• 3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization 

      Liu, Zhaoni; Wang, Xianmin; Chen, Zhikun; Zhao, Ming; Zhang, Sihai; Li, Jingyue (Chapter, 2021)
      Recently, 3D indoor positioning technology has attracted wide attention in smart medical treatment, intelligent robot and other application fields. Traditional 3D positioning technology requires to utilize the special-dedicated ...
    • A Case Study of an Information Infrastructure Supporting Knowledge Work in Oil and Gas Exploration 

      Mikalsen, Marius (Chapter; Peer reviewed, 2014)
      It is well rehearsed in the fields of CSCW and IS that the relationship between the social and the material is bi-directional and shaped locally. But what happens when knowledge work is stretched across space and time, and ...
    • A Data-Driven Security Game to Facilitate Information Security Education 

      Løvgren, Dag Erik Homdrum; Li, Jingyue; Oyetoyan, Tosin Daniel (Chapter, 2019)
      Many universities have started to educate students on how to develop secure software and systems. One challenge of teaching information security is that the curriculum can easily be outdated, because new attacks and ...
    • A hierarchical view on Evolution-In-Materio computations 

      Laketic, Dragana; Tufte, Gunnar (Chapter, 2016)
      Evolution-In-Materio, an unconventional computing paradigm exploiting physical properties of materials for achieving computations, is addressed here as a system which exhibits dynamical hierarchies. A description of ...
    • A Netnographic Study on the Dark Net Ecosystem for Ransomware 

      Bayoumy, Yara; Meland, Per Håkon; Sindre, Guttorm (Chapter, 2018)
      For more than a decade, businesses and private citizens alike have been tormented by an online phenomenon that has changed our stance on cyber security. Ransomware, malicious software that demands payment in exchange for ...
    • A new malware detection system using a high performance-ELM method 

      Shamshirband, Shahab; Chronopoulos, Anthony T. (Chapter, 2019)
      A vital element of a cyberspace infrastructure is cybersecurity. Many protocols proposed for security issues, which leads to anomalies that affect the related infrastructure of cyberspace. Machine learning (ML) methods ...
    • A Platform Agnostic Dual-Strand Hate Speech Detector 

      Meyer, Johannes Skjeggestad; Gambäck, Björn (Chapter, 2019)
      Hate speech detectors must be applicable across a multitude of services and platforms, and there is hence a need for detection approaches that do not depend on any information specific to a given platform. For instance, ...
    • A Smart City Ecosystem Enabling Open Innovation 

      Ahlers, Dirk; Wienhofen, Leendert Wilhelmus Marinus; Petersen, Sobah Abbas; Anvaari, Mohsen (Chapter, 2019)
      In this position paper we present IT-centered challenges that lie in designing an architecture for a flexible, open, transferable, and replicable smart city ecosystem spanning a plethora of suppliers and systems. The ...
    • A Stage Model for Uncovering Inertia in Big Data Analytics Adoption 

      Mikalef, Patrick; Krogstie, John; van de wetering, Rogier; Pappas, Ilias (Chapter, 2018)
      Big data and analytics have been credited with being a revolution that will radically transform the way firms do business. Nevertheless, the process of adopting and diffusing big data analytics, as well as actions taken ...
    • A strategic alignment model for IT flexibility and dynamic capabilities: Towards an assessment tool 

      van de Wetering, Rogier; Mikalef, Patrick; Pateli, Adamantia (Chapter, 2017)
      The Dynamic Capabilities View (DCV) has emerged as an influential theoretical and management framework in modern IS research. However, despite the view's significant contributions, its strength and core focus are essentially ...
    • A Systematic Approach to Automated Construction of Power Emulation Models 

      Bjørnseth, Benjamin Andreassen; Djupdal, Asbjørn; Natvig, Lasse (Chapter, 2016)
      Efficient estimation of power consumption is vital when designing large digital systems. The technique called power emulation can speed up estimation by implementing power models alongside a design on an FPGA. Current ...
    • A Tensor Model for Quality Analysis in Industrial Drinking Water Supply System 

      Wu, Di; Wang, Hao; Seidu, Razak (Chapter, 2019)
      Drinking Water Supply (DWS) is one of the most critical and sensitive systems to maintain city operations globally. In Europe, the contradiction between the fast growth of population and obsolete urban water supply ...
    • A Zero Emission Neighbourhoods Data Management Architecture for Smart City Scenarios: Discussions toward 6Vs challenges 

      Sinaeepourfard, Amir; Krogstie, John; Abbas Petersen, Sobah; Gustavsen, Arild (Chapter, 2018)
      A huge volume of data are being generated from multiple sources, including smart cities, the IoT devices, scientific modeling, or different big data simulations; but also from users’ daily activities. These daily new data ...
    • Achieving "Good Enough" Software Security: The Role of Objectivity 

      Tøndel, Inger Anne; Cruzes, Daniela Soares; Jaatun, Martin Gilje (Chapter, 2020)
      Today's software development projects need to consider security as one of the qualities the software should possess. However, overspending on security will imply that the software will become more expensive and often also ...
    • Activity-Based Course Design and the Role of Learning Assistants 

      Bolstad, Torstein; Carvajal, Paulina; Hardeberg Zimmermann, Pauline; Lundheim, Lars Magne; Wallin, Patric (Chapter, 2021)
    • Additive manufacturing of multilayered polymer composites: Durability assessment 

      Payami Golhin, Ali; Srivastava, Chaman; Tingstad, Jens Fossan; Sole, Aditya Suneel; Strandlie, Are; Grammatikos, Sotirios (Chapter, 2022)
      This study examines the impact of additive manufacturing (AM) settings on the durability of 3D-printed polymer composite objects in terms of object color appearance and corresponding mechanical properties when subjected ...
    • Adult Perception of Gender-Based Toys and Their Influence on Girls’ Careers in STEM 

      Lee-Cultura, Serena; Mangaroska, Katerina; Sharma, Kshitij (Chapter, 2018)
      STEM and Computer Science (CS) in general, are perceived as masculine disciplines; a dangerous fallacy that discourages girls to show interest in the domain. However, companies are moving towards designing toys to attract ...
    • Advantages and opportunities of the IOTA Tangle for Health Data Management: A Systematic Mapping Study 

      Rydningen, Eivind; Åsberg, Erika; Jaccheri, Maria Letizia; Li, Jingyue (Chapter, 2022)
      The merging of Distributed Ledger Technology (DLT) and the Internet of Things (IoT) has opened new opportunities for innovation in health data management. Issues such as security breaches, privacy violations and fragmented ...
    • Affinity for Technology and Teenagers' Learning Intentions 

      Jin, Fufen; Divitini, Monica (Chapter, 2020)
      A rising number of activities are aiming at promoting interest and learning of Computer Science among teenagers. The focus of these activities is often not only on learning but also on promoting engagement and interest. ...
    • Agile Enterprise Architecture by Leveraging Use Cases 

      Guo, Hong; Li, Jingyue; Gao, Shang; Smite, Darja (Chapter, 2021)
      Despite benefits Enterprise Architecture (EA) has brought, EA has also been challenged due to its complexity, heavy workload demands, and poor user acceptance. Researchers and practitioners proposed to use EA in an agile ...