Haku
Aineistot 371-380 / 2154
Dissonance and Neutralization of Subscription Streaming Era Digital Music Piracy : An Initial Exploration
(Association for Information Systems, 2016)
Both legal and illegal forms of digital music consumption continue to evolve with wider adoption of
subscription streaming services. With this paper, we aim to extend theory on digital music piracy by
showing that the ...
Good Practices for Ensuring Access and Equity in Higher Education
(Università degli Studi di Bergamo, 2017)
Анализ и оптимизация устойчивости балок на сплошном упругом основании часть I (балки конечной длины) [Analysis and optimization of a beam on elastic foundation. Part I (Limited beams)]
(Institut problem mehaniki RAN, 2017)
Problems of defining the optimal (against buckling) cross section area
distribution for beams interacting with elastic foundation are considered. The
stability of limited pinned beams and infinite continuous beams is ...
High-quality discretizations for microwave simulations
(IEEE, 2016)
We apply high-quality discretizations to simulate
electromagnetic microwaves. Instead of the vector field presentations,
we focus on differential forms and discretize the model
in the spatial domain using the discrete ...
Explaining Information Technology Users' Ways of Mitigating Technostress
(European Conference on Information Systems, 2017)
Technostress refers to the inability of an individual to deal with information technology (IT) in a
healthy manner. Researchers, practitioners, and medical professionals have emphasized the omnipresence
of technostress ...
Learning Experience Technology Usability Design framework
(Association for the Advancement of Computing in Education (AACE), 2018)
Using information and communication technology (ICT) for learning purposes has
become more ingrained in curriculums and students’ lives over the past decades. Commonly, the
lack of understanding about learning and pedagogy, ...
Dual-process Accounts of Reasoning in User's Information System Risky Behavior
(Dalian University of Technology, 2016)
End user of information system (IS) is the weakest point in terms of IS security. A variety of
approaches are developed to convince end users to avoid IS risky behaviors. However, they do
not always work. We would like ...
Probabilistic foundations of contextuality
(Wiley - VCH Verlag GmbH & Co. KGaA, 2017)
Contextuality is usually defined as absence of a joint distribution for a set of measurements
(random variables) with known joint distributions of some of its subsets. However, if these subsets
of measurements are not ...
Examining the Competencies of the Chief Digital Officer
(Association for Information Systems, 2018)
Technology Architecture as a Driver for Business Cooperation : Case Study - Public Sector Cooperation in Finland
(SCITEPRESS Science And Technology Publications, 2019)
The current premise in the enterprise architecture (EA) literature is that business architecture defines all other EA architecture layers; information architecture, information systems architecture, and technology architecture. ...