Endre søk
Begrens søket
12 51 - 63 of 63
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 51. Ramberg, R.
    et al.
    Artman, Henrik
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Sundholm, H.
    Ceratto-Pargman, T.
    Creative Collaboration with Representations: A case study of Interaction Design in an Interactive Space2004Inngår i: Proceedings of SIG-Computer Supported Cooperative Learning (SIG-CSCL), 2004Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper focuses on the concepts of creativity and representations produced in the context of collaborative design. More specifically, on the interplay between collaborative creation of sketches (design proposals), and argumentation and negotiation processes taking place in the design activity. The question raised in this paper is how sketches produced during a design session reflect and mediate dialogues and argumentation in the design activity and how the sketches feed into new ones. We are also interested in finding out how the characteristics presented by the artefacts in use permit coming to creative interactions. The concepts of "action context"- and "target context representations" are introduced and used to illustrate shifts of focus during a design session. We have studied a group of students working on a design task in an interactive space for two weeks. The purpose of the study was to investigate how an environment meant to support collaborative work and learning support collaborative and creative learning of interaction design. The results obtained indicate that students attending a course on interaction design often ignored, forgot or at least did not pay enough attention to target representations. Furthermore the results suggest that "action context representations" to a large extent occupy student activities as a result of either complex technology or as a result of the students thrust to do something instrumental. We suggest that technological support for collaborative learning of design should have some kind of reminder of the mapping, or interplay, of design proposals and the target context representation.

  • 52.
    Ramberg, Robert
    et al.
    Stockholms universitet .
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Karlgren, Klas
    KI.
    Designing Learning Opportunities in Interaction Design: Interactionaries as a means to study and teach student design processes2013Inngår i: Designs for Learning, ISSN 1654-7608, Vol. 6, nr 1-2, s. 30-56Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Learning by practice, apprenticeship and paradigmatic examples have been prime paths for learning within interaction design. These have been criticized for being time-consuming and costly, not being implementable in academic contexts. In this article we suggest and evaluate a pedagogical model to address these problems in design teaching and learning. Results from a time-constrained collaborative design exercise, a so-called “interactionary”, are presented. Student design work is analyzed using the framework of learning design sequences. Analysis of the primary transformation unit shows that interactionaries reveal patterns in student design work. Materials are used mainly to document design ideas rather than as a design material to further investigate design ideas and aspects of interaction. In the critiquing sessions, regarded as the secondary transformation unit, many issues hardly addressed during the design work were brought up. Thus, the designers continued to develop their design proposal primed by critique presented by the reviewers.

  • 53.
    Sundholm, Hillevi
    et al.
    SU, DSV.
    Artman, Henrik
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Ramberg, Robert
    SU, DSV.
    Backdoor Creativity: Technological support and Collaborative Creativity2004Inngår i: Proceedings of Conference on the Design of Cooperative Systems (COOP 2004) / [ed] F.Darses, Zarate, P., Zackland, M., 2004Konferansepaper (Fagfellevurdert)
  • 54.
    Sundholm, Hillevi
    et al.
    KTH, Tidigare Institutioner, Data- och systemvetenskap, DSV.
    Ramberg, Robert
    KTH, Tidigare Institutioner, Data- och systemvetenskap, DSV.
    Artman, Henrik
    KTH, Tidigare Institutioner, Numerisk analys och datalogi, NADA.
    Learning Conceptual Design: Collaborative Activities with Electronic Whiteboards2004Inngår i: CADE2004 Web Proceedings of Computers in Art and Design Education Conference / [ed] M. Agger Eriksen., L. Malmborg, J. Nielsen, 2004Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This case study reports on collaborative design of an interactive artifact. The team works in the iLounge, which is designed and built with the purpose of supporting co-located collaborative work. iLounge is equipped with several horizontal large screens, called Smart boards, where the team members can make their contributions available to all others. We have studied how the students learn to use the electronic whiteboards in order to express their ideas, how the electronic whiteboards support them when making their conceptual design, and how they express themselves when using them. The results presents how whiteboards serve as a collective memory of earlier discussions and negotiations, it also gives the users opportunities for re-negotiation and re-representation of design proposals.

  • 55.
    Swartling, Anna
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Människa-datorinteraktion, MDI.
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Människa-datorinteraktion, MDI.
    Dovhammar, Ulrika
    KTH, Skolan för datavetenskap och kommunikation (CSC), Människa-datorinteraktion, MDI.
    A Game of Usability: Visualising responsibility for Usability Through a Football Metaphor2009Inngår i: Acquisition of Usable IT-systems: Acquisition projects to reflect on / [ed] Artman, H., Lindquist, S, 2009, s. 21-39Kapittel i bok, del av antologi (Fagfellevurdert)
    Abstract [en]

    Systems development is such a complex and dynamic process that those involved in it can neglect or even ignore the issue of the system’s usability. Like most complex processes, systems development requires several actors to collaborate and coordinate several more or less dependent activities. Most models of systems development do not capture the dynamics of complex systems development; in particular, they often ignore the complexity of inter-organizational negotiations and responsibilities. Given these problems, we suggest that metaphors present an alternative approach for analyzing these processes. In this paper we use the metaphor of a football game to visualize how usability is handled and understood by a large Swedish governmental organization that specializes in complex systems procurement. Our point of departure was 25 interviews with several stakeholders, both outside and inside the organization. In our first analysis, we saw actors in the procurement process pass usability issues on to each other. This led us to conduct a metaphorical analysis, which makes it possible to see things from a new perspective. The football metaphor highlights how actors in two organizations—the procurer and the developer—cooperate as well as compete. In addition to analyzing structural aspects, such as rules and tactics, 22 that govern the systems development process, we assign and discuss relevant roles to correspond with those in a football game. The approach illustrates how usability is systematically neglected.

  • 56.
    Swartling, Anna
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Dovhammar, Ulrika
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Numerisk Analys och Datalogi, NADA.
    Arvola, Mattias
    Dept. of Computer and Information Science, LiU.
    Förstudie om FMVs roll i Försvarets beställningsprocess2005Rapport (Fagfellevurdert)
  • 57.
    Tariq, Muhammad Adnan
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Brynielsson, Joel
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Framing the attacker in organized cybercrime2012Inngår i: Proceedings - 2012 European Intelligence and Security Informatics Conference, EISIC 2012, IEEE conference proceedings, 2012, s. 30-37Konferansepaper (Fagfellevurdert)
    Abstract [en]

    When large values are at stake, the attacker and the attacker's motives cannot be easily modeled, since both the organization at stake and the possible attackers are unique and have complex motives. Hence, rather than using stereotypical attacker models, recent work proposes realistic profiling of the opponent by the use of user-centered design principles in form of the persona methodology. Today, cyber crime is often organized, i.e., attacks are planned and executed by an organization that has put together a tailor made team consisting of the necessary skills for the task. The actual individuals taking part in the attack might not be aware of or interested in the overall organizational motives. Rather, taking motives behind espionage, fraud, etc., into account requires consideration of the attacking organization rather than the individuals. In this paper, based on interviews with IT security experts, we build on the attacker persona methodology and extend it with methodology to also handle organizational motives in order to tackle organized cyber crime. The resulting framework presented in the paper extends the attacker persona methodology by also using narratives in order to assess the own organization's security. These narratives give rise to intrigue sketches involving any number of attacker personas which, hence, make it possible to take organized cyber crime into account.

  • 58.
    Tariq, Muhammad Adnan
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Brynielsson, Joel
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Storytelling for Tackling Organized Cybercrime2012Inngår i: Proceedings of the 26th BCS Conference on Human Computer Interaction, BISL , 2012, s. 1-4Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Cybercrime is often organized, and the actual individuals that are perpetrating the different parts of the attack might not be aware of or interested in the overall organizational motives behind the attack. In this paper, based on interviews with IT security experts, we build on the attacker persona methodology and extend it with methodology to also handle organizational attacking motives in order to tackle organized cybercrime. The resulting framework extends the attacker persona methodology by also using narratives in order to assess the own organization’s security. These narratives give rise to intrigue sketches involving any number of attacker personas which, hence, make it possible to take organized cybercrime into account.

  • 59.
    Tariq, Muhammad Adnan
    et al.
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Brynielsson, Joel
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    The Security Awareness Paradox: A Case Study2014Inngår i: Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on, IEEE conference proceedings, 2014, s. 704-711Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Knowledge-intensive organizations are characterized by their dependency on highly skilled personnel who perform their daily work in a decentralized manner. In these organizations it is the users who make the important decisions, and therefore the organization’s information security awareness is upheld by and depends on its users’ combined security awareness. To assess the overall organizational security awareness it therefore becomes interesting to assess both the users’ individual level of securityawareness, as well as their level of consistency and conformity with regard to other users’ awareness. In the present case study, 15 semi-structured interviews have been undertaken within a large telecommunication companyin order to understand how significant IT security aspectsare understood within the organization. The study highlights a number of perception differences where the technical IT staff and the ordinary users do not share the same understanding. It is suggested that these perception differences result from a paradoxical situation where the users’ possibility to uphold security awareness is hindered because of security concerns.

  • 60.
    Tariq, Muhammad Adnan
    et al.
    KTH.
    Brynielsson, Joel
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Teoretisk datalogi, TCS.
    Artman, Henrik
    KTH, Skolan för elektroteknik och datavetenskap (EECS), Medieteknik och interaktionsdesign, MID.
    The Security Awareness Paradox: A Case Study2014Inngår i: 2014 PROCEEDINGS OF THE IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM 2014) / [ed] Wu, X Ester, M Xu, G, IEEE , 2014, s. 704-711Konferansepaper (Fagfellevurdert)
    Abstract [en]

    Knowledge-intensive organizations are characterized by their dependency on highly skilled personnel who perform their daily work in a decentralized manner. In these organizations it is the users who make the important decisions, and therefore the organization's information security awareness is upheld by and depends on its users' combined security awareness. To assess the overall organizational security awareness it therefore becomes interesting to assess both the users' individual level of security awareness, as well as their level of consistency and conformity with regard to other users' awareness. In the present case study, 15 semi-structured interviews have been undertaken within a large telecommunication company in order to understand how significant IT security aspects are understood within the organization. The study highlights a number of perception differences where the technical IT staff and the ordinary users do not share the same understanding. It is suggested that these perception differences result from a paradoxical situation where the users' possibility to uphold security awareness is hindered because of security concerns.

  • 61. Trnka, Jiri
    et al.
    Persson, Mats
    Hörling, Pontus
    Nilsson, Susanna
    Artman, Henrik
    KTH, Skolan för datavetenskap och kommunikation (CSC), Medieteknik och interaktionsdesign, MID.
    Framtida Ledningscentraler: Slutrapport2011Rapport (Annet vitenskapelig)
    Abstract [sv]

    Denna rapport redovisar projektet "FM framtida ledningscentraler". Syftet med rapporten är att skapa ett underlag för att stödja utformning av FM ledningscentraler genom att kartlägga aktuell forskning och sammanställa erfarenheter inom området ledningscentraler samt att ta fram de faktorer som kan påverka utformning av ledningscentraler på medellång till lång sikt. Resultatet från arbetet baseras på en övergripande analytisk strategi, bestående av litteraturstudie, kartläggning av militära FoU-projekt, workshop med inriktning på ledningscentraler i Sverige, analys av utvalda ledningscentraler i Sverige och utomlands samt intervjuer med fokus på FM ledningscentraler. Denna rapport omfattar inte ledningsmetodik, annat än i den omfattningen att det direkt påverkar utformning av ledningscentraler. De identifierade påverkansfaktorerna beskrivs och diskuteras inom fyra temaområden: utformning av flerrumslösningar, arbetsmiljö och ergonomi, tekniska hjälpmedel och förändringshantering. Utifrån resultatet görs en reflektion kring den genomförda analysen och de identifierade påverkansfaktorerna som skapar en grund för FM att ta fram beslutsunderlag för att utforma framtida FM ledningscentraler.

  • 62.
    Trnka, Jiri
    et al.
    Totalförsvarets forskningsinstitut (FOI).
    Persson, Mats
    National Defence Collage.
    Hörling, Pontus
    Totalförsvarets forskningsinstitut (FOI).
    Nählinder, Staffan
    Totalförsvarets forskningsinstitut (FOI).
    Artman, Henrik
    Totalförsvarets forskningsinstitut (FOI).
    Framtida ledningscentraler: delrapport 1, omvärldsanalys2011Rapport (Annet vitenskapelig)
    Abstract [sv]

    Denna rapport är en omvärldsanalys av forskning kring ledningscentraler. Syftetmed rapporten är att kartlägga och analysera vetenskapliga bidrag inom områdetpublicerade under åren 2005-2011. Rapporten sammanställer information om deviktigaste tidskriftsartiklarna inom området som fokuserar på ledningscentraler istort; såväl militära ledningscentraler, krishantering, trafikledning för flyg ochjärnväg, samt processkontroll (såsom kärnkraftverk). Rapporten beaktar ävenartiklar inom de olika forskningsområden som är särskilt centrala förledningscentraler, exempelvis situationsmedvetenhet, teamarbete, distribueratbeslutsfattande, datorstött arbete, informationsfusion och ledningsstödsystem.Rapporten sammanfattar den allmänna utvecklingen inom området, samtidentifierar aktuella trender inom forskningen. Rapporten innehåller även ensammanställning av sammanfattningar (abstracts) av de refereradetidskriftsartiklarna.

  • 63.
    Waern, Yvonne
    et al.
    Dpt of Communication Studies, LiU.
    Garbis, Christer
    Dpt of Communication Studies, LiU.
    Artman, Henrik
    Division of Operational Studies, National Defence College.
    Co-ordination for distributed cognition in control rooms1999Inngår i: Proceedings of the European Conference on Cognitve Science - ECCS '99 / [ed] S. Bagnara, 1999, s. 31-36Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This paper deals with how control rooms are organised and how practices are implemented in order to manage a dynamic environment or an anomaly within a scheduled dynamic environment. Specifically, we will here consider how people co-ordinate their perceptions of a dynamic situation in order to manage it efficiently. We draw conclusions from three field studies conducted in the domains of emergency and rescue management as well as underground-line control. We consider the control room as the main cognitive unit, within which the cognitive powers are distributed. We specifically discuss a model to explicate the propagation and transformations of information within the control rooms. In particular, we propose that during a mission, a transition from an individual to a shared understanding of the situation takes place, within a shared understanding of co-ordination.

12 51 - 63 of 63
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf