Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Space Mechanics: A Beginner's Guide to Programming Fundamentals
SIGITE '24: Proceedings of the 25th Annual Conference on Information Technology EducationPages 37–42https://doi.org/10.1145/3686852.3687068This project strives to foster genuine interest in technology and computing in K-12 and non-IT undergraduate students. Using a simple space-themed game as the teaching platform, we aim to introduce students to fundamental programming concepts such as ...
- articleOctober 2024
Acceptance of a Mandatory E-Government System: The Public Employee Perspective
International Journal of Electronic Government Research (IJEGR-IGI), Volume 20, Issue 1Pages 1–19https://doi.org/10.4018/IJEGR.356406This replicative study evaluates the factors that influence the adoption of a mandatory e-Gov system in the perception of public university employees. The application of the UTAUT model showed that users perceive that by using the system they will ...
- research-articleJune 2024
Exploring tactile identification accuracy through advanced braille embossers: The dynamic combination of dot density and dot elevation
Education and Information Technologies (KLU-EAIT), Volume 29, Issue 18Pages 25333–25352https://doi.org/10.1007/s10639-024-12840-7AbstractThe scope of this paper is to examine the potential capabilities of embossed printers under the lens of Information Technology (IT). One of the main principles of IT is to manage and deliver information into accessible formats to all users with ...
- research-articleMarch 2024
The effectiveness of using IT in art education to develop learning motivation and psychological well-being
Education and Information Technologies (KLU-EAIT), Volume 29, Issue 15Pages 19537–19552https://doi.org/10.1007/s10639-024-12601-6AbstractThis study aims to explore the impact of a digital learning program on the motivation and well-being of students in the art industry in China. The use of competitive digital tools as a means of self-expression contributes to effective academic ...
- review-articleApril 2024
Securing the Industrial Internet of Things against ransomware attacks: A comprehensive analysis of the emerging threat landscape and detection mechanisms
Journal of Network and Computer Applications (JNCA), Volume 223, Issue Chttps://doi.org/10.1016/j.jnca.2023.103809AbstractDue to the complexity and diversity of Industrial Internet of Things (IIoT) systems, which include heterogeneous devices, legacy and new connectivity protocols and systems, and distributed networks, sophisticated attacks like ransomware will ...
-
- research-articleFebruary 2024
An extension of iStar for Machine Learning requirements by following the PRISE methodology
AbstractThe rise of Artificial Intelligence (AI) and Deep Learning has led to Machine Learning (ML) becoming a common practice in academia and enterprise. However, a successful ML project requires deep domain knowledge as well as expertise in a plethora ...
Highlights- The first Goal-Oriented i* extension for capturing Machine Learning (ML) requirements.
- It allows linking project objectives to ML solution elements.
- Set of guidelines to aid in the definition of the problem.
- It facilitates the ...
- research-articleJuly 2024
Proactive Relocation Decision-Making in a Multinational Manufacturing Network
Procedia Computer Science (PROCS), Volume 232, Issue CPages 43–52https://doi.org/10.1016/j.procs.2024.01.005AbstractRecent years have been demanding for manufacturing companies with a global footprint – the constant need to evaluate and re-evaluate manufacturing networks and sourcing due to ongoing crises e.g., coronavirus shutdowns, changing customs tariffs, ...
- research-articleApril 2024
From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education
ICCNS '23: Proceedings of the 2023 13th International Conference on Communication and Network SecurityPages 209–214https://doi.org/10.1145/3638782.3638814The manufacturing and critical infrastructure world is increasingly dependent on cyber security. Cyber-attacks are becoming increasingly sophisticated, targeting traditional Information Technology (IT) and Operational Technology (OT) systems mainly due ...
- articleSeptember 2023
A Scholar Case Study of IT Education Knowledge Through Practice for Development in a Post-Conflict Region Kosovo: Increased Investment in Private Education
Journal of Cases on Information Technology (JCIT-IGI), Volume 25, Issue 1Pages 1–66https://doi.org/10.4018/JCIT.330127The technological advancements have enormously changed the way humans live today. According to literature studies, countries that have placed a strong emphasis on the IT revolution could benefit from the rewards of the industrialization era. The study'...
- ArticleSeptember 2023
The Evolution of Government Strategies from IT to Digitalization: A Comparative Study of Two Time Periods in Swedish Local Governments
AbstractIn this paper we explore the evolution of the use of digital technology in the public sector. We do so by analyzing a corpus of IT- and digitalization strategies from Swedish local governments, produced from two time periods, using topic modeling. ...
- research-articleSeptember 2023
How digital transformation impacts organizational culture – A multi-hierarchical perspective on the manufacturing sector
Computers and Industrial Engineering (CINE), Volume 183, Issue Chttps://doi.org/10.1016/j.cie.2023.109432Highlights:- Digital Transformation (DT) impacts organizational culture (OC)
- OC need to be ...
Digital transformation (DT) is not merely restricted to a company’s adoption of digital technologies. Still, it implies changes to a company's business model, strategies, and culture. However, the impacts of DT on organizational ...
- research-articleAugust 2023
Automated ICS template for STRIDE Microsoft Threat Modeling Tool
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 118, Pages 1–7https://doi.org/10.1145/3600160.3605068Industrial Control Systems (ICS) are specific systems that combine information technology (IT) and operational technology (OT). Due to their interconnection and remote accessibility, they become a target for cyberattacks. As a result of their complexity ...
- research-articleAugust 2023
PLC Logic-Based Cybersecurity Risks Identification for ICS
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityArticle No.: 117, Pages 1–10https://doi.org/10.1145/3600160.3605067In recent years, Informational Technologies (IT) was massively deployed into Industrial Control Systems (ICS) mainly for its economic benefits. However, this new paradigm, converging IT and Operational Technologies (OT), brings new challenges that ...
- research-articleJune 2023
Application of MES/MOM for Industry 4.0 supply chains: A cross-case analysis
AbstractManufacturing is facing challenges in integrating information technology (IT) with operational technology (OT) and implementing Industrial Internet of Things (IIoT) concepts in the industry to increase manufacturing flexibility. This ...
Highlights- We examine manufacturing flexibility from an information architecture perspective and offer a smart factory capabilities framework
- research-articleJune 2023
A study and performance evaluation of computer network under the environment of bipolar complex fuzzy partition Heronian mean operators
Advances in Engineering Software (ADES), Volume 180, Issue Chttps://doi.org/10.1016/j.advengsoft.2023.103443Highlights- We examine the performance of computer network by using bipolar complex fuzzy (BCF).
The goal of this paper is to study and assessment of the performance of a computer network with the assistance of partition Heronian mean (PHM) operators in the environment of bipolar complex fuzzy (BCF) information. In today's world ...
- research-articleJune 2023
Understanding College Level Student Learning of Basic Programming at an Open Access Institution
ACMSE '23: Proceedings of the 2023 ACM Southeast ConferencePages 26–32https://doi.org/10.1145/3564746.3587007In this study, we present our findings with regard to teaching basic programming concepts at an Open Access Institution. The goal was to gather insight into how to best introduce programming to our students. We found that our students should start with ...
- research-articleMarch 2023
Data governance spaces: The case of a national digital service for personal health data
Information and Organization (INOR), Volume 33, Issue 1https://doi.org/10.1016/j.infoandorg.2023.100451AbstractThis paper investigates data governance empirically by conducting a retrospective study of the ten-year evolution of a national digital service for personal health data in Norway. We show how data governance unfolds over time as data ...
Highlights- Data governance spaces as the authorized relationships among multiple actors which specify the boundaries of decision-making authority, rights, roles, and ...
- research-articleFebruary 2023JUST ACCEPTED
How Suboptimal is Work-From-Home Security in IT/ICS Enterprises? A Strategic Organizational Theory for Managers
ACM Transactions on Management Information Systems (TMIS), Just Accepted https://doi.org/10.1145/3579645The COVID-19 pandemic (e.g., especially the first and second COVID waves) had forced firms (organizations) to radically shift a considerable (if not all) proportion of their employees to serve in a work-from-home (WFH) mode. Industry statistics showcase ...
- technical-noteFebruary 2023
Field experiments in operations management
Journal of Operations Management (WILEY-JOM), Volume 69, Issue 4Pages 676–701https://doi.org/10.1002/joom.1240AbstractWhile the field experiment is a powerful and well‐established method to investigate causal relationships, operations management (OM) has embraced this methodology only in recent years. This paper provides a comprehensive review of the existing OM ...
- research-articleJanuary 2023
How Hard Is Cyber-risk Management in IT/OT Systems? A Theory to Classify and Conquer Hardness of Insuring ICSs
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 6, Issue 4Article No.: 35, Pages 1–31https://doi.org/10.1145/3568399Third-party residual cyber-risk management (RCRM) services (e.g., insurance, re-insurance) are getting increasingly popular (currently, a multi-billion-dollar annual market) with C-suites managing industrial control systems (ICSs) based upon IoT-driven ...