Dwivedi Y.K., Pappas I., Pappas I., Mantymaki M., Springer Science and Business Media Deutschland GmbH , 2021, p. 383-396Conference paper (Refereed)
    Abstract [en]

    Alignment is one of the most important benefits that Enterprise Architecture (EA) could bring to organizations. However, it is still unclear what mechanism EA uses to help organizations achieve alignment. Related research is very scattered, making it difficult to accumulate relevant knowledge and experiences, and thus, the more successful EA application is hindered. To address this issue, the present research examines essential requirements of alignment and mechanisms with which underlying EA deliverable models impact organizations. By doing so, we proposed a conceptual framework explaining how EA modeling activities contribute to organizational alignment. We demonstrated the use of this framework with three use cases. The results show that EA could help organizations achieve alignment in quite different ways, and our proposed framework helped us examine and understand the mechanisms. We expect this research could establish an essential common understanding of how EA enables organizational alignment, thereby facilitating academia to move forward in this field. © 2021, IFIP International Federation for Information Processing.

  • 40.
    Hagos, Samuel
    Blekinge Institute of Technology, School of Computing.
    Assessment of Business Process Reengineering Implementation and Result within Ethiopian Ministry of Health and Gambella Regional Health Bureau Contexts2012Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    For many years, the tight bureaucratic and task centered approaches of civil service institutions of Ethiopia led to fragmentation, overlap and duplications of efforts than being responsive, flexible and customer focus. To this end, Business Process Reengineering (BPR) has been considered as a government sector technique to help organizations fundamentally rethink how they do their work in order to dramatically improve customer service, cut operational costs, become responsive, flexible and customer focus. BPR has great potential for increasing productivity through reduced process time and cost, improved quality, and greater customer satisfaction, but it often requires a fundamental organizational change. Despite the numerous advantages of BPR in terms of responsiveness, flexibility and customer focus, its implementation is perceived to be a difficult task and also many unsuccessful experiences have been reported in the literature. In fact, there are very few survey researches that attempt to highlight the kinds of activities that the organizations should pursue to ensure a reasonable transition to the new process; manage the human and technical issues surrounding implementation of the new process; and assess the results of its reengineering efforts. But these researchers saw the issues from private cooperative organizational perspectives and contexts. Besides, most of the discussions and findings were stretched up to showing that successful BPR implementations process are mainly associated with the organizations capability in managing changes. The researches paid no attention to other factors, like the issues of enabler, tools and techniques which can be utilized to build momentum. Hence, the present research investigated the factors associated with successful implementations of BPR projects in the contexts of public institutions. Based on a case study conducted in Ethiopian Ministry of Health and Gambella Regional Health Bureau; this research attempted to provide guidelines and best practices in public service providing institutions that will help them to achieve dramatic performance gains while implementing BPR projects. A cross sectional, qualitative and quantitative study was conducted taking 90 respondents and 20 interviewees as study subjects. Data were collected from June 1 to July 31 2010. A structured questionnaire was filled by 90 respondents where 43.3 % of them from Gambella Peoples’ National Regional State Health Bureau and 56.7% of them were from Ethiopian Federal Ministry of Health. The questionnaire was employed to collect data on change management and factors associated with the attainment of performance goals whereas in-depth interviews were utilized to substantiate the findings of questionnaire and investigate the use of information technology as enabler. The in-depth interviews included planners, core process owners and directors. Cross tabulation results imply that there is significant associations between attainment of performance goals and availability of written comprehensive plan for pilot test, refinement and implementation of change management plan, availability of communication strategy, placement of performance measures, motivation to take new roles and responsibilities, Use of information technology as enabler and pilot testing to evaluate new process. Hence, the findings of this research suggest that reengineering project implementation is complex, involving many factors. To succeed, it is essential that change be managed and that balanced attention be paid to all identified factors, including those that are more contextual (e.g., management support and technological competence), performance management, availability of comprehensive implementation plan, communication strategies, refinement and implementation of change management plan, use of pilot testing to evaluate new process, motivation to take new roles and responsibilities and usage information technology as enabler.

    Download full text (pdf)
    FULLTEXT01
  • 41.
    Harengel, Peter
    Blekinge Institute of Technology, School of Computing.
    Three Tales of Dominant Technological Artifacts: Tracing the Paths from Success to Domination of Software Applications with the Help of Latour's Actor-Network-Theory and Bourdieu's Capital Theory2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Domination in the software application industry has been an issue since its early years. But how do these situations of market domination come into existence? This thesis discusses conventional approaches towards understanding market domination and their inherent weaknesses. As a result a new understanding, based on Actor-Network-Theory and Capital Theory unfolds, which achieves the uncovering of a much deeper complexity on how market domination comes into existence.

    Download full text (pdf)
    FULLTEXT01
  • 42.
    Hartman, Kim
    Blekinge Institute of Technology, School of Computing.
    How do intrinsic and extrinsic motivation correlate with each other in open source software development?2011Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [sv]

    Open source is growing outside the boundaries of hackers, amateurs and software development, creating a humongous potential in many different areas and aspects of society. The intrinsic and extrinsic motivations that drives open source have been in the subject of much research recently, but how they affect each other when paid and unpaid contributors come together is still hidden in obscurity. In this study I investigate how intrinsic and extrinsic motivation correlates with each other and how those correlations affect paid and unpaid open source software contributors. The literature synthesis is based on of systematic reviews through searches in library databases, identification of articles by searching on the Internet and by reading relevant books. My results indicate that intrinsic and extrinsic motivations continuously affect each other and that paid contributors are more vulnerable since their extrinsic motivation in terms of money is reached only when many other motivations are fulfilled. The paid contributor’s lower autonomy may result in a decrease in intrinsic motivation while social interaction may result in an increase of the same. The unpaid contributors are more likely to be intrinsically motivated than the paid contributors, resulting in higher psychological satisfaction, less stress, creativity and input of higher work effort among unpaid contributors.

    Download full text (pdf)
    FULLTEXT01
  • 43.
    Haxhixhemajli, Denis
    Blekinge Institute of Technology, School of Computing.
    Visibility Aspects Importance of User Interface Reception in Cloud Computing Applications with Increased Automation2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Visibility aspects of User Interfaces are important; they deal with the crucial phase of human-computer interaction. They allow users to perform and at the same time hide the complexity of the system. Acceptance of new systems depends on how visibility aspects of the User Interfaces are presented. Human eyes make the first contact with the appearance of any system by so it generates the very beginning of the human – application interaction. In this study it is enforced that visibility aspects are essential in application development. Furthermore, it is stressed that with practice of automation, habitual and functional visibility fades and users lose control. Users accept visibility loss only at certain points where it does not impact their skillset and understanding of an application. Although, they prefer control over visibility aspects and automation to strengthen the reception of the User Interface. The environments used in this study are Google Docs, Dropbox and cloudHQ with a case study of collaboration involving five users.

    Download full text (pdf)
    FULLTEXT01
  • 44.
    Hedman Surlien, Peter
    Blekinge Institute of Technology, Faculty of Engineering, Department of Industrial Economics.
    Economic advantages of Blockchain technology VS Relational database: An study focusing on economic advantages with Blockchain technology and relational databases2018Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Many IT-systems are when created not designed to be flexible and dynamic resulting in old and complex systems hard to maintain. Systems usually build their functionality and capability on the data contained in their databases. The database underlines such system, and when data do not correspond between different and synchronizing systems, it is a troublesome debugging process. This is because systems are complex and the software architecture is not always easy to understand. Due to increasing complexity in systems over time, making systems harder to debug and understand, there is a need for a system that decreases debugging costs. Furthermore, result in better transaction costs. This study proposes a system based on blockchain technology to accomplish this.

     

    An ERP system based on blockchain with encrypted transactions was constructed to determine if the proposed system can contribute in better transaction costs. A case study at multiple IT-companies and comparison to an existing ERP system module validated the system. A successful simulation showed that multiple parts could read and append data to an immutable storage system for one truth of data. By all counts, and with proven results, the constructed blockchain solution based on encrypted transactions for an ERP system can reduce debugging costs.

     

    It is also shown that a centralized database structure where external and internal systems can get one truth of data, decreases transaction costs. However, it is the decision makers in companies that need to be convinced for the constructed system to be implemented. A problem is also when modifications to the object type, then historical transactions cannot be changed in an immutable storage solution. Blockchain is still a new technology, and the knowledge of the technology and the evolution of the system determines if the proposed software architecture will result in better transaction costs.

    Download full text (pdf)
    fulltext
  • 45.
    Hossen, Md.Showket
    et al.
    Blekinge Institute of Technology, School of Computing.
    Islam, Md.Neharul
    Blekinge Institute of Technology, School of Computing.
    QoS Performance Evaluation of Video Conferencing over LTE2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Mobile data usage has been on the rise in relation to the streaming media such as video conferencing and online multimedia gaming. As a result, Long-Term Evolution (LTE) has earned a rapid rise in popularity during the past few years. The aim of this master’s thesis is to analyze the quality of service (QoS) performance and its effects when video is streamed over a GBR (Guaranteed bit rate) and non-GBR bearers over LTE. Using OPNET (Optimized Network Engineering Tool), the performance can be simulated having Downlink (DL) and Uplink (UL) scenarios for video conferencing including web traffic. Further we also measured the performance of packet End-to-End (E2E) delay, packet loss and packet delay variation (PDV). This thesis work is an empirical work, which can be followed up by further research propositions.

    Download full text (pdf)
    FULLTEXT01
  • 46.
    Idrisoglu, Alper
    Blekinge Institute of Technology, Faculty of Engineering, Department of Health. Blekinge Institute of Technology.
    Voice for Decision Support in Healthcare Applied to Chronic Obstructive Pulmonary Disease Classification: A Machine Learning Approach2024Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Background: Advancements in machine learning (ML) techniques and voice technology offer the potential to harness voice as a new tool for developing decision-support tools in healthcare for the benefit of both healthcare providers and patients. Motivated by technological breakthroughs and the increasing integration of Artificial Intelligence (AI) and Machine Learning (ML) in healthcare, numerous studies aim to investigate the diagnostic potential of ML algorithms in the context of voice-affecting disorders. This thesis focuses on respiratory diseases such as Chronic Obstructive Pulmonary Disease (COPD) and explores the potential of a decision support tool that utilizes voice and ML. This exploration exemplifies the intricate relationship between voice and overall health through the lens of applied health technology (AHT. This interdisciplinary nature of research recognizes the need for accurate and efficient diagnostic tools.

    Objective: The objectives of this licentiate thesis are twofold. Firstly, a Systematic Literature Review (SLR) thoroughly investigates the current state of ML algorithms in detecting voice-affecting disorders, pinpointing existing gaps and suggesting directions for future research. Secondly, the study focuses on respiratory health, specifically COPD, employing ML techniques with a distinct emphasis on the vowel "A". The aim is to explore hidden information that could potentially be utilized for the binary classification of COPD vs no COPD. The creation of a new Swedish COPD voice classification dataset is anticipated to enhance the experimental and exploratory dimensions of the research.

    Methods: In order to have a holistic view of a research field, one of the commonly utilized methods is to scan and analyze the literature. Therefore, Paper I followed the methodology of an SLR where existing journal publications were scanned and synthesized to create a holistic view in the realm of ML techniques employed to experiment on voice-affecting disorders. Based on the results from the SLR, Paper II focused on the data collection and experimentation for the binary classification of COPD, which was one of the gaps identified in the first study. Three distinct ML algorithms were investigated on the collected datasets through voice features, which consisted of recordings collected through a mobile application from participants 18 years old and above, and the most utilized performance measures were computed for the best outcome. 

    Results: The summary of findings from Paper I reveals the dominance of Support Vector Machine (SVM) classifiers in voice disorder research, with Parkinson's Disease and Alzheimer's Disease as the most studied disorders. Gaps in research include underrepresented disorders, limited datasets in terms of number of participants, and a lack of interest in longitudinal studies. Paper II demonstrates promising results in COPD classification using ML and a newly developed dataset, offering insights into potential decision support tools for COPD diagnosis.

    Conclusion: The studies covered in this dissertation provide a comprehensive literature summary of ML techniques used to support decision-making on voice-affecting disorders for clinical outcomes. The findings contribute to understanding the diagnostic potential of using ML on vocal features and highlight avenues for future research and technology development. Nonetheless, the experiment reveals the potential of employing voice as a digital biomarker for COPD diagnosis using ML.

    Download full text (pdf)
    fulltext
  • 47.
    Iqbal, Irfan
    et al.
    Blekinge Institute of Technology, School of Computing.
    Qadir, Bilal
    Blekinge Institute of Technology, School of Computing.
    Biometrics Technology: Attitudes & influencing factors when trying to adopt this technology in Blekinge healthcare2012Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Context. Biometric technology is a secure and convenient identification method and it does not need to remember complex passwords, nor smart cards, keys, and the like. Biometrics is the measurable characteristics of individuals based on their behavioral patterns or physiological features that can be used to verify or recognize their identity. Physical characteristics include fingerprints, palm or hand geometry, iris, retina, and facial characteristics. Behavioral characteristics include signature, keystroke and voice pattern. With the combination of biometric technology products and modern computer technology, it is easy to perform monitoring, management, systems integration, automated management, and security applications. Objective. The aim of this research is to explore and clarify the main influencing factors and attitudes concerning biometrics Security technology by analyzing expert opinions. This is done through informal interviews and a web based survey in Blekinge healthcare. Methods. Literature review was the starting phase to map the current state of research in biometric technology implementation. The literature review helped authors to explore and solve different ambiguities in authors’ minds, related to work flow, methods and procedures for different tasks. In our research, we selected five different interviewees from biometric solution supplier companies in Sweden and Denmark, Blekinge healthcare staff, biometric technology technical staff and IT security concerned to express their experiences, opinions and domain knowledge about the implementation of biometrics system in the county of Blekinge. Due to the resource and limited time constraint authors selected survey as a data collection procedure. In survey we planned a questionnaire with the different people related to healthcare. The questionnaire purpose was to collect the quantitative data and our questionnaire was relying on close ended questions. Results. It is analyzed that people have trust on biometrics system and in future they are agreed to face changing in the current system as well as the people who are related with healthcare system are already aware about biometrics and they will easily adopt the implementation of biometric system in healthcare. Conclusion. In concern of user acceptance it is analyzed that people have trust on biometrics system and in future they are agreed to face changing in the current system. In concern of implementation authors analyzed that it is very necessary to conduct a study in order to analyze the requirement of different actors that will participate in biometrics systems. In concern of cost Authors observed that for cost benefit advantage in the initial implementation stages the finger print technology could be a better selection as compared to other available biometric technologies. In concern of security there are strong reasons that biometrics could be implemented because there are many secure authentication devices related to biometrics are available in the market that could secure data in best possible way. Authors observed that there is a need of legislations for biometrics as the security measures going to be much higher as compared to the traditional password systems. In concern of privacy authors observed that the organizations are demanding strong authentication and focus on suggesting biometrics because it could provide advantages to patients, healthcare staff and healthcare providers.

    Download full text (pdf)
    FULLTEXT01
  • 48.
    Issa, Yosur
    et al.
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Gauffin, Johan
    Blekinge Institute of Technology, Faculty of Engineering, Department of Mechanical Engineering.
    Design Of Smart Toothbrush: For cause-and-effect studies2021Independent thesis Advanced level (professional degree), 20 credits / 30 HE creditsStudent thesis
    Abstract [sv]

    Genom åren har det funnits en marknad för att förhindra samt öka chanserna att bli gravid. Individer har vänt sig till appar för hjälp, där syftet har varit att öka individenskunskap om när fertilitetfönstret sker under cyklens gång. Fertilitetfönstret kan upptäckas genom olika metoder. Under studiens gång las fokus på att bygga uppförståelse för basal kroppstemperatur. Därefter vidareutvecklades en smart tandborste integrerat med en temperature sensor, med syftet att kunna identifiera korrelation mellan basal kroppstemperatur och ägglossning.

    Syftet var att undersöka om en smart tandborste integrerat med en temperatur sensor, kunde identifiera potential ägglossning. Identifiering kunde skapas genom finna den potentiella sambandet mellan basal kroppstemperatur och ägglossning. Produktenskapades genom användning av maskininlärningsteknik. Det uppsatta syftet svaradepå forskningsfrågorna; kan maskininlärningstekniker stödja förutsägelse av ägglossning från basal kroppstemperatur (förkortning Eng: BBT) med en smart tandborste och hur ska en temperatursensor integreras i en elektrisk tandborste?

    Fördjupningsarbetet delades in i tre delar, undersökning av basal kroppstemperatur, data analys och produktdesign. En litteraturstudie utfördes av alla delar där undersökning om vilka likheter kroppstemperatur har mot basal kroppstemperatur, hur data analys kan användas till att upptäcka ägglossning med basal kroppstemperatur, och hur en produkt kan bäst designas för målen i arbetet. Före påbörjandet av examensarbete, samlades 11 individers basal kroppstemperatur in. Den valda metoden för att vidare analysera den givna data kallas för k-means clustering. Underdataanalysen ändrades antalet grupperingar för att finna grupper där potentiell ägglossning kunde ha uppstått. Validering av dessa potentiella grupper gjordes med data hämtat från hemsidan my monthly cycle. För produktutveckling användes flera olika tekniker, för att vägleda samt analysera produkten från olika perspektiv.

    Genom noggrann mätning av kroppstemperatur kunde den basala kroppstemperaturen uppskattas, med en okänd noggrannhet. Kluster av den för-insamlade dataformades och visade att vissa grupper kunde tolkas ha potential till ägglossning. Dessa potentiella grupper kunde valideras till att ha majoriteten av ägglossningsdata tilldelat till dem när färre grupperingar gjordes. En optimal prototyp skapades med hänsyn på hållbarhet, och bekvämlighet, både för bruk och minskning av sysslor.

    Sammanfattningsvis visade användning av klusteranalys ha en potentiell möjlighetför att kunna detektera ägglossning hos kroppstemperatur data som samlas in med en smart tandborste. För framtida forskning bör en tandborstdesign först skapas för att samla in basal kroppstemperatur data, där följaktligen blir att använda den insamlade datan till data analysen

    Download full text (pdf)
    fulltext
  • 49.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Atif, Yacine
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Wang, Wei
    Högskolan i Skövde, Institutionen för ingenjörsvetenskap.
    A Semantic Framework With Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production Systems2020In: Risks and Security of Internet and Systems: 14th International Conference, CRiSIS 2019, Hammamet, Tunisia, October 29–31, 2019, Proceedings / [ed] Slim Kallel, Frédéric Cuppens, Nora Cuppens-Boulahia, Ahmed Hadj Kacem, Springer , 2020, p. 128-143Conference paper (Refereed)
    Abstract [en]

    Criticalmanufacturingprocessesinsmartnetworkedsystems such as Cyber-Physical Production Systems (CPPSs) typically require guaranteed quality-of-service performances, which is supported by cyber- security management. Currently, most existing vulnerability-assessment techniques mostly rely on only the security department due to limited communication between di↵erent working groups. This poses a limitation to the security management of CPPSs, as malicious operations may use new exploits that occur between successive analysis milestones or across departmental managerial boundaries. Thus, it is important to study and analyse CPPS networks’ security, in terms of vulnerability analysis that accounts for humans in the production process loop, to prevent potential threats to infiltrate through cross-layer gaps and to reduce the magnitude of their impact. We propose a semantic framework that supports the col- laboration between di↵erent actors in the production process, to improve situation awareness for cyberthreats prevention. Stakeholders with dif- ferent expertise are contributing to vulnerability assessment, which can be further combined with attack-scenario analysis to provide more prac- tical analysis. In doing so, we show through a case study evaluation how our proposed framework leverages crucial relationships between vulner- abilities, threats and attacks, in order to narrow further the risk-window induced by discoverable vulnerabilities.

  • 50.
    Jiang, Yuning
    et al.
    Högskolan i Skövde, Forskningsmiljön Informationsteknologi.
    Jeusfeld, Manfred A.
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Ding, Jianguo
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories2021In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Association for Computing Machinery (ACM) , 2021, p. 1-10, article id 86Conference paper (Refereed)
    Abstract [en]

    Modern security practices promote quantitative methods to provide prioritisation insights and support predictive analysis, which is supported by open-source cybersecurity databases such as the Common Vulnerabilities and Exposures (CVE), the National Vulnerability Database (NVD), CERT, and vendor websites. These public repositories provide a way to standardise and share up-to-date vulnerability information, with the purpose to enhance cybersecurity awareness. However, data quality issues of these vulnerability repositories may lead to incorrect prioritisation and misemployment of resources. In this paper, we aim to empirically analyse the data quality impact of vulnerability repositories for actual information technology (IT) and operating technology (OT) systems, especially on data inconsistency. Our case study shows that data inconsistency may misdirect investment of cybersecurity resources. Instead, correlated vulnerability repositories and trustworthiness data verification bring substantial benefits for vulnerability management. 

123 1 - 50 of 109
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf