Change search
Refine search result
12 1 - 50 of 78
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the 'Create feeds' function.
  • 1.
    Abbasi, Abdul
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Muftic, Sead
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    CryptoNET: integrated secure workstation2009In: International Journal of Advanced Science and Technology, ISSN 2005-4238, Vol. 12Article in journal (Refereed)
    Abstract [en]

    In most of the current applications security is usually provided individually. This means that various applications use their own security mechanisms and services, applied only to their own resources and functions. Furthermore, procedures to configure security parameters are usually inconvenient and complicated for non-technical users. As an alternative to this approach, we have designed and implemented Secure Workstation, which represents an integrated security environment and protects local IT resources, messages and operations across multiple applications. It comprises five components, i.e. four most commonly used PC applications: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Documents System, and Secure Browser. These four components for their security extensions use functions and credentials of the fifth component, Generic Security Provider [5]. With this approach, we provide standard security services (authentication, confidentiality, and integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, strong authentication protocol, SAML based single-singe-on, secure sessions, and other security functions, to all PC applications with the same set of security modules and parameters.

  • 2.
    Al Sabbagh, Bilal
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kowalski, Stewart
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Socio-Technical SIEM (ST-SIEM): Towards Bridging the Gap in Security Incident Response2017In: International Journal of Systems and Society, Vol. 4Article in journal (Refereed)
    Abstract [en]

    This article discusses the design and specifications of a Socio-Technical Security Information and Event Management System (ST-SIEM). This newly-developed artifact addresses an important limitation identified in today incident response practice—the lack of sufficient context in actionable security information disseminated to constituent organizations. ST-SIEM tackles this limitation by considering the socio-technical aspect of information systems security. This concept is achieved by correlating the technical metrics of security warnings (which are generic in nature, and the sources of which are sometimes unknown) with predefined social security metrics (used for modeling the security culture of constituent organizations). ST-SIEM, accordingly, adapts the risk factor of the triggered security warning based on each constituent organization security culture. Moreover, the artifact features several socio-technical taxonomies with an impact factor to support organizations in classifying, reporting, and escalating actionable security information. The overall project uses design science research as a framework to develop the artifact.

  • 3.
    Alemu Argaw, Atelach
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Amharic-English information retrieval with pseudo relevance feedback2008In: Advances in multilingual and multimodal information retrieval: 8th Workshop of the Cross-Language Evaluation Forum, CLEF 2007, Budapest, Hungary, September 19-21, 2007 : revised selected papers / [ed] Carol Peters ... [et al.], Berlin ; New York: Springer, 2008, 119-126 p.Conference paper (Other academic)
    Abstract [en]

    We describe cross language retrieval experiments using Amharic queries and English language document collection from our participation in the bilingual ad hoc track at the CLEF 2007. Two monolingual and eight bilingual runs were submitted. The bilingual experiments designed varied in terms of usage of long and short queries, presence of pseudo relevance feedback (PRF), and three approaches (maximal expansion, first-translation-given, manual) for word sense disambiguation. We used an Amharic-English machine readable dictionary (MRD) and an online Amharic-English dictionary in order to do the lookup translation of query terms. In utilizing both resources, matching query term bigrams were always given precedence over unigrams. Out of dictionary Amharic query terms were taken to be possible named entities in the language, and further filtering was attained through restricted fuzzy matching based on edit distance. The fuzzy matching was performed for each of these terms against automatically extracted English proper names. The Lemur toolkit for language modeling and information retrieval was used for indexing and retrieval. Although the experiments are too limited to draw conclusions from, the obtained results indicate that longer queries tend to perform similar to short ones, PRF improves performance considerably, and that queries tend to fare better when we use the first translation given in the MRD rather than using maximal expansion of terms by taking all the translations given in the MRD.

  • 4.
    Bider, Ilia
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Adequacy of business process modelling approaches2010In: Handbook of research on complex dynamic process management: techniques for adaptability in turbulent environments / [ed] Minhong Wang, Zhaohao Sun, Hershey, PA: Business Science Reference , 2010Chapter in book (Other academic)
  • 5.
    Bider, Ilia
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Perjons, Erik A
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Evaluating adequacy of business process modelling approaches2009In: Handbook of research on complex dynamic process management: techniques for adaptability in turbulent environments / [ed] Minhong Wang and Zhaohao Sun, Hershey, PA: IGI Global, 2009Chapter in book (Other academic)
  • 6.
    Brouwers, Lisa
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hansson, Karin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Simulation of Three Competing Flood Management Strategies: A Case Study2002In: Applied Simulation and Modelling: Proceedings of the IASTED International Conference / [ed] L. Ubertini, Anaheim: Acta Press , 2002Conference paper (Refereed)
    Abstract [en]

    We argue that integrated catastrophe models are useful for policy decisions, for which a large degree of uncertainty is a natural ingredient. Recently, much attention has been given to the financial management of natural disasters. This article describes the results of a case study performed in northeastern Hungary where different flood management strategies have been explored and compared using an integrated catastrophe model. The area used for the pilot study is the Palad-Csecsei basin (the Pilot basin) where 4 621 persons live. The Pilot basin is located in the Upper Tisza region. An executable and geographically explicit model has been developed, linking hydrological, geographical, financial, and social data. The outcomes of the policy simulations are represented at different granularity-levels; the individual, the aggregated (entire basin), and the governmental.

  • 7.
    Cakici, Baki
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sustainability through surveillance: ICT discourses in design documents2013In: Surveillance & Society, ISSN 1477-7487, E-ISSN 1477-7487, Vol. 11, no 1/2, 177-189 p.Article in journal (Refereed)
    Abstract [en]

    In this paper, I examine design documents from three different ICT design and development projects. I argue that they present intersecting visions of sustainability entailing the wide-spread use of ICT, describe the properties of users compatible with such ICT, and provide ways of judging the users. In the design documents, the inhabitants are made individually responsible for living sustainably, and surveillance is positioned as integral to this future with the help of ICT. Underlying the visions, I identify a translation process that captures the traces of the inhabitants' lives, classifies them according to different criteria of sustainable living, and returns them to the tapestry of everyday life to convince the users to behave differently. In the discourses of these documents, surveillance translates the traces, and the translations exert new pressures on existing power relations.

  • 8.
    Cakici, Baki
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    The Informed Gaze: On the Implications of ICT-Based Surveillance2013Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information and communication technologies are not value-neutral. I examine two domains, public health surveillance and sustainability, in five papers covering: (i) the design and development of a software package for computer-assisted outbreak detection; (ii) a workflow for using simulation models to provide policy advice and a list of challenges for its practice; (iii) an analysis of design documents from three smart home projects presenting intersecting visions of sustainability; (iv) an analysis of EU-financed projects dealing with sustainability and ICT; (v) an analysis of the consequences of design choices when creating surveillance technologies. My contributions include three empirical studies of surveillance discourses where I identify the forms of action that are privileged and the values that are embedded into them. In these discourses, the presence of ICT entails increased surveillance, privileging technological expertise, and prioritising centralised forms of knowledge.

  • 9.
    Cakici, Baki
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sanches, Pedro
    KTH.
    Detecting the Visible: The Discursive Construction of Health Threats in Syndromic Surveillance System DesignManuscript (preprint) (Other academic)
  • 10. Coville, Aidan
    et al.
    Siddiqui, Afzal
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Vogstad, Klaus-Ole
    The effect of missing data on wind resource estimation2011In: Energy, ISSN 0360-5442, E-ISSN 1873-6785, Vol. 36, no 7, 4505-4517 p.Article in journal (Refereed)
    Abstract [en]

    Investment in renewable energy sources requires reliable data. However, meteorological datasets are often plagued by missing data, which can bias energy resource estimates if the missingness is systematic. We address this issue by considering the influence of missing data due to icing of equipment during the winter on the wind resource estimation for a potential wind turbine site in Norway. Using a mean-reverting jump-diffusion (MRJD) process to model electricity prices, we also account for the impact on the expected revenue from a wind turbine constructed at the site. While missing data due to icing significantly bias the wind resource estimate downwards, their impact on revenue estimates is dampened because of volatile electricity spot prices. By contrast, with low-volatility electricity prices, the effect of missing data on revenue estimates is highly significant. The seasonality-based method we develop removes most of the bias in wind resource and revenue estimation caused by missing data.

  • 11. Cöster, Mathias
    et al.
    Westelius, Alf
    Gullberg, Cecilia
    Wettergren, Gunnar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organisering och digitalisering: att skapa värde i det 21:a århundradet2017Book (Other academic)
    Abstract [sv]

    Digitaliseringen gör att förändringar sker allt snabbare. Förändringarna innebär stora möjligheter men lika stora risker. För att kunna utnyttja möjligheterna måste vi anpassa oss. Och vi måste göra det medvetet. Förändringarna ger organisationer bättre förutsättningar än någonsin för att lyckas, men för att lyckas behöver man förstå och utnyttja dem. Vissa klarar det, andra inte. Att digitalisera framgångsrikt är inte enkelt. Den här boken visar hur organisationer skapar värde i en digitaliserad verklighet. Boken går igenom digitalisering med utgångspunkt i vad en organisation egentligen är och vad den behöver. Den spänner över mål, affärsmodeller, strategier, organisering, beslut och projekt. Tyngdpunkten ligger på hur man strukturerar för att få effektivare beslutshantering och mer framgångsrika projektgenomföranden. Eftersom beslut och project är grundpelare för att kunna använda digitaliseringen. Boken lämpar sig särskilt väl för kurser i företagsekonomi, industriell ekonomi och data- och systemvetenskap. Men den vänder sig till alla som vill förstå hur organisationer ska hantera och dra nytta av digitaliseringen.

  • 12.
    Dalianis, Hercules
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Sök och sammanfatta i Norden2006In: Sprogteknologi i dansk perspektiv: en samling artikler om sprogforskning og automatisk sprogbehandling / [ed] Anna Braasch, København: Reitsel , 2006Chapter in book (Other academic)
  • 13. Davidsson, Paul
    et al.
    Verhagen, Harko
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Types of simulation2009In: Simulating social complexity: a handbook / [ed] Bruce Edmonds et al., Berlin, London: Springer, 2009Chapter in book (Other academic)
  • 14. Davidsson, Paul
    et al.
    Verhagen, Harko Henricus
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Types of Simulation2017In: Simulating Social Complexity, Springer , 2017, no 2Chapter in book (Other academic)
    Abstract [en]

    This vhapter looks at various ways that computer simulations can differ not in terms of their detailed mechanisms but in terms of its broader purpose, structure, ontology (what is represented), and approach to implementation. It starts with some different roles of people that may be concerned with a simulation and goes on to look at some of the different contexts within which a simulation is set (thus implying its use or purpose). It then looks at the kinds of system that might be simulated. Shifting to the modelling process, it looks at the role of the individuals within the simulations, the interactions between individuals, and the environment that they are embedded within. It then discusses the factors to consider in choosing a kind of model and some of the approaches to implementing it.

  • 15.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A Gentle Introduction to System Verification2005In: New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fourth SoMeT_W05 / [ed] Hamido Fujita, Mohamed Mejri, Amsterdam: IOS Press, 2005, 173-193 p.Conference paper (Refereed)
    Abstract [en]

    Verification is an important instrument in the analysis of systems. Roughly, this means that requirements and designs are analyzed formally to determine their relationships. Various candidates for formalizing system development and integration have been proposed. However, a major obstacle is that these introduce non-standard objects and formalisms, leading to severe confusion. This is because these models often are unnecessarily complicated with several disadvantages regarding semantics as well as complexity. While avoiding the mathematical details as far as possible, we present some basic verification ideas using a simple language such as predicate logic and demonstrate how this can be used for defining and analyzing static and dynamic requirement fulfillment by designs as well as for detecting conflicts. The formalities can be found in the appendix.

  • 16.
    Ekenberg, Love
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Cöster, Mathias
    Westelius, Alf
    Gullberg, Cecilia
    Wettergren, Gunnar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Organisering och digitalisering - att skapa värde i det 21:a århundradet2017Book (Other academic)
    Abstract [sv]

    Digitaliseringen gör att förändringar sker allt snabbare. Förändringarna innebär stora möjligheter men lika stora risker. För att kunna utnyttja möjligheterna måste vi anpassa oss. Och vi måste göra det medvetet. Förändringarna ger organisationer bättre förutsättningar än någonsin för att lyckas, men för att lyckas behöver man förstå och utnyttja dem. Vissa klarar det, andra inte. Att digitalisera framgångsrikt är inte enkelt. Den här boken visar hur organisationer skapar värde i en digitaliserad verklighet. Boken går igenom digitalisering med utgångspunkt i vad en organisation egentligen är och vad den behöver. Den spänner över mål, affärsmodeller, strategier, organisering, beslut och projekt. Tyngdpunkten ligger på hur man strukturerar för att få effektivare beslutshantering och mer framgångsrika projektgenomföranden. Eftersom beslut och project är grundpelare för att kunna använda digitaliseringen. Boken lämpar sig särskilt väl för kurser i företagsekonomi, industriell ekonomi och data- och systemvetenskap. Men den vänder sig till alla som vill förstå hur organisationer ska hantera och dra nytta av digitaliseringen.

  • 17.
    Ekenberg, Love
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hansson, Karin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Danielson, Mats
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Cars, Göran
    KTH, , .
    al, et
    Deliberation, Representation and Equity: Research Approaches, Tools and Algorithms for Participatory Processes2017Book (Other academic)
  • 18.
    Eklund, Lina
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Sociology.
    Johansson, Magnus
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Played and Designed Sociality in a Massive Multiplayer Online Game2013In: Eludamos - Journal for Computer Game Culture, ISSN 1866-6124, E-ISSN 1866-6124, Vol. 7, no 1, 35-54 p.Article in journal (Refereed)
    Abstract [en]

    This empirical study focuses on online collaboration and social interaction in temporary group formations. A case study of a massive multiplayer online game World of Warcraft explores these issues. Within this context little attention has been paid to temporary collaboration groups. The phenomenon is analyzed using interaction data complemented with interview data, forum data and consideration of game design.

    We found two main types of interaction, sociable and instrumental, but investment in the social situation was exceedingly little. We conclude that the low levels of social interaction observed are the result of a game design that makes the cost of social play high and restricts the available space for players to act within the designed architecture of the game, thus limiting the possibilities for played sociality. The connection between designed and played sociality is crucial for understanding online collaboration as it shapes online social worlds and therefore users’ experiences within this social context.

  • 19.
    Eklund, Lina
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Sociology.
    Jonsson, Fatima
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Time to play: the rationalization of leisure time2012In: Proceedings of the 2012 iConference, New York: Association for Computing Machinery (ACM), 2012, 145-151 p.Conference paper (Refereed)
    Abstract [en]

    This study explores how rationalization logic and rationalization processes influence digital gaming by looking at how players value and manage the time they spend on games. The study is framed in a discussion of leisure time, critical theories of computation and rationalization theory. Qualitative interview data is used in an inductive and phenomenology inspired approach. The results show two frames of understanding of gaming. First, games are perceived as media products and playing as a waste of time. Secondly, digital gaming is a hobby, a social activity highly valued within the framework of a rational time economy. We conclude that even though we are seeing a rationalization of leisure time in gaming, that rationalization process must be understood in the context of individualization within the new network society. This means that players are involved in a 'rational individualization' process where their management of leisure time and gaming activities are part of an ongoing identity project.

  • 20.
    El-Mekawy, Mohamed Sobih Aly
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    From Theory to Practice of Business-IT Alignment: Barriers, an Evaluation Framework and Relationships with Organisational Culture2016Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Business-IT alignment (BITA) continues to be a top management concern. It generally refers to a preferred condition in which the relationship between business and IT is optimised to maximise the business value of IT. Early approaches in both research and practice have focused on the role of IT in supporting business strategies. Today, a more extended approach of BITA has been embraced that recognises soft factors that are related to people and culture issues at both tactical and operational levels of organisations. ‘Why alignment is important’ is not the crucial question today. In fact ‘how it can be achieved and matured’ is the real concern of business executives. There exists a number of theoretical models for conceptualising BITA, however, they have different focuses and contain different BITA components. Therefore, there is a need for a means of supporting practitioners for selecting an appropriate model.

    Furthermore, there is a need for a more practice-oriented research that target higher maturity of BITA by understanding the organisational context, including barriers that hinders BITA and the mutual relationships between organisational culture and BITA. Thus, the overall problem addressed in the thesis is the following: In spite of extensive literature on business-IT alignment, there is still limited maturity of business-IT alignment in practice due to the limited knowledge on barriers that hinder BITA achievement from practitioners’ perspective, on the means for supporting the selection of an appropriate model for assessing BITA, and on mutual relationships between BITA and organisational culture.

    Based on this research problem, five research objectives were developed. The first two objectives corresponded to barriers to achieving BITA and supporting the selection of BITA model respectively. The remaining three objectives corresponded to the two unidirectional influences between BITA and organisational culture (OC) and to the mutual relationships between them respectively. Different research methodologies and strategies were applied to achieve the research objectives, including qualitative and quantitative studies as well as design science.

    The results presented in the thesis, each corresponding to an objective, are the following: 

    • A list of barriers that practitioners can use as a basis for better achievement of BITA, a better focus on strategic vs. tactical barriers, and their relationships to BITA components.
    • An evaluation framework that supports practitioners in selecting appropriate BITA models for assessing and modelling BITA.
    • An extended version of the strategic alignment model (SAM) of Luftman (2000), which considers organisational culture.
    • An analysis of the impact of BITA components on organisational culture profiles.
    • A BITA-organisational culture integrated view that supports decision-makers in facilitating decisions regarding both BITA and organisational culture.

    The results of the research provide both theoretical and empirical contributions to the business-IT alignment research and practice.

  • 21. Espinoza, Fredrik
    Individual service provisioning2003Doctoral thesis, comprehensive summary (Other academic)
  • 22.
    Giannoulis, Constantinos
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Model-driven Alignment: Linking Business Strategy with Information Systems2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Information technology (IT) is more pervasive than ever before, constituting a significant factor for performance and survival in the business arena. It is essential that IT within organizations understands what the Business needs in order to provide the necessary support and bring value, which is also true when IT is also the main value creator. Therefore, alignment between the Business and IT within organizations is an issue of great concern and it is still open for solvency both for business and IT executives and practitioners.

    This work is scoped to the alignment linkage between business strategy and information systems (IS), where business strategy typically constitutes the primary exponent of the Business and IS typically encapsulates the elements of IT sustaining an organization. Current approaches are either focused on detailed aspects of IS and treat business strategy abstractly or use distinct business strategy formulations (e.g. Value Chain) but deal with IS only partially. This is problematic because the abstract use of business strategy hinders traceability of strategic intentions and initiatives towards features/aspects of IS, which are aimed to actualize and support such intentions. Because approaches using distinct business strategy formulations are not relevant to all organizations and are limited only to the IS aspects addressed.

    Introducing a model-driven approach for the alignment linkage is aimed at addressing the outlined shortcomings. Following a design science research paradigm, the main artifact developed is the Unified Business Strategy Meta-Model (UBSMM), which is based on conceptualizing established business strategy formulations (e.g. Value Chain) and integrating them. UBSMM supports mappings to IS models used in organizations, such as IS requirements, enterprise models and enterprise architecture, and provides unambiguous utilization of business strategy for the alignment linkage.

    Contributions of this thesis are grounded both on the process of building UBSMM and mapping to IS models, as well as the artifact itself. Conceptualizing and integrating business strategy formulations provides a less ambiguous and unified view of strategic concepts. This limits variations in interpretation and reinforces mappings to IS models, which are defined based on inter-schema properties across models. Therefore, UBSMM can link business strategy to IS models enhancing their communication in a traceable manner, ergo, support alignment.

  • 23.
    Hallberg, David
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Lifelong learning: The social impact of digital villages as community resource centres on disadvantaged women2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The overall aim of this research was to enhance the understanding of what affects the social impact of ICT in lifelong learning on disadvantaged women.

    In contributing to the field of social informatics, this research employs behavioural theories as strategy and analytic possibilities. This research mainly used the Kenyan digital villages as CRCs as settings but did also look beyond such establishments to provide a more solid picture. The studies were located in Kenya with complementary studies in Bolivia, Cameroon, Sri Lanka, and Sweden. The main strategies and methods used were case study, comparative education approaches, and observations and interviewing techniques.

    The findings suggest that ICT and CRCs have the potential to support disadvantaged women and their lifelong learning. However, the positive social impacts are limited because the arrangement of them generally does not favour vernacular languages, illiterate users, female owners and users, or non-students. In general, the use of ICT was sometimes perceived as forced, which is both a barrier and a stressor in the use of ICT in lifelong learning. It also emerged from the comparative studies that discussions among the participants in the CRCs largely covered issues in respect to 1) family and reproduction and 2) self-esteem, i.e. what settles the matter of the social impact of ICT in lifelong learning depends on change attitude among men and women. With minimal if not zero self-esteem a change that would make the difference or break a woman’s “legendary status quo” in order for a woman to feel that she can reach her goal or ambitions in lifelong learning would be difficult. Hence the lack of self-esteem is a stressor in itself.

    This research is valuable for stakeholders delving into issues of development and learning using ICTs, not only in Kenya but in a broader, global perspective.

  • 24.
    Hallberg, David
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hansson, Henrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nilsson, Anders G.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Constraints of ICT in lifelong learning on disadvantaged women2014In: Electronic Journal of Information Systems in Developing Countries, ISSN 1681-4835, E-ISSN 1681-4835, Vol. 61, no 8, 1-14 p.Article in journal (Refereed)
    Abstract [en]

    This paper draws attention to the urgency of taking into consideration women’s genderspecific needs and interests in the implementation of community-based ICT projects in lifelong learning. We set out this research to understand the constraints of information and communications technology (ICT) in lifelong learning on disadvantaged women. National statistics and data from field studies were used. The constraints and their consequences at national level are often a result of national policies and regulations – or lack thereof – while the constraints and their consequences at local/regional level involve everyday-life occurrences that are present in women's immediate surroundings. Hence, an understanding of both levels is critical. This research is valuable for stakeholders delving into issues of development intervention using ICTs, not only in Kenya but in a broader, global perspective.

  • 25.
    Hallberg, David
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Hansson, Henrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nilsson, Anders G.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Integration and lifelong learning: immigrant women's reasoning and use of information and technologies in lifelong learning2015Article in journal (Refereed)
  • 26.
    Hallberg, David
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kulecho, Mildred
    Kulecho, Ann
    Loreen, Okoth
    Case studies of Kenyan digital villages with a focus on women and girls2011In: Journal of Language, Technology & Entrepreneurship in Africa, ISSN 1998-1279, E-ISSN 2309-5814, Vol. 3, no 1, 255-273 p.Article in journal (Refereed)
    Abstract [en]

    The present article refers to a case study on the Kenyan Government’s Digital Villages Project (DVP). The Kenyan Government, together with external stakeholders and private contractors, is increasing their ICT investments to provide the entire population with information and communication regardless of demographic factors. In the Kenyan context, digital villages are what normally other countries refer to as telecentres, i.e. a centre that provides services with regard to Internet and telecommunication. In this case, the digital villages also offer education, learning, and e-Government. The present study wants to learn whether DVP is accessible, and appropriate to women and girls in resource-poor environments and, thus, successful. The following questions guided the study: 1. Who are the users of Pasha Centres? 2. How and for what purposes are Pasha Centres used? 3. In what way do Pasha Centres consider local needs (e.g. education, literacy, job, and diversity)? 4. What do users and managers do to encourage female users? The study is built upon observations and interviews. The results show that male users generally believe that women have a lack of knowledge and understanding of ICT. The results also show that what is said by the government is not fully implemented at the local levels. The authors believe, despite this, that DVP has the potential to serve the population in vulnerable areas and that the government should continue focusing on similar projects.

  • 27.
    Hansson, Karin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Accommodating differences: Power, belonging, and representation online2014Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    How can political participatory processes online be understood in the dynamic, conflicted and highly mediated situations of contemporary society? What does democracy mean in a scenario where inequality and difference are the norms, and where people tend to abandon situations in which they and their interests are not recognized? How can we accommodate differences rather than consensus in a scenario where multiple networks of people are the starting point rather than a single community?

    In this thesis, these questions are explored through an iterative process in two studies that have used or resulted in three prototypes and one art exhibition. The first study is of communication practices in a global interest community, which resulted in two prototypes: Actory, a groupware that takes differences rather than equality as the starting point for a collaborative tool, and The Affect Machine, a social network where differences are used as a relational capital. The second study is of communication practices in a local commonality where the art exhibition Performing the Common created a public space and involved participants. This resulted in Njaru, a collaborative tool with integrated decision support and visualization of representativeness.

    In summary, these works depart from the notion of the importance of belonging for e-participation, where the individual can be seen as a participant in several performative states, more or less interconnected trans-local publics. Here the individuals’ participation in the local public sphere compete with their participation in other communities, and affect the conditions for local democracy. This thesis contributes to a deeper understanding of these processes, and discusses how differences in democratic participation can be managed with the help of ICT.

  • 28.
    Hansson, Karin
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Talantsev, Anton
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Lindgren, Tony
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Open government ideologies in post-Soviet countries2017In: International Journal of Electronic Governance, Vol. 10Article in journal (Refereed)
  • 29. Hansson, Per-Olof
    et al.
    Jobe, William
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Frontrunners in ICT: Kenyan runners'€™ improvement in training, informal learning and economic opportunities using smartphones2014In: ijEDict - International Journal of Education and Development using Information and Communication Technology, ISSN 1814-0556, E-ISSN 1814-0556, Vol. 10, no 4, 4-20 p.Article in journal (Refereed)
  • 30. Henelius, Andreas
    et al.
    Puolamaki, Kai
    Boström, Henrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Asker, Lars
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Papapetrou, Panagiotis
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    A peek into the black box: exploring classifiers by randomization2014In: Data mining and knowledge discovery, ISSN 1384-5810, E-ISSN 1573-756X, Vol. 28, no 5-6, 1503-1529 p.Article in journal (Refereed)
    Abstract [en]

    Classifiers are often opaque and cannot easily be inspected to gain understanding of which factors are of importance. We propose an efficient iterative algorithm to find the attributes and dependencies used by any classifier when making predictions. The performance and utility of the algorithm is demonstrated on two synthetic and 26 real-world datasets, using 15 commonly used learning algorithms to generate the classifiers. The empirical investigation shows that the novel algorithm is indeed able to find groupings of interacting attributes exploited by the different classifiers. These groupings allow for finding similarities among classifiers for a single dataset as well as for determining the extent to which different classifiers exploit such interactions in general.

  • 31. Jaber, Mohammad
    et al.
    Papapetrou, Panagiotis
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Helmer, Sven
    Wood, Peter T.
    Using Time-Sensitive Rooted PageRank to Detect Hierarchical Social Relationships2014In: Advances in Intelligent Data Analysis XIII, Berlin: Springer Berlin/Heidelberg, 2014, 143-154 p.Conference paper (Refereed)
    Abstract [en]

    We study the problem of detecting hierarchical ties in a social network by exploiting the interaction patterns between the actors (members) involved in the network. Motivated by earlier work using a rank-based approach, i.e., Rooted-PageRank, we introduce a novel time-sensitive method, called T-RPR, that captures and exploits the dynamics and evolution of the interaction patterns in the network in order to identify the underlying hierarchical ties. Experiments on two real datasets demonstrate the performance of T-RPR in terms of recall and show its superiority over a recent competitor method

  • 32.
    Johansson, Magnus
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Strååt, Björn
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Warpefelt, Henrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Verhagen, Harko
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Analyzing the social dynamics of non-player characters2014In: Frontiers in Gaming Simulation: 44th International Simulation and Gaming Association Conference, ISAGA 2013 and 17th IFIP WG 5.7 Workshop on Experimental Interactive Learning in Industrial Management. Revised Selected Papers / [ed] Sebastiaan A. Meijer, Riitta Smeds, Berlin: Springer, 2014, 173-187 p.Conference paper (Refereed)
    Abstract [en]

    Much of the current research into artificial intelligence (AI) for computer games has been focused on simple actions performed by the characters in games (such as moving between points or shooting at a target, and other simple strategic actions), or on the overarching structure of the game story. However, we claim that these two separate approaches need to be bridged in order to fully realize the potential of enjoyment in computer games. As such, we have explored the middle ground between the individual action and the story – the type of behavior that occurs in a “scene” within the game. To this end we have established a new model for that can be used to discover in what ways a non-player character acts in ways that break the player’s feeling of immersion in the world.

  • 33. Johansson, Ulf
    et al.
    Boström, Henrik
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Löfström, Tuve
    Linusson, Henrik
    Regression conformal prediction with random forests2014In: Machine Learning, ISSN 0885-6125, E-ISSN 1573-0565, Vol. 97, no 1-2, 155-176 p.Article in journal (Refereed)
    Abstract [en]

    Regression conformal prediction produces prediction intervals that are valid, i.e., the probability of excluding the correct target value is bounded by a predefined confidence level. The most important criterion when comparing conformal regressors is efficiency; the prediction intervals should be as tight (informative) as possible. In this study, the use of random forests as the underlying model for regression conformal prediction is investigated and compared to existing state-of-the-art techniques, which are based on neural networks and k-nearest neighbors. In addition to their robust predictive performance, random forests allow for determining the size of the prediction intervals by using out-of-bag estimates instead of requiring a separate calibration set. An extensive empirical investigation, using 33 publicly available data sets, was undertaken to compare the use of random forests to existing state-of-the-art conformal predictors. The results show that the suggested approach, on almost all confidence levels and using both standard and normalized nonconformity functions, produced significantly more efficient conformal predictors than the existing alternatives.

  • 34.
    Juhlin, Oskar
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Engström, Arvid
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Önnevall, Elin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Long Tail TV revisited: From ordinary camera phone use to Pro-Am video production2014In: CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, New York: Association for Computing Machinery (ACM), 2014, 1325-1334 p.Conference paper (Refereed)
    Abstract [en]

    Pro-Am live video producers broadcast events on a regular basis. They are here selected for an ethnographic study since their continuous content generation can teach us something of what it takes for amateurs, who currently struggle with mastering the video medium, to become proficient producers. We learn from media theory that Pro- Ams are distinguished from professionals in terms of inherent skills and identities, and have therefore focused on these characteristics. We add to this research by showing on-going challenges that the former face in their production, i.e. how their learning practices, such as learning through instructions, are situated and related to particular settings. Learning and development of skills were done as organizations, rather than as individuals. Furthermore, the recurrent nature of both events and broadcasts appears to be an important condition for establishing the terms needed to carry out a production, and to learn the skills of a producer. This understanding may explain in part why accounts in previous research, of single users struggling with the affordances of live video, point to such difficulties in mastering the medium. The findings guide design to better support activities contiguous with the set-up of the production, rather than the broadcast per se. 

  • 35.
    Kajko-Mattsson, Mira
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Corrective maintenance maturity model: problem management2001Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Maintenance has become one of the most complex, crucial and costly disciplines within software engineering. Despite this, very few maintenance process models have been suggested. The extant models are too general, covering all maintenance categories, i.e., corrective, adaptive, perfective, and preventive maintenance. They do not help in acquiring a deep objective understanding of any of the maintenance categories.

    One way to remedy this is to create process models specialised to each maintenance category. Corrective Maintenance Maturity Model (CM3) is such a model. It is entirely dedicated to corrective maintenance. It encompasses the most important processes utilised within this domain. They are CM3: Predelivery/Prerelease, CM3: Transition, CM3: Problem Management, CM3: Testing, CM3: Documentation, CM3: Upfront Maintenance, and CM3: Maintainers' Education and Training.

    In this thesis, we consider in detail one of the CM3 constituent process models, CM3: Problem Management. Problem management is the basis for conducting corrective maintenance. It not only handles software problems but also provides quantitative feedback important for assessing product quality, crucial for continuous process analysis and improvement, and essential for defect prevention.

    Just as other CM3 constituent processes, CM3: Problem Management is based on CM3 definitions of maintenance and of corrective maintenance, and it follows the CM3 process structure. It has seven components: (1) Taxonomy of Activities, which lists a set of activities relevant for the problem management process; (2) Conceptual Model, which defines concepts relating to information about the process; (3) Maintenance Elements, which explain and motivate the implementation of maintenance process activities; (4) Process Phases, which structure the CM3 constituent processes into process phases; (5) Maturity Levels, which structure the problem management process into three maturity levels (Initial, Defined and Optimal); (6) Roles, which define the responsibilities of individuals executing the process, and (7) Roadmaps, which aid in the navigation through the problem management process.

    Our primary goal with the CM3 model and its constituent processes is to create a fine-grained process model that allows maximal visibility into corrective maintenance. Some of our other goals are (1) to establish a common forum for communicating about corrective maintenance, (2) to suggest an evolutionary improvement path for software organisations from an ad hoc immature process to a mature and disciplined one, (3) to enable industrial organisations to examine their own practices and compare notes, (4) to provide a pedagogical tool for universities and industrial organisations in the process of educating their students and software engineers within the area of corrective maintenance.

    CM3: Problem Management was built primarily for ABB. It is the result of two research projects: Software Metrics Laboratory, and Software Maintenance Laboratory. Software Metrics Laboratory was established jointly by Ericsson and the Department of Computer and Systems Sciences (DSV) at the Royal Institute of Technology and Stockholm University in the years 1994-1996. During these years, we have developed a conceptual model of the basic concepts relating to the handling of software problems within corrective maintenance. This conceptual model evolved into CM3: Problem Management: Conceptual Model (Revisited) developed during the Software Maintenance Laboratory phase - a collaboration between ABB and DSV in the years 1998-2000. Although CM3: Problem Management has been primarily developed in the ABB context, it is targeted to all software organisations involved in building or improving their corrective maintenance processes.

  • 36.
    Karlström, Petter
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Cerratto-Pargman, Teresa
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ramberg, Robert
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Tools, language technology and communication in computer assisted language learning2006In: Writing and digital media / [ed] Luuk Van Waes, Mariëlle Leijten, Christine M. Neuwirth, Amsterdam: Elsevier, 2006, 1. ed.Chapter in book (Other academic)
  • 37.
    Kim, Hee-Cheol
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Computer support for collaborative reviewing of documents2001Doctoral thesis, comprehensive summary (Other academic)
  • 38. Kruse, Stein-Erik
    et al.
    Tedre, Matti
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Kayobyo, Godfrey
    Evaluation of the Swedish Government Funded Research Cooperation Support to Uganda: Final Report.2014Report (Other academic)
  • 39. Kruse, Stein-Erik
    et al.
    Tedre, Matti
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nekatibeb, Teshome
    Amani, Aimtonga
    Evaluation of the Swedish Research Cooperation with Tanzania 2009-2013: Final Report2014Report (Other academic)
  • 40.
    Lampinen, Airi
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Huotari, Kai
    Cheshire, Coye
    Challenges to Participation in the Sharing Economy: The Case of Local Online Peer-to-Peer Exchange in a Single Parents' Network2015In: ID&A Interaction design & architecture(s), ISSN 1826-9745, E-ISSN 2283-2998, no 24, 16-32 p.Article in journal (Refereed)
    Abstract [en]

    This paper depicts an initiative to deploy an online peer-to-peer exchange system for a community network of single parents - a group of people in need of goods, services, and social support in their local neighborhoods. We apply participant observation and semi-structured interviews to uncover key issues that can hinder the emergence of sharing practices in local community networks of this type. Our study illustrates how pressures related to single parenthood can impede opportunities to engage in peer-to-peer exchange, even when community members view the social and material benefits of participation as desirable and necessary. This complicates the prevalent narrative that local peer-to-peer exchange systems are an accessible and convenient alternative to traditional markets. Moreover, we discuss our collaboration with the community as well as the developers of the sharing platform, highlighting the challenges of user-centered design in the sharing economy.

  • 41.
    Larsson, Aron
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences. Mid Sweden University, Sweden.
    Riabacke, Mona
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Danielson, Mats
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Ekenberg, Love
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Cardinal and Rank Ordering of Criteria — Addressing Prescription within Weight Elicitation2015In: International Journal of Information Technology and Decision Making, ISSN 0219-6220, Vol. 14, 1299Article in journal (Refereed)
    Abstract [en]

    Weight elicitation methods in multi-criteria decision analysis (MCDA) are often cognitively demanding, require too much precision, time and effort. Some of the issues may be remedied by connecting elicitation methods to an inference engine facilitating a quick and easy method for decision-makers to use weaker input statements, yet being able to utilize these statements in a method for decision evaluation. In this paper, we propose a fast and practically useful weight elicitation method, answering to many of the requirements. The method builds on the ideas of rank-order methods, but can also take imprecise cardinal information into account. The method is subsequently employed in two real-life case studies and compared to a case where a simple ratio weight procedure using exact input statements was employed.

  • 42.
    Laryea, Rueben
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Project outcome classification with imprecise criteria information2013In: International Journal of Applied Decision Sciences, ISSN 1755-8085, Vol. 6, no 4, 372-387 p.Article in journal (Refereed)
    Abstract [en]

    A case in which managers have to make project outcome classification decisions with uncertainty in independently related criteria values is considered in this paper. A multi-criteria decision model is developed in this paper by selecting methods which delved into data analysis to help managers make informed classification decisions. Uncertainty in the criteria values is resolved using linear programming which enables managers to know the profit outcome of their projects for efficient resource allocation. The classification scheme from the linear programming process is used as predefined classification inputs for use in the Utilities Additives Discriminants(UTADIS) method, which further produces a classification model. The analysis presented a no misclassification error in the predefined classifications from the linear programming and the classifications in the UTADIS method, thus further boosting the confidence managers can entrust in the resulting classification model.

  • 43.
    Lönn, Carl-Mikael
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    E-Government Collaboration in the Swedish Public Sector: Multiple Studies on Collaboration Facilitators and Collaboration Modes2016Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Collaboration in the public sector is imperative to achieve e-government objectives such as improved efficiency and effectiveness of public administration and improved quality of public services. Collaboration across organizational and institutional boundaries requires public organizations to share e-government systems and services through for instance, interoperable information technology and processes. Demands on public organizations to become more open also require that public organizations adopt new collaborative approaches for inviting and engaging citizens in governmental activities.

    E-government related collaboration in the public sector is challenging, however, and collaboration initiatives often fail. Public organizations need to learn how to collaborate since forms of e-government collaboration and expected outcomes are mostly unknown. How public organizations can collaborate and the expected outcomes are thus investigated in this thesis by studying multiple collaboration cases on the acquisition and implementation of a particular e-government investment (digital archive). This thesis also investigates how e-government collaboration can be facilitated through artifacts. It is done through a case study, where objects that cross boundaries between collaborating communities in the public sector are studied, and by designing a configurable process model integrating several processes for social services. By using design science, this thesis also investigates how an m-government solution that facilitates collaboration between citizens and public organizations can be designed.

    The thesis contributes to literature through describing five different modes of interorganizational collaboration in the public sector and the expected benefits from each mode. It also contributes with an instantiation of a configurable process model supporting three open social e-services and with evidence of how it can facilitate collaboration. This thesis further describes how boundary objects facilitate collaboration between different communities in an open government design initiative. It contributes with a designed mobile government solution, thereby providing proof of concept and initial design implications for enabling collaboration with citizens through citizen sourcing (outsourcing a governmental activity to citizens through an open call). This thesis also identifies research streams within e-government collaboration research through a literature review and the thesis contributions are related to the identified research streams. This thesis gives directions for future research by suggesting that future research should focus further on understanding e-government collaboration and how information and communication technology can facilitate collaboration in the public sector. It is suggested that further research should investigate m-government solutions to form design theories. Future research should also examine how value can be co-created in e-government collaboration.

  • 44.
    Lönn, Carl-Mikael
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Juell-Skielse, Gustaf
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Päivärinta, Tero
    Modes of Collaboration for Realizing E-Government Benefits2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences (HICSS 2016) / [ed] Tung X. Bui, Ralph H. Sprague, Jr., IEEE Computer Society, 2016, 3031-3040 p.Conference paper (Refereed)
    Abstract [en]

    Collaboration among governmental organizations has been regarded as essential for realizing benefits of e-government investments. Inter-organizational collaboration on e-government can take several forms and can produce varying types of political, organizational, and technological benefits. However, few if any studies have delved deeper into analysis of how chosen modes of collaboration might relate to targeted e-government benefits. This paper studies multiple cases of how contemporary acquisitions and implementations of digital archiving systems have been launched through varying modes of collaboration among Swedish government agencies and municipalities. Our analysis reveals that whereas the target system, digital archive, is the same in all of the studied cases, the expected benefits varies. The article contributes by explaining how selected modes of collaboration in e-government may impact on the particular types of expected benefits.

  • 45.
    Lönn, Carl-Mikael
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Uppström, Elin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Understanding Public Sector Collaboration Through Boundary Object Theory: A Case Study of an E-Government Initiative in Sweden2016In: Proceedings of the 49th Annual Hawaii International Conference on System Sciences (HICSS 2016) / [ed] Tung X. Bui, Ralph H. Sprague, Jr., IEEE Computer Society, 2016, 2687-2696 p.Conference paper (Refereed)
    Abstract [en]

    This paper investigates a complex collaborative e-government initiative in Sweden using Boundary Object theory. 22 Swedish authorities have a joint mission to create a shared submission function to facilitate the communication and collaboration between numerous stakeholders such as forest owners, businesses and several other state-and local authorities. A case study approach is used where data is collected through in-depth interviews with different stakeholders, document studies and one focus group with project managers. Four boundary objects are identified: project, shared submission function, effects analysis and appropriation direction.  By analyzing these four we describe how boundary objects are used to facilitate collaboration within an open government ecosystem.

  • 46.
    Lönn, Carl-Mikael
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Uppström, Elin
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Nilsson, Andreas
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Designing an m-government solution: enabling collaboration through citizen sourcing2016In: Proceedings of the European Conference on Information Systems (ECIS 2016), Association for Information Systems, 2016Conference paper (Refereed)
    Abstract [en]

    By combining openness with m-government, OECD and the research community envisage benefits, and action is called for within this field.  The objective of this paper is to answer these calls and address the research question How to design a citizen-sourcing m-government solution to facilitate collaboration between governments and citizens? An instantiation of a complaint and problem management solution is designed and evaluated using design science. The solution (named Munizapp) comprises a mobile application (app) and an integration platform (ePlatform). The app is the front-end for citizens, enabling them to report complaints and problems to municipalities. The ePlatform facilitates seamless two-way communication between the app and back-end case management system in municipalities. Different evaluation activities have been carried out that proved the enabling features of the solution for facilitating collaboration. Usability evaluation and knowledge gained through the research process provides new knowledge to citizen sourcing and e government theory. One example is the need to expand citizen sourcing frameworks to also include stakeholders other than citizens and governments as well as the need to explicate value co-creation between all stakeholders touched by the solution. The paper ends with suggestion for future research that focus on stakeholder analysis and value co-creation.

  • 47.
    Majek, Dee
    Stockholm University, Faculty of Humanities, Department of Media Studies.
    Big Content's Big Blunders: Anti-piracy measures in the entertainment and copyright industries2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    This thesis examines the on-going anti-piracy and anti-file sharing measures taken by media conglomerates and big content as misguided attempts at addressing changing consumer expectations and social and technological norms. These measures include legislation such as the Stop Online Piracy Act (SOPA), Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (PIPA), Anti-Counterfeiting Trade Agreement (ACTA), and Cyber Intelligence Sharing and Protection Act (CISPA); and litigation against both extremes of the spectrum: from the world's largest file sharing search engines like The Pirate Bay, and cyberlockers like MegaUpload, to private citizens who illegally downloaded a few movies or a few songs. The manner in which the entertainment industry's largest, most expensive, and highest-profile anti-piracy measures in the recent years have been received by groups from IT corporations to human rights organizations, researchers, politicians, legal and internet experts, and millions of citizens worldwide are of focus; and how this translates into an unpopular public image is explored. Piracy is underlined as a service and distribution problem, and various international studies are presented in exploring the relationship between illegal downloading and legal purchases.

  • 48. Montola, Markus
    et al.
    Stenros, Jaakko
    Waern, Annika
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Philosophies and strategies of pervasive larp design2009In: Larp, the universe and everything / [ed] Matthijs Holter, Eirik Fatland, Even Tømte, Oslo: Knutepunkt , 2009, 197-222 p.Chapter in book (Other academic)
  • 49.
    Männikkö-Barbutiu, Sirkku
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Senior cyborgs: about appropriation of personal computers among some Swedish elderly people2002Doctoral thesis, monograph (Other academic)
  • 50.
    Nfuka Ngemera, Edephonce
    et al.
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    Rusu, Lazar
    Stockholm University, Faculty of Social Sciences, Department of Computer and Systems Sciences.
    IT Governance in the Public Sector: a Case Study in a Developing Country2009In: Handbook of Research on ICT-Enabled Transformational Government: a Global Perspective, Hershey: IGI Global, 2009Chapter in book (Other academic)
12 1 - 50 of 78
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf