Change search
Refine search result
12 1 - 50 of 95
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Ahmed Farah, Mariam
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A study on the acquisition of ICT literacy skills among Swedish immigrants with low ICT literacy skills2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Background: Sweden is getting digitalized rapidly, which puts a higher requirement on those who move to Sweden. The ability to adapt and handle different digital solutions is a determining factor in one's ability to exercise life choices fully, as well as being able to access public service and information. Citizens’ digital competencies are a key factor in the structural digital transformation that can occur. Problem: An area that has not been as well studied is immigrants’ acquisition of ICT skills, who do not have high ICT skills while using observation as a data collection method. There is a gap in this research area in locating problems they face when they acquire ICT skills. Research question: What problems do Swedish immigrants with low ICT literacy skills face when they acquire ICT skills? Method and sample: This thesis’s chosen research strategy was a case study executed in a municipality that offers ICT classes to its citizens who need to acquire ICT skills. The chosen methods to collect data were observation and semi-structured interviews, where two observations and eight interviews were performed, and thematic analysis was applied to the data. The participants were individuals who migrated to Sweden and lived in the chosen municipality, who also were partaking in different municipality initiatives and had limited digital skills. This study was limited to a municipality in Stockholm County. Results: Four themes emerged from the collected data. The first theme is course structure-how to develop skills, which describes how the course structure incorporates the basics of different Microsoft programs and physical computer trade words. The Swedish language would be embedded in the ICT exercise, and the students would practise and get more accustomed to using the keyboard and typing. The second theme, limited ICT experience and technology challenges, has shown that those students with formal education up to primary school and those students with minimum primary and up to secondary education i.e. both classes, were at the same low ICT skills level despite different educational background. They were not exposed to computer lessons and if they were exposed, they were not required to learn ICT skills. The third theme, language barrier -adaptation to technology, elements that have emerged were the extent to which Google Translate was used by the students. Some students would start to write on their phones in their native language and then write the translated text on the document. The teacher would also teach the students how to change language settings in programs to their native language so that language would not hinder them from using the program. The fourth and final theme, motivation for learning, shows a thirst and need to learn more ICT skills among the students in both classes, and according to them, they are required to have a certain digital skill level if they want to live and work in Sweden. There is a need to be more independent in their day-to-day life, as most interactions with the Swedish government are on ICT platforms and other aspects of daily life. This is also reflected in the course curriculum that was observed in EC and sfi classes. Conclusions: The challenges experienced by Swedish immigrants with low ICT skills were starting off with low ICT skills and learning ICT in a new foreign language. Also, the lack of ICT skills and language hinders their ability to be independent and confident when learning. Instead, they require confirmation from their teachers because they do not want to make a mistake. The lessons offered to them are limited in time, and they lack the opportunity and time to practice and learn ICT skills at home on their own. They need more resources to acquire the skills effectively.

  • 2.
    Alendal, Gunnar
    et al.
    NTNU, Norge.
    Axelsson, Stefan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Dyrkolbotn, Geir Olav
    NTNU, Norge.
    LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION2021In: Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / [ed] Gilbert Peterson; Sujeet Shenoi, Springer Nature , 2021, p. 111-133Chapter in book (Refereed)
    Abstract [en]

    Modern consumer devices present major challenges in digital forensic investigations due to security mechanisms that protect user data. The entire physical attack surface of a seized device such as a mobile phone must be considered in an effort to acquire data of forensic value. Several USB protocols have been introduced in recent years, including Power Delivery, which enables negotiations of power delivery to or from attached devices. A key feature is that the protocol is handled by dedicated hardware that is beyond the control of the device operating systems. This self-contained design is a security liability with its own attack surface and undocumented trust relationships with other peripherals and the main system-on-chips. This chapter presents a methodology for vulnerability discovery in USB Power Delivery implementations for Apple devices. The protocol and Apple-specific communications are reverse engineered, along with the firmware of the dedicated USB Power Delivery hardware. The investigation of the attack surface and potential security vulnerabilities can facilitate data acquisition in digital forensic investigations.

  • 3.
    Alendal, Gunnar
    et al.
    NTNU, Norge.
    Dyrkolbotn, Geir Olav
    NTNU, Norge.
    Axelsson, Stefan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    DIGITAL FORENSIC ACQUISITION KILL CHAIN – ANALYSIS AND DEMONSTRATION2021In: Advances in Digital Forensics XVII: 17th IFIP WG 11.9 International Conference, Virtual Event, February 1–2, 2021, Revised Selected Papers / [ed] Gilbert Peterson; Sujeet Shenoi, Springer Nature , 2021, p. 3-19Chapter in book (Refereed)
    Abstract [en]

    The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.

  • 4. Antosz, Patrycja
    et al.
    Verhagen, Harko
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Qualitative Data in the Service of Model Building: The Case of Structural Shirking2020In: Advances in Social Simulation: Looking in the Mirror / [ed] Harko Verhagen, Melania Borit, Giangiacomo Bravo, Nanda Wijermans, Springer, 2020, p. 33-45Conference paper (Refereed)
    Abstract [en]

    This chapter shows how qualitative data can inform building computational models. The general issue is illustrated with the example of a model of structural shirking in organisations, i.e. insufficient time and effort stemming from the structure of the performed work. The first attempt to build a model of shirking with the use of assumptions present in social scientific theories displayed many shortcomings. Thus, a mixed-methods approach was chosen to inform the development of a second computational model. Conceptualising the second model began with performing individual IDIs with managers and lower-level employees and augmenting them with analyses of Polish legislation regulating employment relationships. Initial findings were enriched with theoretical assumptions. The complete concept of the mechanism of structural shirking was operationalised as acomputational model. Having developed both models, we discuss the phenomenon of shirking informing theories and real-world practices, as well as ways to study these practices in novel forms.

  • 5.
    Araújo, Marco
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Confraria, João
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Sweden International Institute for Applied Systems Analysis (IIASA), Austria.
    A Utility Based Price Model for High Capacity Rural Networks in the European Union2018In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, 2018, p. 253-258Conference paper (Refereed)
    Abstract [en]

    The European Union has been battling against the digital divide for several decades now when trying to mitigate the risk of social exclusion arising from the lack of broadband access, preventing citizens from full social and economic participation in the society. This has been done in the past by ensuring that a minimum set of services would be available to all end-users at an affordable price. However, various aspects of the rapid advances in technology, market developments and changes in user demand as well as the evolution of the telecommunications infrastructure (5G, IoT, Cloud, gigabit access, etc) increase the risk that citizens of rural areas are facing a severe risk of digital exclusion. To avoid this risk, the concept of subsidised rural networks was created by the European Commission. The idea as such is laudable, but the price tag remains unknown, which severely violates its implementability. In this article, based on the actual cost in a subsidised, but competitive, environment, we suggest a novel approach to realistically determine fair end-user's prices.

  • 6.
    Araújo, Marco
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis (IIASA), Austria.
    Confraria, João
    Rural Networks Cost Comparison Between 5G (Mobile) and FTTx (Fixed) Scenarios2018In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE, 2018, p. 259-264Conference paper (Refereed)
    Abstract [en]

    In this article we simulate the infrastructure costs for very fast networks in rural areas. FTTH technology has been around for at least a decade, but two brand new technologies are expected to launch commercially in the next couple of years: 5G and G. Fast. This could have a strong impact on infrastructure costs and the fulfilment of the European Union, rural coverage objectives. 5G seems to be very promising since LTE is not a reasonable solution for very fast networks. FTTC has so far not been a valid alternative, since for the last mile, the only options for FTTC has been ADSL and VDSL, which however cannot reach very fast data rates. G.Fast is three times faster than VDSL and has the advantage, comparing to FTTH, that the last mile infrastructure is already build in the form of copper local loop.

  • 7.
    Ayele, Workneh Yilma
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Improving the Utilization of Digital Services - Evaluating Contest-Driven Open Data Development and the Adoption of Cloud Services: Evaluating Contest-Driven Open Data Development and the Adoption of Cloud Services2018Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    There is a growing interest in the utilization of digital services, such as software apps and cloud-based software services. The utilization of digital services enabled by ICT is increasing more rapidly than any other segment of the world trade. The availability of open data unlocks the possibility of generating huge market possibilities in the public and private sectors such as manufacturing, transportation, and trade. Digital service utilization can be improved by the adoption of cloud-based software services and through open data innovation for service development. However, open data has no value unless utilized and little is known about the development of digital services using open data. The use of contests to create awareness and call for crowd participation is vital to attract participation for digital service development. Also, digital innovation contests stimulate open data service development and are common means to generate digital services based on open data. Evaluation of digital service development processes stimulated by contests all the way to service deployment is indispensable. In spite of this, existing evaluation models are not specifically designed to measure open data innovation contest. Additionally, existing cloud-based digital service implications, opportunities and challenges, in literature are not prioritized and hence are not usable directly for adoption of cloud-based digital services. Furthermore, empirical research on user implications of cloud-based digital services is missing. Therefore, the purpose of this thesis is to facilitate the utilization of digital services by the adoption of cloud-based digital services and the development of digital services using open data. The main research question addressed in this thesis is: “How can contest-driven innovation of open data digital services be evaluated and the adoption of digital services be supported to improve the utilization of digital services?” The research approaches used are design science research, descriptive statistics, and case study for confirming the validity of the artifacts developed. The design science approach was used to design new artifacts for evaluating open data service development stimulated by contests. The descriptive statistics was applied on two surveys. The first one is for evaluating the implication of cloud-based digital service adoption. While the second one is a longitudinal survey to measure perceived barriers by external open data digital service developers. In this thesis, an evaluation model for digital innovation contest to stimulate service development, (Digital Innovation Contest Measurement Model) DICM-model, and (Designing and Refining DICM) DRD-method for designing and refining DICM-model to provide more agility are proposed. Additionally, the framework of barriers, constraining external developers of open data service, is also presented to better manage service deployment to enable viable service development. Organizers of open data innovation contests and project managers of digital service development are the beneficiaries of these arti-facts. The DICM-model and the DRD-method are used for the evaluation of contest and post contest deployment processes. Finally, the framework of adoption of cloud-based digital services is presented. This framework enables requirement engineers and cloud-based digital service adoption personnel to be able to prioritize factors responsible for an effective adoption. The automation of ideation, which is a key process of digital service development using open data, developer platforms assessment to suggest ways of including evaluation of innovation, ex-post evaluation of the proposed artifacts, and the expansion of cloud-based digital service adoption from the perspectives of sup-pliers are left for further investigations.

    Download full text (pdf)
    FULLTEXT01
  • 8.
    Berg, Nils
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Fine-tuning and evaluating a Swedish language model for automatic discharge summary gener- ation from Swedish clinical notes2023Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Background

    Healthcare professionals spend large amounts of time on documentation tasks in contemporary healthcare. One such documentation task is the discharge summary which summarizes a care episode. However, research shows that many discharge summaries written today are of lacking quality. One method which has the po- tential to alleviate the situation is natural language processing, specifically text summarization, as it could automatically summarize patient notes into a discharge summary.

    Aim

    This thesis aims to provide initial knowledge on the topic of summarization of Swedish clinical text into discharge summaries. Furthermore, this thesis aims to provide knowledge specifically on performing summarization using the Stockholm EPR Gastro ICD-10 Pseudo Corpus II dataset, consisting of Swedish electronic health record data.

    Method

    Using the design science framework, an artefact was produced in the form of a model, based on a pre-trained Swedish BART model, which can summarize patient notes into a discharge summary. This model was developed using the Hugging Face library and evaluated both via ROUGE scores as well as via a manual evaluation performed by a now retired healthcare professional.

    Results

    The discharge summaries produced from a test set by the artefact model achieved ROUGE-1/2/L/S scores of 0.280/0.057/0.122/0.068. The manual evaluation im- plies that the artefact is prone to fail to accurately include clinically important information, that the artefact produces text with low readability, and that the artefact is very prone to produce severe hallucinations.

    Conclusion

    The artefact’s performance is worse than the results of previous studies on the topic of summarization of patient notes into discharge summaries, in terms of ROUGE scores. The manual evaluation of the artefact performance suggests sev- eral shortcomings in its capabilities to accurately summarize a care episode. Since this was the first major work conducted on the topic of text summarization using the Stockholm EPR Gastro ICD-10 Pseudo Corpus II dataset, there are many possible directions for future works.

    Download full text (pdf)
    FULLTEXT01
  • 9.
    Björklund Boistrup, Lisa
    et al.
    Malmö University, Sweden.
    Selander, StaffanStockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Designs for research, teaching and learning: A framework for future education2022Collection (editor) (Refereed)
    Abstract [en]

    This book offers a coherent theoretical and multimodal perspective on research, teaching, and learning in different non-formal, semi-formal, and formal learning environments. Drawing on examples across a range of different settings, the book provides a conceptual framework for research on learning in different environments. It provides conceptual models around learning design which act as a framework for  how  to  think  about  contemporary  learning,  a  guideline  for  how  to  do  research on learning in different sites, and a tool for innovative, collaborative design with other professionals. The book highlights concepts like multimodal knowledge representations; framing and setting; transformation, transduction, and re-design; signs of learning and cultures of recognition in different social contexts. The  book  supports  innovative  thinking  on  how  we  understand  learning,  and will appeal to academics, scholars, and postgraduate students in the fields of education research and theory, learning sciences, and multimodal and social semiotics. It will also be of interest to school leaders, university provosts, and professionals working in education. 

  • 10.
    Brouwers, Lisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    MicroPox: A Large-Scale and Spatially Explicit Microsimulation Model for Smallpox Planning2005In: The Proceedings of the 15th International Conference on Health Sciences Simulation / [ed] V. Ingalls, San Diego, Calif., 2005, p. 70-76Conference paper (Refereed)
  • 11.
    Brouwers, Lisa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Spatial and Dynamic Modelling of Flood Management Policies in the Upper Tisza2003Report (Refereed)
    Abstract [en]

    Flood management policy has been the subject of an international joint research

    project with the Upper Tisza in Hungary as its pilot study area. Design specications

    for a geographically explicit simulation model are presented. Potential flood

    management policies, based on surveys and interviews with stakeholders, are presented.

    Some experiments on an executable prototype of the simulation model are

    also reported on, where the consequences of flood management policies are investigated.

    Focus has been on nancial policy measures, mainly insurance. Besides

    more traditional evaluation of policy scenarios, the model incorporates adaptive

    optimisation functionality. The report incorporates three contributions:

    1. the insurance policy issue in Hungary is framed in the broader context of flood

    management

    2. the structuring of a flood risk policy model, capable of simulating flood failures

    and estimating the economic consequences

    3. reports from policy experiments performed on the implemented prototype

    flood risk policy model

  • 12.
    Brouwers, Lisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hansson, Karin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    MicroWorlds as a Tool for Policy Making2001Conference paper (Refereed)
    Abstract [en]

    The Hungarian government is experiencing escalating costs for ood mitigation

    measures and for economical compensation to victims. In a joint

    research project between the International Institute of Applied System Analysis

    (IIASA) in Austria, Computer and System Science Department (DSV)

    in Sweden, and the Hungarian Academy of Science, the ooding problem of

    Upper Tisza in Hungary is investigated. A catastrophe simulation model has

    been implemented, where dierent policy options are tested and evaluated.

    We investigate how the willingness to buy insurance aects the results on

    the macro-level and on the micro-level.

  • 13.
    Brouwers, Lisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Verhagen, Harko
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Applying the Consumat Model to Flood Management Policies2003In: Agent-based simulation, 2003Conference paper (Refereed)
    Abstract [en]

    The number and severity of weather related catastrophes is

    increasing. Economic losses from these catastrophes are

    escalating, mainly as a result of concentration of assets and

    population in high-risk areas. How to deal with these

    economic liabilities in a fair way at the level of the individual

    property owners is the focus of our research.

    As a case study we choose the Tisza, a river in Hungary that

    flows through one of the poorest agricultural regions of

    Europe that frequently floods. The use of a simulation model

    for evaluating alternative flood management policies is a

    natural choice, since it is impossible to predict the time,

    location and magnitude of a flood; historical data is of limited

    use when looking at the outcome of future policies. The

    behaviour of the river and the financial consequences are

    simulated on a year-by-year basis.

    Here we have extended the simulation model by using the

    Consumat approach to model the individual property owners.

    We compare the results with respect to wealth distribution in

    the case of Consumat agents and simple (non-Consumat)

    agents. In the Consumat case, the results show that system is

    more dynamic and more realistic.

  • 14.
    Cakici, Baki
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Informed Gaze: On the Implications of ICT-Based Surveillance2013Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information and communication technologies are not value-neutral. I examine two domains, public health surveillance and sustainability, in five papers covering: (i) the design and development of a software package for computer-assisted outbreak detection; (ii) a workflow for using simulation models to provide policy advice and a list of challenges for its practice; (iii) an analysis of design documents from three smart home projects presenting intersecting visions of sustainability; (iv) an analysis of EU-financed projects dealing with sustainability and ICT; (v) an analysis of the consequences of design choices when creating surveillance technologies. My contributions include three empirical studies of surveillance discourses where I identify the forms of action that are privileged and the values that are embedded into them. In these discourses, the presence of ICT entails increased surveillance, privileging technological expertise, and prioritising centralised forms of knowledge.

    Download full text (pdf)
    fulltext
  • 15. Chopra, Amit
    et al.
    van der Torre, LeendertVerhagen, HarkoStockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.Villata, Serena
    Handbook of Normative Multiagent Systems2018Collection (editor) (Other academic)
  • 16.
    Ciobanu, Patricia
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Juhlin, Oskar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Forms of Care in Human–Nature–Technology Environments2022In: Journal of Posthumanism, ISSN 2634-3576, Vol. 2, no 3, p. 249-266Article in journal (Refereed)
    Abstract [en]

    With the ongoing environmental disruptions, designers are increasingly interested in exploring nature–technology entanglements that create sustainable and collaborative futures. Although largely unarticulated, these emerging design inquiries are motivated by care for nature, which indirectly depends on cultural and social human practices. Drawing on a broad set of works on care from feminist theory, science and technology studies, and human–computer interaction, this article introduces a care framework that focuses on revealing tensions in the interrelationship between humans and nonhumans. The framework is used to examine an initial study in which five participants engaged with a speculative design probe, specifically a combination of a device and a plant, envisioning a scenario in which plants generate electricity. We reveal how forms of care manifest differently in a human–plant–technology dynamic and identify tensions, such as plants being considered utilities, proxies, or humans.

  • 17.
    Cunningham, Una
    Stockholm University, Faculty of Humanities, Department of Language Education.
    Liminality and Disinhibition in Online Language Learning2011In: International Review of Research in Open and Distance Learning, E-ISSN 1492-3831, Vol. 12, no 5, p. 25-37Article in journal (Refereed)
    Abstract [en]

    The aim of this paper is to bring theoretical concepts from other areas of scholarly research to bear on synchronous online education in a cross-disciplinary effort to shed light on what is going on by introducing systems of thought from other areas. The liminality and associated communitas which are found in synchronous online learning environments are examined for their possible consequences for learning in general and language learning in particular. Like computer-mediated communication, liminality has been associated with disinhibitory effects. Lack of excessive inhibition has been shown to have positive effects on second language production. The position of the online learner as “neither here nor there” or perhaps simultaneously both here and there is investigated and discussed. 

  • 18.
    Dahlgren, Anna
    et al.
    Stockholm University, Faculty of Humanities, Department of Culture and Aesthetics.
    Hansson, Karin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Stockholm University, Faculty of Humanities, Department of Culture and Aesthetics.
    What an Image Is: The Ontological Gap between Researchers and Information Specialists2021In: Art Documentation, ISSN 0730-7187, E-ISSN 2161-9417, Vol. 40, no 1, p. 21-32Article in journal (Refereed)
    Abstract [en]

    This article investigates how images are understood inside and outside heritage institutions. It focuses on information specialists in libraries, archives, and museums and on a very specific yet substantial end-user group for visual heritage material: university scholars in the humanities. Based on a survey on the production and use of descriptive metadata, this study discloses that there is an ontological divide between these two groups, and that the extensive production of descriptive metadata does not match the needs and interest of researchers in the humanities, but rather other end users. An increased dialogue is needed between these two groups concerning what metadata should be attached to images. This potentially could lead to a broader and more extended scholarly use of visual heritage material.

  • 19. Dai, Bitao
    et al.
    Qin, Shuo
    Tan, Suoyi
    Liu, Chuchu
    Mou, Jianhong
    Deng, Hongzhong
    Liljeros, Fredrik
    Stockholm University, Faculty of Social Sciences, Department of Sociology. Karolinska Institutet, Sweden.
    Lu, Xin
    Identifying influential nodes by leveraging redundant ties2023In: Journal of Computational Science, ISSN 1877-7503, E-ISSN 1877-7511, Vol. 69, article id 102030Article in journal (Refereed)
    Abstract [en]

    Structure-based influential nodes identification is a long-term challenge in the study of complex networks. While global centrality-based approaches are generally considered to be more accurate and reliable, the requirements of complete network information and high computational complexity are hard to meet, limiting their applications in many practical scenarios. In addition, recent studies have highlighted the effect of cyclic structures introducing redundant paths in network connectivity and exaggerating the importance of traditional centrality measures. In this work, we develop a new centrality metric, called Multi-Spanning Tree-based Degree Centrality (MSTDC), to quantify node importance with linear complexity by leveraging redundant ties. MSTDC is calculated using the aggregation of degrees of a small number of spanning trees constructed with a few randomly selected root nodes. Experiments on synthetic and empirical networks reveal that MSTDC obtains superior performance than other benchmark network centralities in identifying influential nodes from the perspective of both maintaining network connectivity and maximizing spreading capacity. In addition, we find that MSTDC is extraordinarily effective in networks with high clustering coefficients. Our study provides novel insights into the role of redundant ties in network structural and functional analyses.

  • 20.
    Danielson, Mats
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, IIASA, Austria.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, IIASA, Austria.
    Efficient and Sustainable Risk Management in Large Project Portfolios2018In: Perspectives in Business Informatics Research: Proceedings / [ed] Jelena Zdravkovic, Jānis Grabis, Selmin Nurcan, Janis Stirna, Springer, 2018, p. 143-157Conference paper (Refereed)
    Abstract [en]

    In an ever-increasing competitive business environment, it has become increasingly important to be able to obtain efficient and sustainable business operations not only by efficient core procedures but also by being able to minimise losses incurred by risk taking. The latter by handling both operational risks and financial risks in a unified model. This is important not least in businesses that handle sets of simultaneous large projects, which is the topic of risk handling in project portfolios. In this paper, we present a novel method for business risk handling for project portfolios under strong uncertainty. The method is based on event trees representing each adverse consequence modelled, together with mitigation costs and effects. The aggregation of all consequences for all projects together constitutes the risk portfolio for the business. This method is used in one of Sweden’s largest manufacturing enterprises having a vast portfolio of projects in the form of ongoing tenders for orders.

  • 21.
    Danielson, Mats
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Space-Time Trade-Off in Decision Analysis Software2018In: New Trends in Intelligent Software Methodologies, Tools and Techniques / [ed] Hamido Fujita, Enrique Herrera-Viedma, IOS Press, 2018, p. 251-258Conference paper (Refereed)
    Abstract [en]

    In decision analysis, there are several problems with the assignment of precise numbers to decision components, such as probabilities, values and weighs. These can very seldom realistically be estimated. Therefore, various alternative approaches have been suggested over the years, such as interval, capacity and ranking models. The more general of these are however problematical from several computational viewpoints and in this article, we deal with the server-side issues when converting the application from a stand-alone PC program to a server-client decision analytical software. On a server with a large number of users, space requirements become paramount as opposed to a single user on a PC. On a PC, matrices can be explicitly stored in memory, while on a server, to save space, matrices might have to be stored in an implicit (compacted) way, leading to space-time trade-offs.

  • 22.
    Danielson, Mats
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, IIASA, Austria.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, IIASA, Austria.
    Komendantova, Nadejda
    A Multi-Stakeholder Approach to Energy Transition Policy Formation in Jordan2018In: Group Decision and Negotiation in an Uncertain World: Proceedings / [ed] Ye Chen, Gregory Kersten, Rudolf Vetschera, Haiyan Xu, Cham: Springer, 2018, p. 190-202Conference paper (Refereed)
    Abstract [en]

    We present the method used in an ongoing project in Jordan for a multi-stakeholder, multi-criteria problem of formulating a nationwide energy strategy for the country for the next decades. The Jordanian government has recognized the need for energy transition and the main goal of the energy strategy is to provide a reliable energy supply by increasing the share of local energy resources in the energy mix, while reducing dependency on imported fossil fuels, by diversifying energy resources, also including renewable energy sources, nuclear and shale oil, and by enhancing environmental protection. There were strong incentives for a collaborative approach, since the ways in which different stakeholder groups subjectively attach meanings to electricity generation technologies are recognized as important issues shaping the attainment of energy planning objectives. To understand the meaning of these constructs, we are using a multi-stakeholder multi-criteria decision analysis (MCDA) approach to elicit criteria weights and valuations.

  • 23.
    Danielson, Mats
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Larsson, Aron
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Mid Sweden University, Sweden.
    A second-order-based decision tool for evaluating decisions under conditions of severe uncertainty2020In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 191, article id 105219Article in journal (Refereed)
    Abstract [en]

    The requirement to assign precise numerical values to model entities such as criteria weights, probabilities, and utilities is too strong in most real-life decision situations, and hence alternative representations and evaluation mechanisms are important to consider. In this paper, we discuss the DecideIT 3.0 state-of-the-art software decision tool and demonstrate its functionality using a real-life case. The tool is based on a belief mass interpretation of the decision information, where the components are imprecise by means of intervals and qualitative estimates, and we discuss how multiplicative and additive aggregations influence the resulting distribution over the expected values.

  • 24.
    Danielson, Mats
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Paulsson, Andreas
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Utilizing Surrogate Numbers for Probability Elicitation2018In: Decision Making / [ed] Fausto Pedro García Márquez, Alberto Pliego Marugán, Mayorkinos Papaelias, IntechOpen , 2018, p. 39-56Chapter in book (Other academic)
    Abstract [en]

    Comparatively few of the vast number of suggested decision-analytical methods have been widely spread in actual practice. The majority of those methods call for exact and accurate numbers as input, which could be one of several reasons for this lack of actual use; people frequently seem to be unfamiliar with, or reluctant to express those, in a sense, “true” values required. Many alternative methods to resolve this complication have been suggested over the years, including procedures for dealing with incomplete information. One way, which has proliferated for a while, is to introduce so-called surrogate numbers in the form of ordinal ranking methods for multi-criteria weights. In this chapter, we show how those can be adapted for use in probability elicitation. Furthermore, when decision-makers possess more information regarding the relative strengths of probabilities, that is, some form of cardinality, the input information to ordinal methods is sometimes too restricted. Therefore, we suggest a testing methodology and analyze the relevance of a set of cardinal ordering methods in addition to the ordinal ones.

  • 25. Denning, Peter J.
    et al.
    Tedre, Matti
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. University of Eastern Finland, Finland.
    Yongpradit, Pat
    Misconceptions about Computer Science2017In: Communications of the ACM, ISSN 0001-0782, E-ISSN 1557-7317, Vol. 60, no 3, p. 31-33Article in journal (Other academic)
  • 26.
    Dryps, Julia Antonina
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Beyond Columbine: Examining Narratives in School Attack Perpetrators’ Communications and the Columbine Fandom2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The aim of this thesis is to investigate and compare the influence of the Columbine High School attack on school attackers and Columbine fandom on Tumblr through documentary research and content analysis. This study found that early half (49%) of the perpetrators explicitly referenced Columbine, with many using it to justify their actions, albeit with a superficial understanding of the events. In contrast, the Columbine fandom on Tumblr predominantly engages in detailed research and archiving activities, demonstrating a scholarly interest rather than an intent to glorify or emulate the violence. The findings highlight the complexity of the motivations behind school attacks and the diverse nature of the Columbine fandom. While the fandom includes elements of aesthetic appreciation and research, it does not predominantly feature idolization or identification with the perpetrators, suggesting that these spaces are often mischaracterized by external observers. The findings of this work contribute to the broader discourse on school violence by providing insights into the influence of the Columbine massacre on contemporary school attacks and the multifaceted nature of the Columbine fandom, emphasizing the need for targeted prevention strategies and more accurate public perceptions of these online fan communities. Although an interest in Columbine does not necessarily indicate an increased risk of violent behavior, idolization and identification with the event are behaviors that warrant further investigation. Additionally, this thesis includes the development of a dictionary with Columbine-related terminology to aid in identifying discussions and references that require further assessment.

  • 27.
    Ekenberg, Love
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis (IIASA), Austria.
    Fasth, Tobias
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Larsson, Aron
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hazards and quality control in humanitarian demining2018In: International Journal of Quality & Reliability Management, ISSN 0265-671X, E-ISSN 1758-6682, Vol. 35, no 4, p. 897-913Article in journal (Refereed)
    Abstract [en]

    Purpose: The purpose of this paper is to discuss the adequacy of International Mine Action Standards 09.20 (IMAS 09.20) and the used standards ISO 2859 in the context of demining. Design/methodology/approach: The authors show how the actual quality level acceptable quality limit (AQL) significantly affects the average total quality cost for one lot with a single sampling plan and, consequently, the average total quality cost, and as AQL increases, the cost of rejecting a lot and the cost of sampling increase. Findings: The sampling plans for demining are not always optimal given economical and other concerns and that other mechanisms should be considered. Practical implications: Addressing opportunity costs for adopting wide samplings plans instead of clearing uncleared land per default, as well as balancing producer and consumer consequences seems, therefore, to be highly relevant from a socio-economical perspective. Originality/value The general understanding of quality management and the systems involved are limited within the mine action sector. IMAS and most national mine action standards provide only a fairly narrow description of the issue. This implies that the field is missing opportunities to achieve efficiency and effectiveness, as well as to learn from and improve upon past experiences. The authors demonstrate herein that sampling provides little additional confidence as to whether a particular area is free from explosive hazards and substantial savings can be made compared to the current practice.

  • 28.
    Ekenberg, Love
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kjellin, Harald
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sygel, Kristina
    You are Your Decisions2018Book (Other academic)
    Abstract [en]

    There are basically two categories of books on decision-making. One tells stories of how intuition guides decision-making. The other delineates a formal approach, based on decision-trees or matrices, often impenetrable to real-life decision makers. This book combines the best elements of both perspectives in a way that can be easily understood by all who are struggling with complex decisions, either as individuals or as organisations. It demonstrates how intuition and psychological insights can be harnessed to design relevant models and decision strategies, and describes how goals can be adequately formed and operationalised. Finally, the book integrates these processes in an analytical framework for decision-making.

  • 29.
    Eriksson, Jörgen
    et al.
    Lunds universitetsbibliotek.
    Fathli, Margaretha
    KTH Bibliotek.
    Karlsson, Klemens
    KTH Bibliotek.
    Kullman, Lars
    Chalmers Bibliotek.
    Linde, Peter
    Sikström, Marjatta
    Stockholm University, University Library.
    Sköld, Ylva
    LTU Bibliotek.
    Parallellpublicering av konferensartiklar: principer, tillämpningar och tillgänglighet i svenska publiceringsdatabaser2012Report (Other academic)
    Abstract [sv]

    Projektets huvudsyfte har varit att undersöka kvalitetsgranskade konferensartiklars tillgänglighet samt konferensers OA- och publiceringspolicies för att på så sätt klarlägga olika aspekter vad det gäller parallellpublicering i svenska publiceringsdatabaser. För ändamålet har projektdeltagarna undersökt ett urval konferenser och konferensartiklar via sina publiceringsdatabaser under ett specifikt tidsintervall och beskrivit dem utifrån ett gemensamt schema.

    Undersökningen har visat att publiceringsdatabaserna fyller en viktig funktion för att synliggöra konferenspublikationer. Vi har funnit att minst ca. 50 % av konferensartiklarna kan publiceras som post-prints i våra publiceringsdatabaser. Därför är det av stor vikt att fortsätta arbetet med att utnyttja de lokala publiceringsdatabaserna som publiceringskanal och att inte bara använda dem som ett verktyg för parallellpublicering och primärpublicerat material, som avhandlingar och rapporter, utan även som en källa framförallt för konferensartiklar ”utan hem”, som vi nu vet utgör en stor del av vårt undersökningsmaterial (ca. 15 %).

     Mellan 20-25 % av de undersökta artiklarna fanns i något slags öppet OA-arkiv; ca. hälften av dessa fanns i någon av projektdeltagarnas egen publiceringsdatabas. Detta talar för att den egna publiceringsdatabasen är en viktig faktor för öppen tillgänglighet.

    Ca. 10% av konferenserna i studien hade en uttrycklig OA-policy eller gav uttryck för en sådan genom att öppet tillgängliggöra konferensartiklar på sina konferenssajter. Ett stort problem när det gäller parallellpublicering av konferensartiklar är just bristen på information om OA-policy.

    Konferenspubliceringslandskapet är komplicerat och parallellpubliceringen av dokument härifrån är mycket tidskrävande. Vi skulle framför allt önska en liknande policy-resurs som SHERPA/RoMEO för konferenser. Men för närvarande finns inget annat alternativ än att lusläsa konferensernas upphovsrättsinformation till författarna och av denna försöka dra slutsatser om ev. parallellpublicering.

    För att underlätta framtida hantering och klassificering av konferensartiklar i svenska publiceringsdatabaser, framför allt med tanke på ev. framtida nationella bibliometriska analyser via SwePub, föreslås ett antal rekommendationer.

    Download full text (pdf)
    fulltext
  • 30.
    Feilberg-Maiti, Hannah
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Younadam, Ramina
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Digital Forensics in Swedish Law Enforcement2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Despite the increasing importance of digital forensics (DF) in criminal investigations, the field struggles with a lack of widespread adherence to established standards. This issue contributes to the production of potentially unreliable DF reports. Thus, this study investigates the reliability of DF reports from Swedish criminal investigations, focusing on gang-related murder and narcotics cases. The research strategy employed in this study was a survey in which 128 DF reports sourced from 20 different Swedish criminal investigations were scrutinised and the reliability validation criteria established by Stoykova et al. [1] were applied to assess the reliability of the acquisition, examination and analysis phases of the DF process. The study found that none of the DF reports included enough documentation to enable reliability validation of any of the phases of the DF process. Furthermore, several deficiencies in the DF process within Swedish law enforcement are identified, highlighting a lack of adherence to formal standards, undefined scope of the DF reports and insufficient documentation in the DF reports, particularly in the analysis phase. To combat these issues, Swedish law enforcement ought to establish standards and guidelines that outline requirements for the contents, format and structure of the DF reports their practitioners produce. It is also suggested that they provide their DF practitioners with comprehensive templates for different report types. Emphasising thorough analysis and providing enhanced training programs for DF practitioners is also recommended to ensure adherence to these standards and help maintain the integrity and reliability of the DF process.

  • 31.
    Gebreyesus, Yasmin Tesfaldet
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Impact of Language-Model Size on the Quality of Automatic Text Summarization Comparing Larger Models against Smaller Open-Source Alternatives2024Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Automatic text summarization condenses large amounts of text into concise representations, making information retrieval and comprehension more efficient. This research investigates the impact of language-model size on the quality of automatic summarization. We compare the performance of large models against smaller open-source alternatives.

    Background research highlights the increasing prevalence of large language models and the significant role they play in Natural Language Processing (NLP) tasks. However, the relationship between model size and summarization quality remains an open question, this research gap is addressed in our study by comparing the summarization quality of large and small size models, understanding the trade-offs between model size, cost and performance along with answering the practical implication of using smaller models interms of cost, deployment and data privacy.

    Our methodology employs an experimental design together with a correlational design as an alternative research design methodology. We utilize a benchmark dataset encompassing diverse news text types to ensure generalizability. 10 large and small LMs are evaluated on CNN-Daily Mail Dataset, using Recall-Oriented Understudy for Gisting Evaluation (ROUGE) scores (ROUGE-1, ROUGE-2, ROUGE-L) to further showcase the quality of summarization results at model level sample generated summaries from 8 models are presented. In the analysis factors beyond ROUGE scores, such as fluency, coherence, and factuality are discussed. The findings of this study with it’s limitations underlines that using small open-source models for abstractive news summarization offers advantages in terms of cost, maintenance, deployment, and potential data privacy. However, it's important to weigh these benefits against the potential trade-off in summarization quality and functionality.

  • 32.
    Gedal, Linus
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kommer du ihåg hur man gör när det verkligen gäller? En studie som utvärderar effekten av sensorbaserad hjärt-lungräddningsteknik på förmågan att bibehålla HLR- färdigheter.2024Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Problem: Sudden cardiac arrest is a serious medical condition that requires immediate cardiopulmonary resuscitation (CPR). Research has shown that CPR performance is generally lacking, but technical aids such as CPR-guide can improve CPR performance for both laypeople and healthcare professionals. However, further research also shows that CPR skills deteriorate quickly. Research Question: How does training with sensor-based CPR technology affect the ability to maintain skills in the correct performance of CPR? Method: To answer this question, an experimental study with a quantitative method was conducted. Twenty laypeople participated in the study. The participants performed CPR without aid, with a CPR-guide (a sensor-based technology aid for CPR that uses visual graphic feedback (VGF)), and then without aid again. Data was collected through technical equipment and was later analyzed using descriptive statistics and a One-way Repeated Measures ANOVA. Results: The study's results showed that at the first training session, without using the technical aid, the average proportion of correctly performed compressions was only 10.9%. This figure rose to 56.4% with the use of the CPR-guide. At the final training session without the technical aid, an average of 17.5% of the compressions were performed correctly. The results indicated that just one training session with the CPR-guide resulted in an average improvement of 60.5% in the number of successful compressions performed by the test subjects when performing CPR without aid. Conclusion: The study contributes to a better understanding of the role of technology in CPR training. Consistent with previous research, the results show that technical aids such as CPR-guide improve CPR performance. The study establishes that training with technical aids using VGF is an effective way to train laypeople in CPR and that the skills are retained. The study's results and limitations also emphasize the need for repeated studies with a control group. This is necessary to investigate how training with technical aids that use VGF affects the retention of CPR skills compared to training without such aids.

  • 33.
    Goranko, Valentin
    Stockholm University, Faculty of Humanities, Department of Philosophy.
    Logics for Strategic Reasoning of Socially Interacting Rational Agents: An Overview and Perspectives2023In: Logics, ISSN 2813-0405, Vol. 1, no 1, p. 4-35Article in journal (Refereed)
    Abstract [en]

     This paper is an overview of some recent and ongoing developments of formal logical systems designed for reasoning about systems of rational agents who act in pursuit of their individual and collective goals, explicitly specified in the language as arguments of the strategic operators, in a socially interactive context of collective objectives and attitudes which guide and constrain the agents’ behavior.

  • 34.
    Hallberg, David
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Wafula, Lindy
    Empowering rural women in Kenya with literacy skills using web 2.0: experiences of language & communication barriers in learning2010In: ICIA 2010 Proceedings, 2010, p. 100-110Conference paper (Refereed)
    Abstract [en]

    Abstract. The purpose of this paper is to illuminate ways in which language and communication relatedbarriers may be experienced in learning. Because of increased ICT usage, Project Africa’s Women’sAcademy, that is in focus of the research, felt that some issues regarding language and communicationappeared in another way than before without using ICT. The research was conducted in Lunga-Lunga,Kenya, November 2009 and through Internet communication (e.g. logs, letters stored in a socialnetworking site). The paper mainly draws on literature on ICT and Joseph Kaipayil’s ontology to collectindividual ‘experiences’. The results show that many barriers arise because of cultural diversities amongthe learners; e.g. difference ways of employing concepts and regard the objects in the world. In makingpolicies, therefore, account must be taken on a local and individual level as well as on a transnationaland collective level.

    Download full text (pdf)
    fulltext
  • 35.
    Hansen, Preben
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Järvelin, Anni
    Järvelin, Antti
    Exploring manual and automatic query formulation in patent IR: Initial query construction and query generation process2013In: Journal of Documentation, ISSN 0022-0418, E-ISSN 1758-7379, Vol. 69, no 6, p. 873-898Article in journal (Refereed)
    Abstract [en]

    Purpose – This study aims to examine manually formulated queries and automatic query generation in an early phase of a patent “prior art” search.

    Design/methodology/approach – The study was performed partly within a patent domain setting, involving three professional patent examiners, and partly in the context of the CLEF 2009 Intellectual Property (CLEF-IP) track. For the exploratory study of user-based query formulation, three patent examiners performed the same three simulated real-life patent tasks. For the automatic query generation, a simple term-weighting algorithm based on the RATF formula was used. The manually and automatically created queries were compared to analyse what kinds of keywords and from which parts of the patent documents were selected.

    Findings – For user-formulated queries, it was found that patent documents were read in a specific order of importance and that the time varied. Annotations and collaboration were made while reading and selecting/ranking terms. Ranking terms was experienced to be harder than selecting terms. For the automatic formulated queries, it was found that the term frequencies used in the RATF alone will not quite approximate what terms will be judged as relevant query terms by the users. Simultaneously, the results suggest that developing a query generation tool for generating initial queries based on patent documents is feasible.

    Research limitations/implications – These preliminary but informative results need to be viewed in the light that only three patent experts were observed and that a small set of topics was used.

    Originality/value – It is usually difficult to get access to the setting of the patent domain and the results of the study show that the methodology provided a feasible way to study manual and the manual query formulation of the patent engineer.

  • 36.
    Hansson, Karin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Stockholm University, Faculty of Humanities, Department of Culture and Aesthetics.
    Bardzell, Shaowen
    Georgia Institute of Technology, United States.
    Bhandari, Aparajita
    Cornell University, United States.
    Boulicault, Marion
    University of Edinburgh, United Kingdom.
    Thomas Doyle, Dylan
    University of Colorado Boulder, United States.
    Erete, Sheena
    University of Maryland College Park, United States.
    Cerratto-Pargman, Teresa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Lazem, Shaimaa
    City for Scientific Research and Technology, Egypt.
    Muller, Michael
    IBM Research, United States.
    Normark, Maria
    Uppsala University, Sweden.
    Petterson, Adrian
    University of Toronto, Canada.
    Poikolainen Rosén, Anton
    Aalto University, Finland.
    Taylor, Alex S.
    City, United Kingdom.
    Thomas, Jakita O.
    Auburn University, United States.
    Watson, Julia
    University of Toronto, Canada.
    A Toolbox of Feminist Wonder: Theories and methods that can make a difference2023In: CSCW '23 Companion: Companion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing / [ed] Casey Fiesler, Loren Terveen, Morgan Ames, Susan Fussell, Eric Gilbert, Vera Liao, Xiaojuan Ma, Xinru Page, Mark Rouncefield, Vivek Singh, Pamela Wisniewski, Association for Computing Machinery (ACM) , 2023, p. 476-480Conference paper (Refereed)
    Abstract [en]

    theoretical and methodological approaches that have provided us with useful tools to see things differently and make space for change. Since its inception over a decade ago, feminist HCI has progressed from the margins to mainstream HCI, with numerous references in the literature. Feminist HCI has also evolved to incorporate other critical HCI practices such as Queer HCI, participatory design, and speculative design. While feminist approaches have grown in popularity and become mainstream, it is getting more difficult to distinguish the feminist emancipatory core from other attempts of developing and improving society in various ways. In this workshop, we therefore want to revisit our feminist roots, where theory is a liberatory and creative practice, motivated by affect, curiosity, and wonder. From this standpoint, we consider which of our feminist tools can make a significant difference today, in a highly datafied world. The goal of this workshop is to; 1) create an inventory of feminist theories and concepts that have had an impact on our work as designers, educators, researchers, and activists; 2) develop a feminist toolbox for the CSCW community to strengthen our feminist literacy.

  • 37.
    Hansson, Karin
    et al.
    Stockholm University, Faculty of Humanities, Department of Culture and Aesthetics.
    Cerratto Pargman, Teresa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Dahlgren, Anna
    Stockholm University, Faculty of Humanities, Department of Culture and Aesthetics.
    Datafication and cultural heritage: Provocations, threats, and design opportunities2020In: Proceedings of 18th European Conference on Computer-Supported Cooperative Work, European Society for Socially Embedded Technologies (EUSSET) , 2020Conference paper (Refereed)
    Abstract [en]

    Increasing digitization and the emergence of new data sharing practices are likely to change how our understanding of history is negotiated. The curation of data is always culturally and ideologically inflected. Accordingly, archiving practices are not only fundamental for our understanding of the past but vital in navigating the present. We have to pay particular attention to the consequences of the interfaces that curate history, especially in relation to big data. Crowdsourcing, social media, linked open data, and other participatory and open science practices challenge the archiving practices in cultural heritage institutions due to the character of the networked publics involved and the established structures between and within institutions. However, they also open up new opportunities and practices when it comes to understanding and defining our shared culture. In this workshop we will bring together researchers who have studied these issues or are working to develop critical perspectives on archiving practices.

    Download full text (pdf)
    fulltext
  • 38.
    Hansson, Karin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis, Austria.
    Embodiment and Gameplay: Situating the User in Crowdsourced Information Production2018In: Innovative Perspectives on Public Administration in the Digital Age / [ed] Aroon P. Manoharan, James McQuiston, IGI Global, 2018, p. 239-255Chapter in book (Other academic)
    Abstract [en]

    Distributed decision making with several stakeholders has various facets. On one hand, it enables significant opportunities for fast and efficient information provision, in particular when various structuring frameworks are provided. On the other hand, there are several problems regarding the reliability and consistency of the data produced in social media contexts as well as with the frameworks themselves. Online collaborative data production systems where crowd feedbacks are aggregated and mediated are easily affected by group biases. There are also several credibility and verification issues as the representativeness of the participants normally is difficult or impossible to determine. This chapter discusses the handling of user data in tools for crowd sourced data production and suggests a framework for describing the socio-technical setting for the production of data, and thereby the detectability of bias patterns in collaborative information production.

  • 39.
    Hansson, Pernilla
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Klingvall Lindgren, Erik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Gone Phishing2024Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cybersecurity is constantly at risk, with social engineering attacks being one of the most common dangers. Phishing is a common tactic within social engineering where trust is used to manipulate individuals into disclosing sensitive information. This study investigates student’s ability to correctly identify phishing emails while also exploring different factors that influence this ability. Previous research has concluded that individuals with greater knowledge of phishing were connected to a higher susceptibility. Other studies have reached the conclusion that the amount of internet usage correlates with threat sensitivity. Gender and the type of major have also shown to affect the susceptibility of falling for a phishing attack. Despite previous research, this study aims to further contribute to the area with additional insights and different variables, enhancing the generalizability of the findings. With a quantitative research design, this study aims to quantify the relationship between various factors of individuals and their ability to detect phishing. A web based questionnaire, which aligns with previous research methods, have been constructed to ensure efficient data collection. With the use of a multivariate linear regression, Spearman’s rank correlation and the Mann-Whitney U test this study aims to establish a relationship between the chosen variables and students ability to identify phishing emails. The study provides significant results that increasing comfortability with computers, phones, and similar devices does influence students ability to recognize phishing attacks. These findings suggest that enhancing technical proficiency could be a key strategy in improving phishing detection skills. Future research could further explore these findings and how they may be interpreted into different training programs.

  • 40.
    Hegestedt, Robert
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nouri, Jalal
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rundquist, Rebecka
    Linnaeus University, Växjö, Sweden.
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Data-driven school improvement and data-literacy in K-12: Findings from a Swedish national program2023In: International Journal: Emerging Technologies in Learning, ISSN 1868-8799, E-ISSN 1863-0383, Vol. 18, no 15, p. 189-208Article in journal (Refereed)
    Abstract [en]

    Data-driven school improvement has been proposed to improve and support edu-cational practices and more studies are emerging describing data-driven practices in schools and the effects of data-driven interventions. This paper reports on a study that has taken place within a national program where 15 schools from six different municipalities and organizations are working at classroom, school and municipality levels to improve educational practices using data-driven methods. The study aimed at understanding what educational problems teachers, principals and administrative staff in the project aimed to address through the utilization of data-driven methods and the challenges they face in doing so. Using a mixed method design, we identified four thematic areas that reflect the focused problem areas of the participants in the project, namely didactics, democracy, assessment and planning, and mental health. All development groups identified problems that can be solved with data-driven methods. Along with this, we also identified five challenges faced by the participants: time and resources, competence, ethics, digi-tal systems and common language. We conclude that the main challenge faced by the participants is data literacy, and that professional development is needed to support effective and successful data-driven practices in schools.

  • 41.
    Ilmerstedt, Freddy
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Gkanoliak, Maxim
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Managing digital transformation in Swedish public sector organizations: Exploring the use of Portfolio Management2024Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis examines the role of Portfolio Management (PM) within Swedish public sector organizations (PSOs). The introduction outlines the context of the challenges faced by PSOs, presents the digital strategy of the Swedish Association of Local Authorities and Regions (SKR), and defines the research problem. The research question is: What are the key lessons from deployment of Portfolio Management, as an approach to govern Digital Transformation, in Swedish public sector organizations? The study is specifically confined to Swedish PSOs.

    The thesis structure consists of sections on theoretical frameworks, research methodology, results presentation and analysis, comprehensive discussion, and a conclusion with implications for future research. The second chapter presents a literature review on digital transformation (DT), strategic management (SM), and PM. It highlights the complexity, phases, and transformational nature of the socio-technical system and the digital business strategy. Moreover, it identifies the challenges specific to PM in the public sector. The literature review synthesizes findings from 12 articles, identifying challenges and biases in public sector PM. The theoretical framework integrates models of DT, transformation management, SM, and PM to explore coordination and alignment in public sector DT.

    The methodology employs a qualitative survey approach, utilizing semi-structured online interviews for data collection. Exploratory and non-probability sampling methods, including purposive and snowball sampling techniques, ensure a diversity of perspectives. The data analysis follows Braun and Clarke’s (2006) thematic analysis framework. Ethical considerations are emphasized, particularly confidentiality, informed consent, and objectivity. The study's limitations acknowledge potential biases and the generalizability of findings to other PSOs.

    The results indicate that implementing PM in PSOs requires significant efforts in strategic alignment, process design, change management, and capacity planning. However, when successfully deployed, PM can provide substantial benefits, including enhanced transparency, standardization, and coordinated strategy execution.

    PM deployment in PSOs is complex and multifaceted, involving various structural components, internal impacts, and key implementation challenges. While PM has the potential to effectively govern digital transformation, this study identifies obstacles such as bureaucratic control, resource allocation issues, and an internal process bias that can hinder its success. To be effective, PM deployment should incorporate elements of project management, change management, and continuous learning to adapt the concept to the organization's specific context.

  • 42.
    Insulander, Eva
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Education.
    Lindstrand, Fredrik
    Selander, Staffan
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sites for learning and knowledge representations – the Middle Ages2021In: Designs for research, teaching and learning: A Framework for Future Education / [ed] Lisa Björklund Boistrup; Staffan Selander, Routledge , 2021, p. 111-123Chapter in book (Refereed)
    Abstract [en]

    In this chapter, the focus is on knowledge representations in different sites of learning. We will give some examples of formal, semi-formal, and non-formal institutional framings, as well as of choices of representational resources—both in terms of designs for learning and play, and designs in learning. The knowledge area is the Middle Ages, a period which reappears in books, music, films, and games in late-modern contexts. This chapter is thereby also an example of learning outside and inside schools, and of how different institutional logics and choices of material resources affect which type of knowledge that is valued, and what is seen as signs of learning.

  • 43.
    Justesen, Marcus
    Stockholm University, Faculty of Science, Department of Physical Geography and Quaternary Geology.
    Vägval: kortast, snabbasteller hälsosammast: En försöksmodell i GIS för ruttoptimering och beräknad inhalation av luftföroreningar för cykelrutter2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Cycling is one of the most sustainable transport modes available and it is widely promoted inmany urban areas. The health benefits from cycling has shown to be substantial, includingdecreased risks of diseases related to overweight and enhancing brain capacity. However, inurban areas cyclists can temporaly be exposed to high levels of air pollution, resulting inhealth risks as opposed to health benefits.

    The objective of this thesis is to develop a rasterbased test model in GIS that estimates theinhaled dose of air pollution for cyclists based on relative particle concentration in differenttransportation micro-environments. The method used is a least-cost path approach,calculating three different routes; shortest, fastest and least dose for four different trips withinSödermalm, Stockholm.

    The results show that the inhaled particle dose can be greatly reduced, 39% - 58% for three ofthe routes, by choosing the least dose route. One of the most interesting findings is thesubstantial increase of dose when high levels of particles are combined with uphill cycling.

    The conclusion for the thesis is that a raster-GIS model can be very useful for estimating doseof different air pollution particles and chemicals along cycling routes. For this purpose thetest model could be applied with no or little additional development, while with furtherdevelopment it might be possible to develope a cycle route planner for public use.

    Download full text (pdf)
    fulltext
  • 44.
    Karunaratne, Thashmee
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Blended Supervision for Thesis Projects in Higher Education: A Case Study2018In: Electronic Journal of e-Learning, E-ISSN 1479-4403, Vol. 16, no 2, p. 79-90Article in journal (Refereed)
    Abstract [en]

    The thesis component of a degree program is vital since the quality of it contributes to the quality of the whole degree. Maintaining the quality of the degree programs and handling the constantly increasing numbers of students entering higher education simultaneously is a challenge for many higher educational institutions. This paper presents a study of how ICT can be used to improve the quality and effectiveness of the thesis projects at Bachelors and Masters Levels. Further, how the blended model of supervision supports solving the issues of managing supervisor time efficiently and providing a quality guidance for thesis students are also explored. Supervisors’ perceptions of the ICT enabled thesis process are captured via interviews. Statistics about the completed theses and the user log data of the ICT system are triangulated to complement supervisor perceptions. Results revealed that the supervisors take advantage of the functions in the system to support improving the quality and the quantity of the theses, and the blended supervision model adapted in the thesis process support the supervisors to have a better collaboration with the students.

  • 45. Komendantova, Nadejda
    et al.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis (IIASA), Austria.
    Marashdeh, Leena
    Al Salaymeh, Ahmed
    Danielson, Mats
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. International Institute for Applied Systems Analysis (IIASA), Austria.
    Linnerooth-Bayer, Joanne
    Are Energy Security Concerns Dominating Environmental Concerns? Evidence from Stakeholder Participation Processes on Energy Transition in Jordan2018In: Climate, E-ISSN 2225-1154, Vol. 6, no 4, article id 88Article in journal (Refereed)
    Abstract [en]

    To satisfy Jordan’s growing demand for electricity and to diversify its energy mix, the Jordanian government is considering a number of electricity-generation technologies that would allow for locally available resources to be used alongside imported energy. Energy policy in Jordan aims to address both climate change mitigation and energy security by increasing the share of low-carbon technologies and domestically available resources in the Jordanian electricity mix. Existing technological alternatives include the scaling up of renewable energy sources, such as solar and wind; the deployment of nuclear energy; and shale oil exploration. However, the views, perceptions, and opinions regarding these technologies—their benefits, risks, and costs—vary significantly among different social groups both inside and outside the country. Considering the large-scale policy intervention that would be needed to deploy these technologies, a compromise solution must be reached. This paper is based on the results of a four-year research project that included extensive stakeholder processes in Jordan, involving several social groups and the application of various methods of participatory governance research, such as multi-criteria decision-making. The results show the variety of opinions expressed and provide insights into each type of electricity-generation technology and its relevance for each stakeholder group. There is a strong prevalence of economic rationality in the results, given that electricity-system costs are prioritized by almost all stakeholder groups.

  • 46. Kou, Yubo
    et al.
    Johansson, Magnus
    Verhagen, Harko
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Prosocial behavior in an online game community: an ethnographic study2017In: Proceedings of the 12th International Conference on the Foundations of Digital Games, Association for Computing Machinery (ACM), 2017, article id 15Conference paper (Refereed)
    Abstract [en]

    We report an ethnographic study of prosocial behavior inconnection to League of Legends, one of the most popular games in the world. In this game community, the game developer, Riot Games, implemented a system that allowed players to volunteer their time to identify unacceptable player behaviors and punish players associated with these behaviors. With the prosocial goal of improving the community and promoting sportsmanship with in the competitive culture, a small portion of players worked diligently in the system with little reward. In this paper, we use interviews and analysis of forum discussions to examine how players themselves explain their participation in the system situated in the game culture of League of Legends. We show a myriad of social and technical factors that facilitated or hindered players' prosocial behavior. We discuss how our findings might provide generalizable insights for player engagement and community-building in online games.

  • 47.
    Krishna Srinivasan, Chandrasekar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Impact of changes in the client organisation on the vendor team’s performance: Insights from the vendor teams’ perspective2024Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Software outsourcing has been widely adopted by many organisations across industries for producing quality software with reduced cost and faster time to market. Software outsourcing helps organisations overcome the shortage of technical expertise in software development and enables organisations to focus on their core business activities. Despite the benefits, outsourcing also has challenges because the goals of the client and vendor organisations are different. Client organisations use monitoring controls to ensure their goals are met while partnering with vendor organisations. This research focuses on long- term outsourcing partnerships and the nature of organisational changes at client organisations that impact the performance of the vendor team. A qualitative research method is used to gather the insights of selected participants from vendor organisations through semi-structured interviews. The insights are gained from vendor perspectives and the results will be helpful for client organisations to plan the changes along with vendor teams towards successful software projects. The changes in leadership, organisational restructuring, requirement, scaling, and training were identified as the client organisational changes that impact vendor team performance. These changes can be better planned, and the impact can be mitigated by involving vendor team stakeholders in the process and implementation. The magnitude of impact on vendor teams’ performance is dependent on the maturity of the client organisation’s change management process in the identified areas. This study helps client organisations to evaluate their maturity level of change management process in the identified themes and improve for better software project outcomes in partnership with vendor teams.

  • 48.
    Kumar, Nishant
    Stockholm University, Faculty of Social Sciences, School of Business, Marketing.
    Managing reverse knowledge flow in multinational corporations2013In: Journal of Knowledge Management, ISSN 1367-3270, E-ISSN 1758-7484, Vol. 17, no 5, p. 695-708Article in journal (Refereed)
    Abstract [en]

    Purpose – This study aims to provide insight to the little-researched phenomenon of reverse knowledge flow within multinational corporations (MNCs) and to explain the role of managerial attention in exploiting the prospect of knowledge transfer from subsidiaries located in developing countries. Design/methodology/approach – Existing literature across disciplines has been integrated to provide a clear description of the concept of reverse knowledge flow and managerial attention, in order to explain the role of managerial attention in reverse knowledge transfer activities within MNCs. Two pilot studies were conducted on European MNCs to build the background for this study. Findings – Managerial attention is a key factor in recognising potential source of knowledge within the multinational network, and a prior requirement for knowledge transfer to take place. Attention decisions are partially based on the knowledge source location, awareness/attractiveness, and the strategic importance. Thus, MNCs can adopt managerial practices and control mechanisms to influence the attention of executives and achieve higher knowledge flow from subsidiaries. Research limitations/implications – There is a need to undertake empirical research and in-depth case studies of knowledge management practices using the arguments and framework provided in this article. Practical implications – MNCs can develop mechanisms for overcoming attention biases influence on reverse knowledge flow. The attention based approach can lead to better subsidiary integration and knowledge management practices in MNCs. Originality/value – This study advances the theory on reverse knowledge flow in MNCs by presenting an attention based theoretical framework for effective knowledge transfer.

  • 49.
    Käck, Annika
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Global perspectives on teaching excellence – A new era for higher education2018In: Högre Utbildning, E-ISSN 2000-7558, Vol. 8, no 1, p. 42-43Article, book review (Other academic)
    Abstract [en]

    Are you searching for a book that discusses teaching excellence from both a global and future perspective? In that case, Global perspectives on teaching excellence - A new era for higher education is a highly relevant and interesting book with contributions from 42 individuals, all involved in higher education in many countries. Christine Broughan, Graham Steventon and Lynn Clouder, researchers from Coventry University in the United Kingdom, are the editors. In this book, the concept of teaching excellence is explored by international authors who highlight a number of key issues. One issue is that teaching excellence has no international definition because it is such a complex subject covering diverse ontological, epistemological and cultural contexts. We can read this book with three questions in mind: If and how teaching excellence can be measured; what impact frameworks, initiatives and awards have on teaching excellence; and, what are the new challenges for global teaching excellence in the 21st century? The authors’ focus is a blend of political, theoretical and applied research which gives the reader many different perspectives on teaching excellence.

  • 50.
    Käck, Annika
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Männikkö Barbutiu, Sirkku
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Fors, Uno
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Migrant teachers' experiences with the use of digital technology and media during their placement period in Swedish schools2018In: Proceedings of the ATEE Winter Conference 2018: Technology and Innovative Learning / [ed] Michiel Heijnen, Miranda de Hei, Stan van Ginkel, ATEE - Association for Teacher Education in Europe, 2018, p. 63-71Conference paper (Refereed)
    Abstract [en]

    Professional development directed towards migrant teachers is provided at six Swedish Universities. These teachers study 1-2 years to become eligible to teach in Swedish schools. Part of this training is the placement period, where they become familiar with the Swedish school environment while guided by a placement supervisor. In this study, we examine migrant teachers’ experiences with digital technology and media during their placement period, using the theoretical concept of “unfamiliar ways of thinking and practising”. Data in this qualitative study was collected from a total of 34 migrant teachers through five focus groups and nine individual interviews. The migrant teachers’ former teacher education was completed in twenty different countries. A qualitative content analysis was conducted. The results indicate that the placement supervisor is of great importance for the improvement of migrant teachers’ digital competence, as it is defined in the Swedish context. As a role model, the placement supervisor can be a motivator and an inspirational force for migrant teachers. Findings also show that migrant teachers express unfamiliar ways of thinking and practising concerning the curricula, pedagogical methods and in their role as teachers, which has implications for how digital technology and media isused pedagogically.

12 1 - 50 of 95
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf