118 research outputs found

    Review of National Cybersecurity Policies

    Get PDF
    The damages caused by cyber-attacks are becoming larger, broader and more serious as well as to include monetary losses and losses of lifeline. Some cyber-attacks are arguably suspected to be parts of national campaigns. Under such circumstances, efforts by the private sector are not enough to counteract against cyber-attacks, and the public sector must endeavour to enhance national cybersecurity capacities so that the nation can retain safe and secure life of nationals. We think it very important to ensure that the national cybersecurity strategies are sufficient, appropriate and up-to-dated, so that the national capacities progress towards the right direction at the adequate speed. Thus, we devised the method to review national cybersecurity strategies and used it to review the UK cybersecurity strategy. The result proved that the carefully formulated national strategies still need review and the method should work

    EGameFlow in a Serious Game: Gaming Experience with the Same Game Design but Different Learning Content

    Get PDF
    The development effort of game-based learning applications is very time-consuming and costly, especially when applications are developed that provide students an enjoyable gaming experience and support them to achieve their learning objectives. This is largely to be explained by the iterative development process with the conduction of playtests. Therefore, this study analyzes whether an identical gaming and learning experience is achieved with the same game design but different learning contents. A serious game for learning information literacy that was developed and iteratively improved through three conducted playtests is used in this study. The results show that an identical gaming and learning experience is achieved. This makes it possible to re-use the game design in combination with other learning contents without negatively affecting the learner’s playing and learning experience

    From Words to Results: The Role of IS in Bridging the Sustainability Strategy-Implementation Gap

    Get PDF
    After many years of reluctance and lack of commitment, companies are increasingly prioritizing sustainability and setting ambitious goals. Along with the rise of organizational sustainability strategy (OSS), the role of information systems (IS) in sustainability has increased and become a source of sustainability at the organizational level. Although ever more companies consider sustainability a top priority, they struggle to turn sustainability strategies into practice and observe measurable results. We followed a mixed methods approach combining qualitative interview data (n=13) and quantitative data from a multi-continental industry survey (n=551) to generate an in-depth understanding of the role of IS-enabled sustainability practices in influencing the organizational sustainability strategy-implementation gap. With our study, we demonstrate that IS-enabled sustainability practices mediate the impact of OSS on organizational sustainability performance (OSP) and that these practices are enabled by IS capabilities that are critical to implementing sustainability practices (technology intelligence, data analysis, and digital twinning capability)

    Transformational Leadership and Digital Creativity: The Mediating Roles of Creative Self-Efficacy and Ambidextrous Learning

    Get PDF
    Drawing insights from social cognitive theory and organizational learning theory, this study aims to uncover themediating mechanisms between direct manager’s transformational leadership behaviors and employees’ digital creativity in the context of digital technology. We conducted a field survey in China and collected data from 234 employees who utilized digital technologies to support daily work. Structural equation modelling analysis results showed that employees’ creative self-efficacy and two learning activities (exploitation vs. exploration) effectively transmitted the influence of transformational leadership ondigital creativity. Our study not only contributes to the understanding on effective use of digital technologies, but also provides practical insights for managers in the big data era

    The More Engaged, the More Generous: Examining the Influence of Viewers’ Engagement on Their Gifting Behavior in Live Streaming Services

    Get PDF
    Social Live Streaming Services (SLSSs) is an emerging form of social media that facilitates real-time interaction between streamers and their viewers through video streaming. With its growing prevalence worldwide, a wealth of literature has investigated its unique features of IT affordances and para-social interactions between streamers and their viewers, leaving viewers’ inner development and adjustment of attitudes and actions during the watching remained largely unknown. This study empirically examined the effects of viewers’ previous active engagement on their subsequent purchase behavior in SLSSs from the perspective of self-perception and perceived sunk costs. Results show that both free gifts and Danmaku (i.e., real-time comments) length significantly induce the purchase of charged gifts and that there are significant gender discrepancies underlying these mental attribution processes

    CakeVR: A social virtual reality (VR) tool for co-designing cakes

    Get PDF
    Cake customization services allow clients to collaboratively personalize cakes with pastry chefs. However, remote (e.g., email) and in-person co-design sessions are prone to miscommunication, due to natural restrictions in visualizing cake size, decoration, and celebration context. This paper presents the design, implementation, and expert evaluation of a social VR application (CakeVR) that allows a client to remotely co-design cakes with a pastry chef, through real-time realistic 3D visualizations. Drawing on expert semi-structured interviews (4 clients, 5 pastry chefs), we distill and incorporate 8 design requirements into our CakeVR prototype. We evaluate CakeVR with 10 experts (6 clients, 4 pastry chefs) using cognitive walkthroughs, and fnd that it supports ideation and decision making through intuitive size manipulation, color/favor selection, decoration design, and custom celebration theme fitting. Our fndings provide recommendations for enabling co-design in social VR and highlight CakeVR’s potential to transform product design communication through remote interactive and immersive co-design

    Social VR: A new medium for remote communication and collaboration

    Get PDF
    We are facing increasingly pressure on reducing travel and working remotely. Tools that support effective remote communication and collaboration are much needed. Social Virtual Reality (VR) is an emerging medium, which invites multiple users to join a collaborative virtual environment (VE) and has the potential to support remote communication in a natural and immersive way. We successfully organized a CHI 2020 Social VR workshop virtually on Mozilla Hubs, which invited researchers and practitioners to have a fruitful discussion over user representations and ethics, evaluation methods, and interaction techniques for social VR as an emerging immersive remote communication tool. In this CHI 2021 virtual workshop, we would like to organize it again on Mozilla Hubs, continuing the discussion about proxemics, social cues and VE designs, which were identified as important aspects for social VR communication in our CHI 2020 workshop

    Towards a Cloud Architectural Decision Framework using Case-Based Reasoning and Rule-Based Reasoning

    Get PDF
    Correct decision making about the cloud platform architecture is crucial for the success of any cloud migration project; bad decisions can lead to undesirable consequences. Rules Based Reasoning (RBR), a popular approach for solving clearly defined problems, can be used for cloud platform recommendation if a comprehensive set of requirements are available. However, the responsibility of decision-making is increasingly moving away from the hands of the technical subject matter experts, and into the hands of the business sponsors who, despite being the end-all, be-all decision-makers, typically do not have access to sufficient information at the initial stages of the project lifecycle. Therefore, in this paper, we propose combining Case Based Reasoning (CBR) with RBR to assist business sponsors in making strategic decisions between public, private and hybrid cloud with a high level of confidence even at the initial stages of the project

    Conceptualizing Control Configurations: A Control Theory Perspective on Outsourced Information Systems Development

    Get PDF
    Past research on information systems development outsourcing (ISD-outsourcing) has found control theory to be a useful perspective for examining the co-ordination between the client and the vendor. Research on ISD-outsourcing has uncovered two distinct control mechanisms: structural and process control mechanisms. The structural control mechanism describes “what”, that is, the structure of the control mode, whereas the process control mechanism explains “how”, that is the process through which the control mode is enacted. Although the control literature discusses structural and process control mechanisms, it does not describe the ways in which control mechanisms can be combined for ensuring project success. Grounded in case study data from fifteen interviews in eight ISD-outsourcing projects, we conceptualise five control configurations describing the different combinative patterns of control mechanisms within and across control modes. Then, we identify the relationship between control configuration types and ISD-outsourcing project success
    • …
    corecore