Ändra sökning
Avgränsa sökresultatet
1 - 47 av 47
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Elragal, Ahmed
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Opening Digital Archives and Collections With Emerging Data Analytics Technology: A Research Agenda2017Ingår i: Tidsskriftet Arkiv, ISSN 1891-8107, E-ISSN 1891-8107, Vol. 8, nr 1Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In the public sector, the EU legislation requires preservation and opening of increasing amounts of heterogeneous digital information that should be utilized by citizens and businesses. While technologies such as big data analytics (BDA) have emerged, opening of digital archives and collections at a large scale is in its infancy. Opening archives and collections involve also particular requirements for recognizing and managing issues of privacy and digital rights. As well, ensuring the sustainability of the opened materials and economical appraisal of digital materials for preservation require robust digital preservation practices. We need to proceed beyond the state-of-the-art in opening digital archives and collections through the means of emerging big data analytics and validating a novel concept for analytics which then enables delivering of knowledge for citizens and the society. We set out an agenda for using BDA as our strategy for research and enquiry and for demonstrating the benefit of BDA for opening digital archives by civil servants and for citizens. That will –eventually -transform the preservation practices, and delivery and use opportunities of public digital archives. Our research agenda suggests a framework integrating four domains of inquiry, analytics-enhanced appraisal, analytics-prepared preservation, analytics-enhanced opening, and analytics-enhanced use, for utilizing the BDA technologies in the domain of digital archives and collections. The suggested framework and research agenda identifies initially particular BDA technologies to be utilized in each of the four domains, and contributes by highlighting a need for an integrated “public understanding of big data” in the domain of digital preservation.

  • 2.
    Haddara, Moutaz
    et al.
    Department of Information Systems, University of Agder.
    Päivärinta, Tero
    Department of Information Systems, University of Agder.
    Why benefits realization from ERP in SMEs doesn't seem to matter?2011Ingår i: 2011 44th Hawaii International Conference on System Sciences: (HICSS 2011); Kauai, Hawaii, USA, 4 - 7 January 2011 / [ed] Ralph H. Sprague, Piscataway, NJ: IEEE Communications Society, 2011, artikel-id 5718960Konferensbidrag (Refereegranskat)
    Abstract [en]

    It is often argued that IT investments require active management practices for benefits realization. This applies also to enterprise resource planning (ERP) systems. As well, benefits realization efforts are assumed to create more value than they cost. Hence, the maturity of organizations should be increased and their cultures cultivated towards more rational benefits realization practices. Our study on ERP implementations in Egyptian medium-sized organizations, however, provides aberrant results that challenge the fundamental arguments for formal benefits realization practices. While investments in ERP are regarded as significant, and the projects challenging, formal benefits realization and investment evaluation practices are considered largely irrelevant. The reasons include the "self-evident" nature of ERP benefits, perceived difficulty and costliness of method use and suspicions on rationality of methods. A government policy to support ERP investments may also decrease incentives for further benefits optimization. Cost coordination of the implementation efforts, however, continues to be an issue

  • 3.
    Hellang, Øyvind
    et al.
    University of Agder.
    Flak, Leif S.
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Metoder og teknikker for gevinstrealisering2012Ingår i: Gevinstrealisering og offentlige IKT-investeringer, Oslo: Universitetsforlaget, 2012, s. 50-76Kapitel i bok, del av antologi (Övrigt vetenskapligt)
  • 4.
    Hellang, Øyvind
    et al.
    University of Agder.
    Flak, Leif Skiftenes
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Diverging approaches to benefits realization from public ICT investments: A study of benefits realization methods in Norway2013Ingår i: Transforming Government: People, Process and Policy, ISSN 1750-6166, E-ISSN 1750-6174, Vol. 7, nr 1, s. 93-108Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Purpose – The purpose of this paper is to explore practical methods for benefits realisation, with the intention of investigating if they are variance of a theme or rather can be classified as different approaches.Design/methodology/approach – Based on a document study of Norwegian methods-in-use, this study uses an analytical comparison following an assimilation-accommodation procedure to categorize the chosen methods as instances of approaches to benefits realisation.Findings – This study documents the emergence of several methods from practice in the last half decade. This analysis suggests the existence of three distinct approaches to benefits realisation and defines these according to their central features.Research limitations/implications – This is a document study that could have been enhanced byempirical data on first-hand experiences from the use of these methods. The findings of this study document a critical investigation of methods for benefits realisation, providing an enhanced base framework of three approaches for future research to build on.Originality/value – This study provides fresh perspectives on benefits realisation by suggesting that existing methods differ to an extent that the authors argue they belong to different approaches that are likely to cause quite different results in practical use. This has important implications for bothresearch and practice, as research should analyse benefits realisation efforts according to approach, and practice needs to carefully consider their choice of method based on their actual needs. Further, the paper employs an established analytical framework for a novel definition of approaches to the field of benefits realisation in the public sector.

  • 5.
    Hellang, Øyvind
    et al.
    University of Agder.
    Flak, Leif Skiftenes
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Methods for realizing benefits from ICT in the Norwegian public sector: a comparison2012Ingår i: Proceedings of the Transforming Government Workshop 2012: tGov 2012, London: Brunel University Business School , 2012Konferensbidrag (Refereegranskat)
    Abstract [en]

    Benefits realization from public information and communication technology (ICT) investments is complicated. Research and development has resulted in methods for evaluating alternative business cases – and also more substantial methods to manage effects through an investment’s life cycle. Previous research suggests that use of benefits realization methods can lead to more informed decisions and implementations driven by benefits, this in turn can result in more realized benefits. However, there is a lack of studies of existing benefits realization methods-in-use. The objective of this article is to give an overview of the state-of-the-art of benefits realization method use in the Norwegian public sector, to highlight the variety of methods-in-use, and to discuss the different methods with reference to the much cited Benefits management model (Ward et al., 2006).

  • 6.
    Hillen, Stefanie Andrea
    et al.
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Perceived support in e-collaborative learning: an exploratory study which make use of synchronous and asynchronous online-teaching approaches2012Ingår i: Advances in Web-Based Learning - ICWL2012: 11th International Conference, Sinaia, Romania, September 2-4, 2012. Proceedings E / [ed] Elvira Popescu; Qing Li; Ralf Klamma; Howard Leung; Marcus Specht, Heidelberg: Encyclopedia of Global Archaeology/Springer Verlag, 2012, s. 11-20Konferensbidrag (Refereegranskat)
    Abstract [en]

    This study compares four different learning environments for e-collaborative learning in two European countries related to the dimension of student’s mutual support. The theoretical baseline is Vygotsky’s zone of proximal development (ZOPD) and the socio-genetic approach of Piaget. The analyzed data are based on questionnaires collected over the time period of an entire semester including four different courses at the master’s level. These courses applied different e-collaborative approaches including a variety of tools for supporting communication. It is assumed that these courses including communication tools e.g. virtual face-to-face meetings enhance the chances for better communication, and finally, for mutual support of students themselves. The objective is to investigate how the different environments have affected the students’ perception related to different e-collaborative learning platforms in the dimensions of social support, information exchange, and task support.

  • 7.
    Iden, Jon
    et al.
    Norwegian School of Economics.
    Tessem, Bjørnar
    University of Bergen.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    IS development/IT operations alignment in system development projects: a multi-method research2012Ingår i: International Journal of Business Information Systems, ISSN 1746-0972, E-ISSN 1746-0980, Vol. 11, nr 3, s. 343-359Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The purpose of this paper is to explore IS development/IT operations alignment in system development projects. The paper triangulates data from four independent studies in order to explore how the two domains are aligned in today's system development projects. The paper concludes that the two domains are unsatisfactorily aligned: communication and information flow is not efficient, plans and activities are not well-connected, and they do not have a close working relationship. Our findings suggest that improving IS development/IT operations alignment must be a priority for IT managers, and we offer suggestions for focal issues. This study shed light on a new aspect of IT governance and alignment challenges, and provides researchers with data and perspectives for further research.

  • 8.
    Iden, Jon
    et al.
    NHH – Norwegian School of Economics, Bergen.
    Tessem, Bjørnar
    University of Bergen.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Problems in the interplay of IS development and IT operations: an alignment analysis2013Ingår i: Information Systems Development: Reflections, Challenges and New Directions / [ed] Rob Pooley; Jennifer Coady; Christoph Schneider; Henry Linger; Chris Barry; Michael Lang, New York: Springer Science+Business Media B.V., 2013, s. 23-33Konferensbidrag (Refereegranskat)
    Abstract [en]

    This chapter addresses the interplay of IS development and IT operations in system development projects, as seen from the perspective of IT operations. The underlying perspective is that a well-performed interplay of the two domains is essential, both for the successful development of a new information system, as well as for its subsequent operation. In this chapter, we use alignment theory to analyse data from a Delphi study in order to investigate the interplay of the two areas. The chapter concludes that the two areas are often unsatisfactorily aligned and that improving their interplay must be a priority for IS development and IT operations alike.

  • 9.
    Iden, Jon
    et al.
    Norwegian School of Economics.
    Tessem, Bjørnar
    University of Bergen.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    The alignment of IS development and IT operations in system development projects: A multi-method research2011Ingår i: Norsk konferanse for organisasjoners bruk af informasjonsteknologi, NOKOBIT 2011 / [ed] Terje Fallmyr, Trondheim: Tapir Academic Press , 2011, s. 39-52Konferensbidrag (Refereegranskat)
    Abstract [en]

    This research addresses the relationship of IS development and IT operations in system development projects. The paper uses an alignment perspective to analyze data from four independent studies: one focus group discussion, two case studies, and one Delphi study, in order to explore the relationship of the two domains. The paper concludes that the two domains are unsatisfactorily aligned, they are not well acquainted with each other’s domains, ommunication and information flow is not efficient, plans and activities are not well connected, and they do not have a close working relationship characterized by long-term commitments, and where goals, risk and benefits are shared. Improving their alignmentmust be a priority for IS development and IT operations alike.

  • 10.
    Ilvonen, Ilona
    et al.
    Tampere University of Technology.
    Jussila, Jari
    Tampere University of Technology.
    Kärkkäinen, Hannu
    Tampere University of Technology.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Knowledge security risk management in contemporary companies – toward a proactive approach2015Ingår i: 2015 48th Hawaii International Conference on System Sciences (HICSS 2015): Hawaii, USA, 5-8 January 2015, Piscataway, NJ: IEEE Communications Society, 2015, s. 3941-3950, artikel-id 7070291Konferensbidrag (Refereegranskat)
    Abstract [en]

    Although emerging organizational knowledge systems, such as social media, are widely researched, related knowledge security risks have received less attention. Traditional information security management models tend to concentrate on the technological viewpoint to secure existing information assets. However, the use of contemporary approaches for knowledge creation and sharing offer new important possibilities for making use of internal and external knowledge. Simultaneously, their implementation involves changesin technologies, as well as a change in work processes and communications. Hence, knowledge security risk management should be developed from the current focus on relatively static containers and information assets toward more proactive management of the potential future risks of knowledge sharing. This paper introduces a proactive process for managing knowledge security risks and reports experiences of its use by professionals with experience in various topics of information and knowledge security.

  • 11.
    Iqbal, Sarfraz
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Booth, Todd
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Towards personalized system of instruction for educational online information security lab exercises: research-in-progress2012Ingår i: Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012 / [ed] Terje Fallmyr, Trondheim: Tapir Akademisk Forlag, 2012, s. 133-144Konferensbidrag (Refereegranskat)
    Abstract [en]

    Information Security education benefits greatly from hands-on laboratory oriented exercises. Campus students often have access to security lab equipment. However, remote students, who never visit the campus, often have no laboratory access at all. While previous literature describing designs for information security laboratories are seldom based on specified pedagogical approaches or systematic design theories, this paper contributes by outlining a design theory of online InfoSec labs based on the “Personalized system of instruction” (PSI). We also illustrate the PSI-oriented approach to on-line information security education with help of design suggestions and general level evaluation measures.

  • 12.
    Iqbal, Sarfraz
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Booth, Todd
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Towards personalized system of instruction for educational online information security lab exercises: research-in-progress2012Ingår i: Norsk konferanse for organisasjoners bruk av informasjonsteknologi: NOKOBIT 2012 / [ed] Terje Fallmyr, Trondheim: Tapir Akademisk Forlag, 2012, s. 133-144Konferensbidrag (Refereegranskat)
    Abstract [en]

    Information Security education benefits greatly from hands-on laboratory oriented exercises. Campus students often have access to security lab equipment. However, remote students, who never visit the campus, often have no laboratory access at all. While previous literature describing designs for information security laboratories are seldom based on specified pedagogical approaches or systematic design theories, this paper contributes by outlining a design theory of online InfoSec labs based on the “Personalized system of instruction” (PSI). We also illustrate the PSI-oriented approach to on-line information security education with help of design suggestions and general level evaluation measures.

  • 13.
    Iqbal, Sarfraz
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Towards a design theory for educational on-line information security laboratories2012Ingår i: Advances in Web-Based Learning - ICWL 2012: 11th International Conference, Sinaia, Romania, September 2-4, 2012. Proceedings / [ed] Elvira Popescu; Qing Li; Ralf Klamma; Howard Leung; Marcus Specht, Heidelberg: Encyclopedia of Global Archaeology/Springer Verlag, 2012, s. 295-306Konferensbidrag (Refereegranskat)
    Abstract [en]

    Online learning for educating information security professionals has increased in popularity. The security curriculum and technology, as well as hands-on laboratory experiences implemented in information security labs, are important elements in an online education system for information security. We drew our motivation from an on-going information security lab development initiative in our own institution, and this paper aims to provide an integrated overview on reported instances of online hands-on education in information security. Our review contributes to the existing knowledge by using the anatomy of design theory framework as a basis for literature analysis, as this provides a common basis to examine theories about human-created information technology artifacts such as information security labs and how such knowledge has been communicated to academia. Our results show that none of the articles studied here puts forward a well-grounded and tested design theory for on-line information security laboratories. This hinders accumulation of knowledge in this area and makes it difficult for others to observe, test and adapt clear design principles for security laboratories and exercises.

  • 14.
    Iqbal, Sarfraz
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Thapa, Devinder
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Awad, Ali Ismail
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Conceptual Model of Online Pedagogical Information Security Laboratory: Toward an Ensemble Artifact2015Ingår i: 2015 48th Hawaii International Conference on System Sciences (HICSS 2015): Hawaii, USA, 5-8 January 2015, Piscataway, NJ: IEEE Communications Society, 2015, s. 43-52, artikel-id 7069664Konferensbidrag (Refereegranskat)
    Abstract [en]

    Distance education in information security has unique requirements in comparison to on-campus education. For instance, an online InfoSec lab is required to provide hands-on education to distance students while development and operation of a lab is a non-trivial problem. There is a need to understand the nature of the online InfoSec labs as ensemble artifacts, and just a black-box tool’s view is not enough. This article suggests a conceptual model to explain the ensemble view of the online InfoSec lab. In doing so, the paper makes two specific contributions: First, it conceptualizes the online Information Security (InfoSec) lab as an ensemble artifact so that we can unfold the black-box view of an InfoSec lab and understand the important building blocks (entities of the lab) and their interrelationships. Second, it suggests design principles to implement the conceptual model of an InfoSec lab.

  • 15.
    Juell-Skielse, Gustaf
    et al.
    Stockholm University.
    Lönn, Carl-Mikael
    Stockholm University.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Modes of collaboration and expected benefits of inter-organizational E-government initiatives: A multi-case study2017Ingår i: Government Information Quarterly, ISSN 0740-624X, E-ISSN 1872-9517, Vol. 34, nr 4, s. 578-590Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Collaboration among governmental organizations has been regarded as essential for realizing benefits of e-government investments. Inter-organizational collaboration on e-government can appear in several forms and can aim at varying types of benefits. However, few if any studies have delved deeper into analysis of how chosen forms of collaboration might relate to targeted e-government benefits. This article studies five cases of how contemporary acquisitions and implementations of digital archiving systems have been launched through five modes of collaboration (autonomous, standardization, framework agreement, consortium, and central service organization) among organizations in the Swedish public sector. Our analysis reveals that whereas the target system, digital archive in our case, stays similar, expected benefits vary. The article contributes by elaborating the concept of mode of collaboration that identifies typical benefits justifying a choice of a particular collaboration form on e-government development and describing the five modes in more detail based on a multi-case study. The article also outlines fourteen related propositions of the correlation between the collaboration modes and expected benefits to be verified by further research.

  • 16.
    Larsen, Even Åby
    et al.
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Smolander, Kari
    Lappeenranta University of Technology.
    A model for analyzing changes in systems development practices2012Ingår i: Journal of Information Technology Theory and Application, ISSN 1552-6496, E-ISSN 1532-4516, Vol. 13, nr 3, s. 21-48Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper introduces an empirically grounded model for analyzing intended and unintended changes in the prevalence of information systems development practices. In the model, any development practice observable in a development organization can be analyzed according to two dimensions: the intended scope of defined practices versus the actual scope of enacted practices. Furthermore, the model identifies eight types of change paths in systems development practices based on the two dimensions: emergence, entropy, initiation, abandonment, formalization, informalization, implementation, and recalcitrance. The eight types of change paths provide an integrated theoretical model for understanding how systems development practices can change in organizations and projects and among individual developers in a given context. The paper concludes by discussing how the model complements and integrates concepts of the contemporary research on systems development practices and outlines its potential uses for future research.

  • 17.
    Lönn, Carl-Mikael
    et al.
    Stockholm University.
    Juell-Skielse, Gustaf
    Stockholm University.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Modes of Collaboration for Realizing E-government Benefits2016Ingår i: 2016 49th Hawaii International Conference on System Sciences (HICSS 2016): Hawaii, USA, 5-8 January 2016 / [ed] Bui, TX; Sprague, RH, Piscataway, NJ: IEEE Communications Society, 2016, s. 3031-3040, artikel-id 7427563Konferensbidrag (Refereegranskat)
    Abstract [en]

    Collaboration among governmental organizations has been regarded as essential for realizing benefits of e-government investments. Inter-organizational collaboration on e-government can take several forms and can produce varying types of political, organizational, and technological benefits. However, few if any studies have delved deeper into analysis of how chosen modes of collaboration might relate to targeted e-government benefits. This paper studies multiple cases of how contemporary acquisitions and implementations of digital archiving systems have been launched through varying modes of collaboration among Swedish government agencies and municipalities. Our analysis reveals that whereas the target system, digital archive, is the same in all of the studied cases, the expected benefits varies. The article contributes by explaining how selected modes of collaboration in e-government may impact on the particular types of expected benefits.

  • 18.
    Moe, Carl Erik
    et al.
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Challenges in information systems procurement in the public sector2013Ingår i: Electronic Journal of e-Government, ISSN 1479-439X, E-ISSN 1479-439X, Vol. 11, nr 1, s. 307-322Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Public procurement constitutes a large part of the market in many countries, and it has the potential of playing an important role in stimulating communities and serving policy goals. With this in mind the governments have set regulations for public procurement. Procurement of Information Systems is especially challenging due to the complexity of procuring unknown technology and the importance an information system has for different stakeholders in an organization. Public procurement of information systems (IS) and services provides several challenges to the stakeholders involved in the procurement processes. However, these are not well established or understood, and there is a knowledge gap that needs to be covered. This paper presents results from a Delphi study, which involved 46 experienced procurement managers, chief information officers, and vendor representatives in the Norwegian public sector. The participants identified 98 challenges related to IS procurement, and subsequently ranked the relative importance of the top issues. The study supports findings from previous research related to diverging stakeholder goals; challenges in balancing between objectives; in requirement specifications; and in too narrow cost focus. In addition to providing empirical confirmation of these previous propositions the study revealed new findings, such as benefits realization in IS procurement; coordinating and standardizing public procurement processes; complex and constraining government regulations; issues of technological integration and compatibility; and inter-municipal cooperation. Developing clear requirements specifications stands out as critical for public sector officials. The results provide a rich overview of IS procurement challenges in the public sector in Norway, and may also give a good picture of challenges in other countries with similar procurement regulations.

  • 19.
    Nilsson, Jörgen
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ingemar
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Westerlund, Parvaneh
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Lindqvist, Göran
    Project: Concise Preservation by combining Managed Forgetting and Contexualized Remembering2014Övrigt (Övrig (populärvetenskap, debatt, mm))
  • 20.
    Padyab, Ali Mohammad
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Harnesk, Dan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Genre-Based Approach to Assessing Information and Knowledge Security Risks2015Ingår i: Transportation Systems and Engineering: Concepts, Methodologies, Tools, and Applications, Hershey, PA: IGI Global, 2015, s. 1237-1253Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organization- and knowledge-centric identification and analysis of security risks. In order to operationalize the genre-based approach, we suggest the use of a genre-based analytical method for identifying organizational communication patterns through which organizational knowledge is shared. The genre-based method is then complemented with tasks and techniques from a textbook risk assessment method (OCTAVE Allegro). We discuss the initial experiences of three experienced information security professionals who tested the method. The article concludes with implications of the genre-based approach to analyzing information and knowledge security risks for future research and practice.

  • 21.
    Padyab, Ali Mohammad
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Harnesk, Dan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Genre-Based Approach to Assessing Information and Knowledge Security Risks2014Ingår i: International Journal of Knowledge Management, ISSN 1548-0666, E-ISSN 1548-0658, Vol. 10, nr 2, s. 13-27, artikel-id 2Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Contemporary methods for assessing information security risks have adopted mainly technical views on information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines a new, genre-based, approach to information security risk assessment in order to orientate toward organization- and knowledge-centric identification and analysis of security risks. In order to operationalize the genre-based approach, we suggest the use of a genre-based analytical method for identifying organizational communication patterns through which organizational knowledge is shared. The genre-based method is then complemented with tasks and techniques from a textbook risk assessment method (OCTAVE Allegro). We discuss the initial experiences of three experienced information security professionals who tested the method. The article concludes with implications of the genre-based approach to analyzing information and knowledge security risks for future research and practice.

  • 22.
    Padyab, Ali Mohammad
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Harnesk, Dan
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Genre-based assessment of information and knowledge security risks2014Ingår i: Proceedings of the Annual Hawaii International Conference on System Sciences, ISSN 1530-1605, s. 3442-3451, artikel-id 6759030Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Contemporary methods for assessing information security risks have adopted mainly technical views on the information and technology assets. Organizational dynamics of information management and knowledge sharing have gained less attention. This article outlines how an information security risk assessment method can be elaborated using knowledge-centric analysis of information assets. For this purpose, we suggest the use of a genre-based analysis method for identifying organizational communication patterns, through which organizational knowledge is shared. Initial experiences of the method try-outs by three experienced information security professionals are discussed. The article concludes with a look at the implications of a genre-based analysis of knowledge assets for future research and practice.

  • 23.
    Padyab, Ali Mohammad
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Digitala tjänster och system.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Digitala tjänster och system. University of Oulu, Finland.
    Ståhlbröst, Anna
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Digitala tjänster och system.
    Bergvall-Kåreborn, Birgitta
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Digitala tjänster och system.
    Awareness of Indirect Information Disclosure on Social Network Sites2019Ingår i: Social Media + Society, ISSN 2056-3051, E-ISSN 2056-3051, Vol. 5, nr 2Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This research investigates user awareness and attitudes toward potential inferences of information posted on social network sites (SNSs). The study reports how user attitudes change after exposure to inferences made based upon information they have disclosed on an SNS, namely, on Facebook. To demonstrate this, two sub-studies involving three focus group sessions were conducted with Facebook users. In the first sub-study, the users received a general introduction to information that can be inferred from posts by using a prototypical privacy-enhancement tool called DataBait. Then, the second sub-study allowed the users to witness the potential inferences of their own Facebook photos and posts by using the DataBait tool. Next, qualitative content analysis was conducted to analyze the results, and these showed that the participants’ attitudes toward privacy on SNSs changed from affective to cognitive when they became aware of potential inferences from actual information posted on their own Facebook accounts. The results imply that end users require more cognitive awareness regarding their genres of disclosure and the effect of their disclosures on their privacy. Moreover, as privacy awareness is contextual, there is a need for more research and development of online tools that will allow users to manage and educate themselves.

  • 24.
    Padyab, Ali
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Ståhlbröst, Anna
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Bergvall-Kåreborn, Birgitta
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Facebook Users Attitudes towards Secondary Use of Personal Information2016Ingår i: Proceedings of the Thirty Seventh International Conference on Information Systems: ICIS 2016, 2016, s. 1-15Konferensbidrag (Refereegranskat)
    Abstract [en]

    This paper reports on a study of how user attitudes to institutional privacy change after exposing users to potential inferences that can be made from information disclosed on Facebook. Two sets of focus group sessions with Facebook users were conducted. Three sessions were conducted by demonstrating to the users, on a general level, what can be inferred from posts using prototypical software called DataBait. Another set of three sessions let the users experience the potential inferences from their own actual Facebook profiles by using the DataBait tool. Findings suggest that the participants’ attitudes to secondary use of information changed from affective to cognitive when they were exposed to potential third-party inferences using their own actual personal information. This observation calls for more research into online tools that allow users to manage and educate themselves dynamically about their own disclosure practices.

  • 25.
    Pekkola, Samuli
    et al.
    Tampere University of Technology.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Introduction to the information systems procurement and benefits realization minitrack2016Ingår i: 2016 49th Hawaii International Conference on System Sciences (HICSS 2016): Hawaii, USA, 5-8 January 2016, Piscataway, NJ: IEEE Communications Society, 2016, , s. 1Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    Organizational information systems are acquired through numerous means: as service (cloud computing), as configurations to large enterprise systems, as packaged software, or through dedicated development. Despite of existing tracks of research on these topics, yet, according to Gartner reports and popular press articles, numerous information systems acquisition projects fail in terms of costs, schedules, and objectives [2]. Moreover, despite two decades on research focusing on benefits realization of IT investments, challenges to adopt the recommended practices and to realize the benefits of information systems have largely remained. It is surprising that despite the problems the practitioners face in information systems acquisition, the topic is still little understood in the IS researcher community. For example, such questions as how to choose an appropriate acquisition strategy and method, how to execute the acquisition project successfully, and how to acquire IS related services have been left largely intact -- even though these are significant issues for practitioners. A recent Delphi study identified benefits realization as the most important issue to be considered by IS procurement professionals in the Norwegian public sector [1]. Public sector procurement is strictly regulated and instructed (e.g., in Europe), so that criteria for selecting the IS need to be known early on in the acquisition process. For instance in Norway, all public ICT acquisitions need to justify rather detailed benefits to the public or to the civil servants proactively, before the acquisition takes place. Although the literature documents several methods and techniques for benefits justification, management and realization, they have not reached wide utilization in practice. The situation is, up to large extent, identical in the private sector as, for instance, business cases are difficult to write and different IS initiations are difficult to compare. This minitrack consists of three different approaches complementary to each other in terms of information systems procurement and benefits realization.

  • 26.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Preface: ECM—Still an Ugly Duckling?2014Övrigt (Övrigt vetenskapligt)
  • 27.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Rad, Parvaneh Afrasiabi
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Concise preservation by combining managed forgetting and contextualization remembering2013Rapport (Övrig (populärvetenskap, debatt, mm))
    Abstract [en]

    This report covers a systematic study of existing research literature on smooth bi-directional preservation transition between producers system (active system) and a Synergetic Preservation system. This transition is meant to be as transparent as possible to the user, and also be able to fetch material from the preservation system in a smooth way. The report also includes a study on gaps that could be identified from existing research and what this integration would need to cover, and how it conceptually could work in Content Management Systems (use case: Typo3) and Personal Information Management (use case: Semantic Desktop / PIMO). The report groups activities into three high-level workflows; Preservation planning and administration, Preservation, and Access and retrieval. In these workflows, the contextual preservation administration, which link the preservation and storage services to particular information systems and maintains the contextualized preservation and access workflows, interfaces and ontologies, is something that needs further development during the project, since it includes many of the project specific peculiarities. This also goes for the other components of the middleware, which also are contextually aware, and part of the "forgetting" approach. Both workshop results and the literature review shows that integration of these workflows with the producing workflows should be done in a way that makes it low-effort, generic, and transparent – which goes well together with what the project set out to do. Most likely some sort of automatic appraisal needs to take place already in the producing systems, and the challenge here would be to make it non-intrusive but effective. The ideas and results from this report will serve as a starting point for design and integration that will take place in WP5 of the ForgetIT project, in particular for T5.2 and T5.3 as well as D5.2. The ideas in this report are however not strict rules to be followed, and may be altered or improved as work continues in above mentioned tasks. Any such actions will be reflected in D5.2 or subsequent reports.

  • 28.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Pekkola, Samuli
    Tampere University of Technology.
    Moe, Carl Erik
    University of Agder.
    Grounding theory from Delphi studies2011Ingår i: International Conference on Information Systems 2011, ICIS 2011, Atlanta: Association for Information Systems, 2011, Vol. 3, s. 2022-2035Konferensbidrag (Refereegranskat)
    Abstract [en]

    The Delphi method is recommended for exploratory research in emerging research areas. Despite earlier suggestions for using the Delphi method for theory creation, few analytical tools are provided for this purpose. However, Grounded Theory is especially devoted to creating theories from qualitative data. This paper describes an enhanced Delphi method which integrates data analysis techniques from Grounded Theory. The resulting Grounded Delphi Method (GDM) improves Delphi studies by bringing in a data collection technique that focuses explicitly on the identification of the reasons and consequences for issues, ranked by experts. Moreover, the techniques of open and axial coding support the discovery of theoretical concepts from the initial Delphi issues. In turn, the ranking process of the Delphi method provides a rigorous means for selecting core categories for theory development, which decreases researcher interference on this issue.

  • 29.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Samuelsson, Göran
    Jonsson, Elin
    Swensson, Ewa
    Nyttorealisering av FGS:er: Delprojekt 22014Rapport (Övrigt vetenskapligt)
  • 30.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Smolander, Kari
    Lappeenranta University of Technology.
    Theorizing about Software Development Practices2015Ingår i: Science of Computer Programming, ISSN 0167-6423, E-ISSN 1872-7964, Vol. 101, s. 124-135Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The paper focuses on the challenge of generating theoretical support for software development, especially when human software developers are involved in the software development process. We outline a model, “Coat Hanger”, for theorizing about development practices. The model focuses on the intended rationale for the actual realization and resulting impacts of using particular practices in varying contexts. To illustrate the use of the model, we have studied recent practice-oriented articles in the journal Science of Computer Programming. A survey of articles in the journal between 2010 and 2013 showed that out of 371 articles, only four studied software development in professional organizations with actual software practitioners as informants. The Coat Hanger model was then used to identify the theoretical strengths and weaknesses of these four practice descriptions. The analysis is used as the basis to declare the potential of our model as a conceptual aid for more structured theorizing about software development practices. The contribution of the model is the introduction of a concretization of how theorizing can be done through reflection-in-action, instead of regarding research on software practices plainly from the prevailing viewpoint of technical rationality.

  • 31.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Luleå tekniska universitet, Institutionen för system- och rymdteknik, Digitala tjänster och system.
    Smolander, Kari
    Lappeenranta – Lahti University of Technology.
    Yli-Huumo, Jesse
    Population Register Centre, Finland.
    Towards Stakeholder Governance on Large E-Government Platforms - A Case of Suomi.fi2019Ingår i: 10th Scandinavian Conference on Information Systems / [ed] Samuli Pekkola, Henri Pirkkalainen, Pasi Hellsten, Ilona Ilvonen, Atlanta, GA, 2019, artikel-id 11Konferensbidrag (Refereegranskat)
    Abstract [en]

    E-government evolves towards large-scale software platforms that integrate access to and information exchange among public services. Governance of large-scale e-government platforms is challenging because of the large number of stakeholders with diverging needs, agendas, and changing service portfolios. This paper presents a revelatory case, the e-government platform Suomi.fi, its stakeholders and stakeholder interactions related to development and governance of the platform. Our stakeholder analysis of Suomi.fi identified 15 stakeholder interaction types and related issues regarded as important for governance of large-scale e-government platforms. The results contribute by addressing the importance of stakeholder identification and continuing governance beyond individual development and implementation projects. Such a large-scale platform involved additional stakeholder types of external influencers (including media, other countries, the European Union, third party software integrators) and other external platforms, compared to the project-centric stakeholder models. Hence, we argue for extended stakeholder governance models and practices for large-scale e-government platforms.

  • 32.
    Päivärinta, Tero
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Westerlund, Parvaneh
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Integrating Contemporary Content Management and Long-Term Digital Preservation: A Design Problem2015Ingår i: Nordic Contributions in IS Research: 6th Scandinavian Conference on Information Systems, SCIS 2015, Oulu, Finland, August 9-12, 2015, Proceedings / [ed] Harri Oinas-Kukkonen; Netta Iivari; Kari Kuutti; Anssi Öörni; Mikko Rajanen, Cham: Springer International Publishing , 2015, s. 92-107Konferensbidrag (Refereegranskat)
    Abstract [en]

    The fields of long-term digital preservation (DP) and enterprise content management (ECM) have remained, until recently, rather separated. Along with increasing amounts of digital content and evolving DP services, there is a need for maximal automation of preservation processes from ECM systems instead of continuing current resource-consuming practices. This paper aims at a design problem definition on the integration of ECM and DP solutions. In order to motivate and to define the problem in more detail, we conducted a review on ECM and DP literatures touching the issue. The review reveals a research gap addressing a need for designing new middleware solutions for interactive processes between ECM and DP. We suggest a general-level model of three such processes between ECM and DP: preservation administration, pre-ingest, and access. The article concludes with avenues for future research on novel solutions for integrating DP with contemporary ECM and other information systems in organizations.

  • 33.
    Rad, Parvaneh Afrasiabi
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Administration of Digital Preservation Services in the Cloud Over Time: Design Issues and Challenges for Organizations2014Ingår i: The Proceedings of the 2nd International Conference on Cloud Security Management / [ed] Barbara Endicott-Popovsky, Reading, UK: Academic Conferences and Publishing International Ltd , 2014Konferensbidrag (Refereegranskat)
    Abstract [en]

    In organizations, information systems produce increasing amounts of digital information that needs to be preserved. Simultaneously, human intervention in preservation activities needs to be minimized, due to scarce resources available for preservation. Thus, digital preservation services need to be integrated with other organizational information systems as seamlessly as possible, and preservation activities need to be maximally automated. Selection of adequate cloud-based preservation services poses yet another set of challenges for reaching the seamless integration and automation. Two sources of challenges relate to administrating integrated digital preservation and information systems. Firstly, information systems change over time. Secondly, digital preservation services change over time. This paper contributes by identifying and analyzing scenarios and design issues of administering digital preservation in connection to the changes in information systems and preservation services over time. We also suggest seven generic tasks of the “preservation administration” component, which are needed between digital preservation services and information systems and discuss about the choices of locating the operative responsibilities and middleware.

  • 34.
    Randers, Frode
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ingemar
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Runardotter, Mari
    Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, Innovation och Design.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    An Activity Theory Lens on Digital Preservation: Challenges of Using Preservation Services2013Konferensbidrag (Refereegranskat)
  • 35.
    Randers, Frode
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ingemar
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Runardotter, Mari
    Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, Innovation och Design.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Inherent problems in cooperative planning for future access to information2013Ingår i: Norsk konferanse for organisasjoners bruk av informasjonsteknologi, NOKOBIT 2013: Universitetet i Stavanger, 18-20 november 2013 / [ed] Terje Fallmyr, Trondheim: Tapir Akademisk Forlag, 2013, Vol. 2013Konferensbidrag (Refereegranskat)
    Abstract [en]

    Successfully preserving information for the future draws upon multiple domains of knowledge, specifically knowledge about effects of technological and social change. The preservation process should accommodate for these effects in order to provide future access to the preserved information. If information production and information preservation occur in different organizations, such as when an organization uses external preservation services, special attention has to be given to the planning of the preservation process. Studies in the project ENSURE (Enabling kNowledge Sustainability Usability and Recovery for Economic value) indicate that the preservation planning is a joint effort drawing upon distinct knowledge that each organization have – knowledge about the information and knowledge about the preservation process. We describe some inherent problems emanating from cooperatively planning how to preserve information.

  • 36.
    Runardotter, Mari
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Gylling, Arne
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, CDT.
    Lindberg, Johanna
    Region Norrbotten.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tingström, Johan
    iTid Tarinfo AB.
    Ylinenpää, Roger
    Luleå kommun.
    Smarta hållbara byar i Övre Norrland: Förstudie – nuläge och framtid2017Rapport (Övrig (populärvetenskap, debatt, mm))
  • 37.
    Runardotter, Mari
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Smarta hållbara byar i Övre Norrland: Användarnas perspektiv2018Rapport (Övrig (populärvetenskap, debatt, mm))
  • 38.
    Ryhänen, Katariina
    et al.
    University of Jyväskylä.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Tyrväinen, Pasi
    University of Jyväskylä.
    Generic Data Models for Semantic e-Government Interoperability: Literature Review2014Ingår i: Electronic Government and Electronic Participation, Amsterdam: IOS Press, 2014, s. 106-118Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    Interoperability of e-government systems is suggested to increase transparency, efficiency, effectiveness, and customer service in the public sector. Generic data models are often seen as a way for achieving especially semantic interoperability. To assess how the contemporary data models support semantic egovernment interoperability, we reviewed literature on data models suggested for the public sector in light of four features: standard modelling language, entityrelationship modelling, vocabulary for data exchange and methodology. The review contributes previous research by introducing a four-feature framework for assessing capability of e-government data models to enhance interoperability and by providing an up-to-date review of the generic data models for this purpose.

  • 39.
    Sein, Maung
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nordheim, Stig
    University of Agder.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Research-in-progress: reframing a knowledge level framework2012Ingår i: SIGMIS-CPR '12: Proceedings of the 50th annual conference on Computers and People Research, New York: Association for Computing Machinery (ACM), 2012, s. 31-34Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we present a research-in-progress study where we are revisiting a well known knowledge-level framework of understanding (i.e. knowledge) of a system proposed by Olfman et al. (2006). The catalyst for this relook was the anomalies and incongruencies that surfaced when we tried to apply this framework in another study whose aim was to examine how hermeneutic reflection helps in learning. While the framework proved a useful vehicle to carry out hermeneutic analysis, it also proved inadequate in accounting for some significant aspects of what constitutes understanding of a system. A closer look at the data revealed that other theoretical premises could not only provide a better interpretation but also that these premises can potentially enhance the knowledge level framework. We are currently reinterpreting the data using three interpretive lenses, namely, practice lens, socio-materiality and genres. Our goal is to reconceptualize what constitutes understanding or knowledge of a system and propose a revised knowledge level framework.

  • 40.
    Smolander, Kari
    et al.
    Lappeenranta University of Technology.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Forming theories of practices for software engineering2013Ingår i: 2nd SEMAT Workshop on a General Theory of Software Engineering (GTSE): proceedings / [ed] Pontus Johnson; Michael Goedicke; Ivar Jacobson; Mira Kajko - Mattsson, Piscataway, NJ: IEEE Communications Society, 2013, s. 27-34Konferensbidrag (Refereegranskat)
    Abstract [en]

    The paper outlines a model for theorizing about development practices, especially taking into account the intended rationale for, actual realization of, and resulting impacts from using particular practices in varying contexts. This includes discussing of two different modes of thinking through which we can approach software development practices: technical rationality vs. reflection-in-action. By framing development practices taking place in software organizations as organizational practices, the paper also sketches previous practice research in organizations, which has profoundly informed this work. Finally, the paper compares the SEMAT approach to the outlined model, and suggests a few points of critique and complementary elements to the SEMAT initiative, especially in its capabilities towards theorizing.

  • 41.
    Virtanen, Pasi
    et al.
    Tampere University of Technology.
    Pekkola, Samuli
    Tampere University of Technology.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Why SPI initiative failed: contextual factors and changing software development environment2013Ingår i: Proceedings of the 46th Annual Hawaii International Conference on System Sciences, IEEE Communications Society, 2013, s. 4606-4615Konferensbidrag (Refereegranskat)
    Abstract [en]

    For today’s software business and its productivity, software process improvement (SPI) plays a significant role. Organizations that produce software face challenges with the productivity and effectiveness of their operation. The literature lists numerous methods to make the operation better. Critical success factors are defined in order to make the successful improvement procedures more certain. However, these methodologies need to be adjusted to match the organizational context. All organizations and their environments aredifferent, and thus the solution that is the most suitable for individual needs must be modified or localized to fit the case-specific contextual demands. This paper studies the importance of these contextual demands in SPI. In the paper, a framework is presented through which the software improvement process can be better understood and studied. The framework offers a view to understanding the change process describing eight change paths that may be observed when software process improvement is regarded.

  • 42.
    Wale-Kolade, Adeola
    et al.
    University of Agder.
    Nielsen, Peter Axel
    Aalborg University.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Integrating Usability Practices into Agile Development: A Case Study2014Ingår i: Information Systems Development: Transforming Organisations and Society through Information Systems (ISD2014 Proceedings) / [ed] V. Strahonja; N. Vrček; D. Plantak Vukovac; C. Barry; M. Lang; Henry Linger; C. Schneider, Varaždin, Croatia: University of Zagreb , 2014, s. 337-347Konferensbidrag (Refereegranskat)
    Abstract [en]

    Within agile software development there is a growing concern with how development organizations can integrate usability work into agile practices. The concern occurs as frustration experienced in practice by agile developers and usability designers, and it also occurs as a gap in the research literature. With this paper we report from a case study in a software company that is committed to agile development, to usability work, and to their integration. The theoretical starting point is an initial framework that has been elicited from the research literature; and the paper’s contribution is an extension and modification of the initial framework based on our case study results. The resulting framework points to three enablers (attitudes, compromises, skills), three tasks (upfront design, low-fi prototyping, iterative evaluating), and three alternative modes of collaboration/work organization (parallel, embedded, fully integrated) in agile usability practices. In addition, end-user involvement may vary. The paper contributes by extending existing frameworks on integration and thus providing better explanations for practitioners and researchers of integration of usability.

  • 43.
    Wale-Kolade, Adeola
    et al.
    University of Agder.
    Nielsen, Peter Axel
    Aalborg University.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Usability work in agile systems development practice: a systematic review2013Ingår i: Building Sustainable Information Systems: Proceedings of the 2012 International Conference on Information Systems Development / [ed] Henry Linger; Julie Fisher; Andrew Barnden; Chris Barry; Michael Lang; Christoph Schneider, New York: Springer Science+Business Media B.V., 2013, s. 569-582Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this chapter we present the results of a systematic literature review of the recommendations in the existing research literature on usability work in agile systems development. The review contributes by summarizing the literature in light of seven claims about how to integrate usability work into an agile development project. By analyzing the claims we show how the previous literature provides grounds, warrants, backing, rebuttal, and qualification with regard to each of them. From this comprehensive overview of the literature we then discuss a research agenda with a particular focus on how situational factors for the claims must be researched and how this must encompass identified rebuttals and qualifications.

  • 44.
    Westerlund, Parvaneh
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ingemar
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Nilsson, Jörgen
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. University of Oulu, Oulu, M3S, Finland.
    Towards automated pre-ingest workflow for bridging information systems and digital preservation services2019Ingår i: Records Management Journal, ISSN 0956-5698, E-ISSN 1758-7689, Vol. 29, nr 3, s. 289-304Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Purpose

    This paper aims to automate pre-ingest workflow for preserving digital content, such as records, through middleware that integrates potentially many information systems with potentially several alternative digital preservation services.

    Design/methodology/approach

    This design research approach resulted in a design for model- and component-based software for such workflow. A proof-of-concept prototype was implemented and demonstrated in context of a European research project, ForgetIT.

    Findings

    The study identifies design issues of automated pre-ingest for digital preservation while using middleware as a design choice for this purpose. The resulting model and solution suggest functionalities and interaction patterns based on open interface protocols between the source systems of digital content, middleware and digital preservation services. The resulting workflow automates the tasks of fetching digital objects from the source system with metadata extraction, preservation preparation and transfer to a selected preservation service. The proof-of-concept verified that the suggested model for pre-ingest workflow and the suggested component architecture was technologically implementable. Future research and development needs to include new solutions to support context-aware preservation management with increased support for configuring submission agreements as a basis for dynamic automation of pre-ingest and more automated error handling.

    Originality/value

    The paper addresses design issues for middleware as a design choice to support automated pre-ingest in digital preservation. The suggested middleware architecture supports many-to-many relationships between the source information systems and digital preservation services through open interface protocols, thus enabling dynamic digital preservation solutions for records management.

  • 45.
    Westerlund, Parvaneh
    et al.
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Andersson, Ingemar
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Towards Automated, Context-Aware Management of Preservation Submissions2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    Research in digital preservation field has realized the need for au-tomation of digital preservation activities. Without automation, the preservation of digital entities will be a complex and labor-intensive task. A middleware con-cept has been introduced by scholars to support automation of interactions be-tween content management systems and digital preservation systems. To boost the automation of workflows in the middleware, we introduce a component within the middleware, namely Context-aware Preservation Manager (CaPM), which is in charge of administration of the inner components of the middleware and the workflows for bi-directional interactions between content management systems and digital preservation systems. We describe the specifications of the Context-aware Preservation Manager and depict its inner components. Further, we explain about the processes that are improved, supported or can run automat-ically as a result of functionalities of Context-aware Preservation Manager.

  • 46.
    Westin, Soffi
    et al.
    University of Agder.
    Holen, Olav Birger
    Private enterprise.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap.
    Data and information quality dimensions in engineering construction projects2012Ingår i: 18th Americas conference on information systems 2012: Seattle, Washington, USA, 9-12 August 2012, Red Hook: Curran Associates, Inc., 2012, Vol. 4, s. 3147-3154Konferensbidrag (Refereegranskat)
    Abstract [en]

    Poor data and information quality (DQ/IQ) causes delays and cost overruns in engineering construction projects. However, only little DQ/IQ research has been performed in this context. This paper explores quality dimensions in the context of engineering construction projects. The most important dimensions identified by Ge, et al., (2011) is used as a basis and compared with dimensions used in 12 large engineering construction projects in one organization. The findings show that six of these dimensions are in use in those projects: accessibility, security, relevancy, completeness, consistency, and timeliness. In addition, the findings indicate another dimension also very important in this context; logical coherence. The logical coherence dimension compares different data values and determines if there is any illogicality between them. Three dimensions are monitored by rules provided by a DQ/IQ tool, and we discuss about the contributions which such a tool can provide for an engineering construction firm.

  • 47.
    Yli-Huumo, Jesse
    et al.
    Department of Computer Science, Aalto University, Helsinki.
    Päivärinta, Tero
    Luleå tekniska universitet, Institutionen för system- och rymdteknik, Datavetenskap. Department Applied Information Technology, University of Gothenburg.
    Rinne, Juho
    Department of Computer Science, Aalto University, Helsinki.
    Smolander, Kari
    Department of Computer Science, Aalto University, Helsinki.
    Suomi.fi: Towards Government 3.0 with a National Service Platform2018Ingår i: Electronic Government: 17th IFIP WG 8.5 International Conference, EGOV 2018, Krems, Austria, September 3-5, 2018, Proceedings / [ed] Peter Parycek, Olivier Glassey, Marijn Janssen, Hans Jochen Scholl, Efthimios Tambouris, Evangelos Kalampokis, Shefali Virkar, Cham: Springer, 2018, s. 3-14Konferensbidrag (Refereegranskat)
    Abstract [en]

    The KaPa (Kansallinen Palveluarkkitehtuuri, in Finnish) program establishes the national e-government service platform in Finland. The platform, Suomi.fi, provides a one-stop portal for citizens and organizations to access both public and related private sector services. This research reports a case study of the platform by analyzing it in light of recent characteristics identified with the emerging concept of Government 3.0: openness and transparency, sharing, increased communication and collaboration, government re-organization through integration and interoperability, and use of new technologies. Our results contribute by concretizing the hitherto abstract and loosely defined concept of Government 3.0 by describing a timely and complex national e-government implementation in detail in light of such characteristics. Our study also suggests three emergent themes in relation to contemporary Government 3.0 characteristics: opening up technologies and solutions in addition to open data, cross-border integration and development, and the enhanced role of the private sector in both development activities and merging into the portfolios of one-stop services.

1 - 47 av 47
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf