Synopsis: Ict: Computing:


The Impact of Innovation and Social Interactions on Product Usage - Paulo Albuquerque & Yulia Nevskaya.pdf.txt

The estimation algorithm and a discussion about identification are presented in Section 4. The results and managerial implications are described in Section 5,

for the estimation algorithm 10 Finally, we assume that"ijt are unobserved shocks that are independently and identically dis

Therefore, Equation 12 is a dynamic programming problem for consumer i. Let V ï ï

Before we describe the estimation algorithm, we discuss the data patterns that identify the pa

4. 2 Estimation Algorithm The structure of the consumer choice process within one time period involves making two consecutive

We employ the iterative Expectation-Maximization (EM) algorithm procedure (Arcidiacono and Jones, 2003; Chung et al.

We combine the EM algorithm with the use of the constrained optimization approach (Su and Judd, 2012;

programming problem. Here, instead of using the nested fixed point algorithm (NFXP) on the Bell -man equation to solve for the value function,

we maximize the log-likelihood of the model subject to the constraint defined by the Bellman equation.

The estimation algorithm proceeds as follows Step 1. Make an initial guess for the probability that each individual

and the EM Algorithm, †Econometrica, Econometric Society, Vol. 71 (3), pp. 933-946 4. Arndt, Johan (1967), â€oerole of Product-Related Conversations in the Diï €usion of a New Prod


The Impact of Innovation in Romanian Small and Medium-Sized Enterprises on Economic Growth Development - Oncoiu.pdf.txt

Journal of Knowledge management, Economics and Information technology 409 Special Issue December 2013 The Impact of Innovation in Romanian

substance of this upgrade though is situated in a great range of differences from country to country or integration groups, however, has


The Relationship between innovation, knowledge, performance in family and non-family firms_ an analysis of SMEs.pdf.txt

Journal of Management Information systems, 18, 185†214 Grant, RM. 1996). ) Toward a knowledge-based theory of the firm.

) Information technology and the U s. economy. The American Economic Review, 91 (1), 1†32 Katz, N,


The Role of Government Institutions for Smart Specialisation and Regional Development - Report.pdf.txt

support, and more financial resources will be made available over the 2014-2020 programming period However, despite this considerable financial effort, the returns to research and innovation policy in the


The Role of Universities in Smart Specialisation Strategies - EUA-REGIO Report.pdf.txt

4) Have local universities been involved in planning for the future programming period of EU Structural

operating across European countries in previous programming periods of the Structural Funds. There are examples of good practice in the effective use of intermediaries,

the development of advanced services to enterprises, especially SMES, for example, intensive computing facilities, experimental platforms (e g. agro-materials platform, chemical and physical analysis services

CALMIP, which were aimed at implementing new facilities concerning intensive computing with SMES in the region.

Computation Centre involving all universities in the region) but the targeted level of involvement of SMES

and research in computer science and information and communication technologies, and including dedicated incubation space. Project financed at

contribution to the programming and implementation of the EU funds, and that the use of the funds tends

this current programming period. Within the 2007-2013 Structural Funds programme, ESF was managed by the Department for Work and Pensions.


The Young Foundation-for-the-Bureau-of-European-Policy-Advisors-March-2010.pdf.txt

software programming •†Push†in the form of effective supply, which comes from: first, the

lxxviii http://www. leros. gr/en/index. php? categoryid=36 lxxixkiva at http://www. kiva. org

http://www. democracyjournal. org/article. php? ID=6570 cxi Ibid cxii Mccardle, Hamish, †The case of the sneaky wiki†2008, not published

http://phi. uhce. ox. ac. uk/pubs. php clxiv Dolan and Metcalfe. 2008) The impact of subjective wellbeing on local authority interventions

Information technologies and web 2. 0 tools are transforming how people interact, notwithstanding the necessity of physical space and meetings for the exchange of


The_Basque_Country_ Smart Specialisation.pdf.txt

GAIA-Association of Industries for Electronic and Information technologies in the Basque Country UNIPORT-Port of Bilbao Cluster


the_open_book_of_social_innovationNESTA.pdf.txt

Much of this economy is formed around distributed systems, rather than centralised structures. It handles complexity not by standardisation and

information systems 171) Outcomes based commissioning is where a commissioning body agrees to fund a provider on the basis that they will achieve particular

a new information technology system and is paid then from the savings 5 92 THE OPEN BOOK OF SOCIAL INNOVATION

to the nature of technology and the design of distributed systems which provide spaces for people to contribute to projects directly,

267) Information systems that reinforce systemic change. For example, ways of measuring emissions in real time, or that make costs

towards customer-driven management information systems that has transformed industrial and service processes in the market sector,

through conscious and careful curating and programming. These layers form the basis for innovation †the serendipity that happens when you

Distributed systems 5; 38; 71; 87; 98 110; 114; 139; 195 Accountability 152-155 Organisation 69;

Information systems 20-22; 89; 119-120 Infrastructure 114-115 Innocentive 134 Innovation Innovation Challenge Prize 54


Towards Sustainable Framework in Digital-Social Innovation - Maria Angela Ferrario.pdf.txt

Lancaster University, School of Computing and Communications, Lancaster, UK 2 University of Szeged, Faculty of Economic Research Centre, Szeged, Hungary

. & Whittle, J. 2014) Software engineering for'social good 'integrating action research, participatory design, and agile development.

International Conference on Software engineering (pp. 520-523. ACM 8. Galimberti, U. 2000) I miti del nostro tempo, Feltrinelli Editore


TOWARDS TOWARDS A NETWORK NETWORK OF DIGITAL BUSINESS ECOSYSTEMS_2002.pdf.txt

new ecology of information technology Organisations build faster and more effective strategic partnerships and alliances, re

can be guaranteed due to the availability of the source code The components the basic infrastructure The basic infrastructure of the common ecosystem environment is composed by the


Triple_Helix_Systems.pdf.txt

context for the development of the Google search algorithm that soon became the basis of a firm formation

http://www. wbdg. org/resources/chngorgwork. php Hekkert, M.,Suurs, R. A a.,Negro, S.,Kuhlmann, S.,Smits, R.,2008.


Vincenzo Morabito (auth.)-Trends and Challenges in Digital Business Innovation-Springer International Publishing (2014) (1).pdf.txt

and computer science and identifying the most cutting edge phenomena is an arduous task. I congratulate Vincenzo for this book and look

such as, for example, the different perspectives of Information systems research from management to computer science and engineering, among others

Furthermore, it is yet difficult to find such kind of unified survey acting as an instrument for providing practitioners a perspective on academic research, suitable

respective areas (management, engineering, and computer science. However these publications are going to be a part of the large set of information and body

Information systems Quarterly (MISQ), Communications of the Association for Information systems, Management of Information systems Quarterly Executive MISQE), Information systems Research, European Journal of Information

vii Systems, Journal of Information technology, Information systems Journal, and conferences such as International Conferences of Information systems (ICIS

European Conferences of Information systems (ECIS), America†s Conferences of Information systems (AMCIS)( just to mention some of the Management of

Information systems research sources), that this book aims to consider for identifying the challenges, ideas, and trends, that may represent ††food for

thoughts††to practitioners Notwithstanding the book adopts an academic approach as for sources collection

and analysis, it is also concrete, describing problems from the viewpoints of managers, further adopting a clear and easy-to-understand language, in order to

capture the interests of top managers as well as graduates students Taking these issues into account, this book is distinctive for its intention to

synthesize, compare, and comment major challenges and approaches to business digital transformation of organization, being a simple yet ready to consult

Organization and Information systems at Bocconi University, who have created a rich and rigorous research environment where I am proud to work

for New Computing Approach Adoption...97 5. 3. 4 Step 4: Support Employee Owned Devices...

IT Information technology ITIL Information technology Infrastructure Library KPIS Key Performance Indicators Nosql Not only SQL R&d Research and development

SMES Small and medium enterprises TOGAF The Open Group Architecture Framework VOIP Voice over internet Protocol xxi

Part I Digital Systems Trends Chapter 1 Big data Abstract The role of this Chapter is to introduce the reader to the area of Big

processed by an information system, in order to be meaningful and useful for an agent (being human or else a machine.

information systems, being processed the data, organized, structured, and presented. Thus adopting the General Definition of Information (GDI) we could define information

It is worth noting that computer based information systems are a specific type of information system and not exhaustive 36.

For a systematic survey on the different definitions, meanings and use of information we kindly refers the reader to 35,37

structured data traditionally managed by information systems in organizations most of the new breed encompasses semi structured and even unstructured data

SQL) 3 data storage systems have been emerging, usually not requiring fixed table schemas and not fully complying nor satisfying the traditional ACID (Atomicity

Among the programming para -digms for processing, generating, and analyzing large data sets, Mapreduce4 and

the open source computing framework Hadoop have received a growing interest and adoption in both industry and academia. 5

another brick in the wall in the long discussion in the information systems field on information supply to decision makers and operations in enterprise.

satisfying it, integrating programming, mathematical, statistical skills along with business acumen, creativity in interpreting data and effective communication of

, information systems and computer science, among other fields, contributions to Big data research. In Table 1. 1 we classify these per

Thus, this may be seen as a management of information systems perspective governing the overall lifecycle from Big data storage to use.

or information system oriented), and the manage -ment challenges they have to provide answers and solutions.

information systems and information quality have identified a set of enabling and inhibiting factors for effective data governance.

recognized in theory and practice as a good management of information systems target, on the other hand, they look as by far challenging, due to the distributed

in managing the information systems (IS. As for decisions, integration orientation seems to be required for satisfying the needs for optimization and effective data

information system, the faster the overall planning and control cycles 29 Applying to Big data issues the SIGMA model,

information systems (AMCIS 2012 8. Mcafee A, Brynjolfsson E (2012) Big data: the management revolution. Harv Bus Rev

Avison DE, Fitzgerald G (1999) Information systems development. In: Currie WL, Galliers RD (eds) Rethinking management information systems:

an interdisciplinary perspective Oxford university Press, Oxford, pp 250†278 37. Floridi L (2011) Semantic conceptions of information.

international conference on pervasive computing and applications, pp 363†366 40. Strauch C (2010) Nosql databases.

Grid computing can be explained as the allocation of several computer systems in a parallel structure to solve one problem 1. Cloud computing is

development in the computing models that performs computing functions on multilevel virtualization and abstraction by integrating many IT resources.

computing capabilities, such as server using time and data storage, automati -cally and without human interaction 2. Broad network access,

-tional information systems implementations 2. 1. 1 Cloud computing: Service Models Dhar 4 defines cloud computing as the structure that provides the ability to the

computation, connectivity and emails access The last layer is the Infrastructure as a service (Iaas), in which the client will

The second component which is SQL Azure provides data services in the cloud using SQL SERVER.

---Software Framework (Java, Python. NET Storage (DB/File Infrastructure ---Computation (VM) Storage (Block Hardware ---CPU, Memory, Disk, Bandwidth

Resources Managed at Each Layer Software as a service Saas Platform as a service Paas Infrastructure as a service Iaas Examples Google Apps, Facebook

data management and programming models respectively 5 2. 2 Strategic and Managerial Challenges and Opportunities

2. Virtual machine migration. Virtualization can be important for cloud com -puting by enabling virtual machine migration to balance the load throughout the

data center. Virtual machine (VM) migration enables robust and highly responsive provisioning in data centers. As a result, it can be concluded that the

major benefit of VM migration is to avoid hotspots; however, this is not straightforward. Currently, detecting workload hotspots and initiating a

application programming interface 2. 2. 2 Advantages and Risks in Cloud computing Outsourcing Projects Cloud computing is like any other new development in IT,

computing service provider for the implementing company. Those benefits are presented and explained in the following section

computing transformation would enhance the organizational sustainability Moreover, another study by Gai and Li 10 added more advantages that can be

called Virtual machine Monitor (VMM. It is a platform that allows multiple OS and related applications (called Virtual machines VMS) to run on a cloud machine

concurrently to facilitate sharing of cloud resources. Virtualization of enterprise servers introduces considerable security concerns.

The Applications Programming interface (APIS) are the software interfaces that document how to communicate with the concerned software.

computing service model •logical segregation of customer data •accessibility and auditability of the customer and CSP

Logic, which is an approach for computing that is based on degrees of truth rather than the usual true or false symbolized by (1)

President of Information technology suggested using cloud computing to move the company†s Business Information systems (BIS), which includes Executive

Information system (EIS), a Management Information system (MIS), a Decision Support system (DSS), an Accounting Information system (AIS), a Transaction

Processing System (TPS), and a Supply Chain Management (SCM) system, to the cloud to cut internal information technology costs.

With a cloud computing solution, the IT department would be reduced from twelve people to six. IT

infrastructure (servers, hardware, programs, processing) would be done by a vendor (††the cloud†â€),

although responsibility for information technology would be retained by the company As the case unfolds, the authors explained that proper oversight was neglected

computing service provider is very important for the success of this IT transformation project and for the transforming company

Computing and Information Agency (NCIA. This agency is consisted of two huge data centers that contain thousands of computer systems for about 47 organizations

information systems. Third, it provides an environment that can respond to user requests promptly via an automatic provisioning process based on on-demand

computing transformation project Cloud computing is simply about an innovative IT model for providing an on

-demand network access to a shared pool of configurable computing resources such as networks, servers and software applications.

information technology, vol 1, pp 320†324. doi: 10.1109/EMEIT. 2011.6022935 2. Carroll M, Van der Merwe A, Kotzã P (2011) Secure cloud computing benefits, risks and

computing security taxonomies†classification of security challenges in the present cloud. In Proceedings of international conference on advanced computing and communications and

informatics, pp 470†476 12. Conway G, Curry E (2010) Managing cloud computing: a life cycle approach.

integration with enterprise information systems, to a secure supply to the final users, through a constant control and performance monitoring.

capital company Kleiner Perkins Caufield Byers, in two Computing Cycles (i e smartphones, and tablets cycles respectively) we are entering, faster than before, a

third Computing Cycle of ††Wearables/Drivables/Flyables/Scannables††devices 2. Considering smartphones and tablets,

studied ones in the management of information systems research field 19,20 Once briefly introduced the main constructs of the TAM we will identify the way

internal oriented perspective on a company information system. Thus, the origins of the model do not consider a complex digital ecosystems as the one acting in

-bility), the latter related mainly to information systems characteristics Taking these issues into account, being perceived ease of use considered among

has received limited attention, in particular, in the information systems research field 27. Indeed, considering the ageing phenomenon at global level and the

factors influencing information technology acceptance between the latter and the individuals that in a sense accept their actual age.

-gration with enterprise information system, to a secure supply to the final users through a constant control and performance monitoring

information systems, at software as well as data level •Performance, encompassing the need for monitoring and control of applications

information systems software and data ï§Device management data privacy and security Software solutions to support applications

-tion with its own enterprise information systems (see Fig. 3. 3). Indeed, the adoption of a strategy of Enterprise Mobility highlights some critical issues in

-tiatives, from development and integration with enterprise information system, to a secure supply to the final users, through a constant control and performance

opportunities for information systems scholars. Inf Syst Res 17: 327†331 5. Antoniou G, van Harmelen F (2008) A semantic web primer, 2nd edn.

information technology. MIS Q 13: 319†339 19. Lee Y, Kozar KA, Larsen KRT (2003) The technology acceptance model:

Taking these issues into account, nowadays, algorithms for global evaluation are the most common methods used to identify opinion leaders online, without

Stream synopsis algorithms and software Histograms and sketches for data stream computation problems see 37 for a survey

a According to 42 Hyperscale storage is measured a storage space in terms of petabytes, serve millions of users with often one or a limited set of applications, may lack redundancy,

•Cartel (http://cartel. csail. mit. edu/doku. php •Greengps System (http://green-way. cs. illinois. edu/Greengps

information technology. Eur J Inf Syst 15: 120†131 4. Weill P, Malone T, D†Urso VT, Herman G, Woerner S (2005) Do some business models

Abstract The changes that materialized in the field of information technology IT) during the last decade have produced important effects in the strategies of the

and type of information technology used within their firms. However, increasing numbers of employees have become more self

strategy designed to optimize the computing experience and keep the user as productive as possible on any platform,

Shorten the Time Frame for New Computing Approach Adoption Many of the consumer technologies that are already in use by enterprises are

solutions include information technology giants. One example of these companies is Cisco, which provides Desktop Virtualization with collaboration with Citrix

Another example of those information technology pioneers is Dell which provided Virtual desktop infrastructure (VDI) solution that provides new

Abstract The fast evolution of the Information systems (IS) during the last decade makes it able to cover more areas in business and other fields.

The continuous development in the field of information systems aims to find new methods to improve the interactions between people and the

order for information systems to be more successful and productive in the global economy 6 However, confusion can happen because of the lack of common understanding

people, information systems, and processes across different organizations to accomplish a predefined task or objective by using digital and electronic means

challenges for information technology (IT) departments. One way to tackle such an issue is the collaboration.

Healthcare, and Information technology 4 6. 4. 5 Social Software and Collaborative Systems and Tools Nowadays, people are using social networking massively.

represented by information systems that allow members to post content or to let a limited number of members to start posts or new subjects, such as Weblogs.

well as the incentives and rewards in social computing. Digital work and collab -oration is basically about using digital devices, open source data and cloud

Scekic O, Truong H-L, Dustdar S (2013) Incentives and rewarding in social computing Commun ACM 56:

the state of art on business information systems, an interesting solution for Enterprise Identity Management has been proposed by Royer and Meints 15

empowerment by the information technology and digital channels 29 POINT OF ATTENTION: Digital business identity management asks

information systems. Eur J Inf Syst 12: 3†17 (ST€ SMES, co-opetition and knowledge sharin

strategic management of information systems. Decis Support Syst 25: 71†88 18. Topalian A (2003) Executive perspective:

information technology (IT governance is a subset discipline of corporate governance focused on information systems and their performance and risk management.

development environment whose output is effective content, applications, and interaction The second challenge concerns digital ownership,

5-Share, Review, and Upgrade; 6 -Establish and Implement) they provide a light perspective to complement and

state in which a business organization is able to use information technology (IT effectively to achieve business objectives

3. integration issues between the legacy and 3rd party information systems the enterprise already used, as well as other different systems from other various

and sustainability in information systems. managing transfer and diffusionof IT SE€ 15 Springer, Heidelberg, pp 239†248

Conference on Information systems, pp 1†15 12. Guldentops E (2004) Key success factors for implementing IT governance.

such as information systems 19 and business strategy 20 and others focus on the constituent elements that make up the business model 11.

††information system and information System††By Peter Checkland and Sue Holwell. Cybern Hum Knowing 6:

6. Checkland P, Holwell S (1998) Information systems and information systems: making sense of the field. Wiley, Chichester

Rethinking management information systems: an interdisciplinary perspective. Oxford University Press, Oxford, pp 161†174 39. Anderson D, Lee HL (2000) The Internet-enabled supply chain:

Using powerful machine learning algorithms, it provides extremely accurate profiling and segmentation of consumers based on habits and

University Professors in computer science, who were fascinated by the prospect to understand human behavior through the analysis of location data over time.

-preneur and one of the most cited authors in computer science. His research at the MIT Human Dynamics Lab has been an important brick in the development of the

algorithms 10.4 Billguard Billguard 5 is a personal finance security system scanning credit card activity daily for hidden charges, billing errors, forgotten subscriptions, scams and fraud

Underkoffler, with the goal of creating the next generation of computing interfaces It is a company of designers, programmers,

multi-screen, multi-device computing environments. The core technology plat -form, called g-speak, enables applications to run across multiple screens and

Noldus Face Reader 8 is an affective computing tool designed to capture and interpret emotions in individual subjects, through the recognition of uncontrollable

Noldus Information technology was established in 1989, currently having head -quarters in The netherlands as well as in the United states. The president of the

Company Noldus information technology Funded 1989 Nï¿Products Many Clients Many Partners Many Market dimension Average

and affective computing (Noldus Face Reader). ) Furthermore, the selection has shown a majority of digital innovations

Computing interfaces, 194 Confidentiality, 28 Consumerization, 89, 90†92,95, 98,99, 102 104,109 Critical success factors (CSFS), 152

Grid computing, 23 H Hadoop, 7, 28 Hybrid cloud, 34 Hyperscale storage, 80 I Information, 4

Rethink User Computing---Change Focus from Platform to User 5. 3. 3 Step 3: Shorten the Time Frame for New Computing Approach Adoption

5. 3. 4 Step 4: Support Employee Owned Devices 5. 4†Business Scenarios for IT Consumerization


Waterford-Institute-Technology-Presentation.docx.txt

In particular WIT has focused on providing such programmes in the areas of ICT, financial services and business information systems, lean manufacturing, e-Marketing, innovative technologies and entrepreneurship

since September 2004, a taught MSC in Computing, specialising in Communications Software, with a thematic research focus on communications management, service development, security and new developments in ubiquitous and pervasive computing.

TSSG research teams comprise some of Ireland†s leading telecommunications and software engineering experts; this knowledge and expertise has enabled us to work with academic and industry leaders from around the globe.


WEF_EuropeCompetitiveness_FosteringInnovationDrivenEntrepreneurship_Report_2014.pdf.txt

Google Ventures uses algorithms with data from academic literature or from due diligences As summarized in The New york times:

European commission (2012), Entrepreneurship in the EU and beyond, Flash Barometer 354, http://ec. europa. eu/public opinion

European commission (2012), Flash Eurobarometer 354: Entrepreneurship in the EU and beyond 66. Foster, G. et al.

Global Information technology Report 2013, Global Innovation Index 2013, Global Talent Competitiveness Index 2013 58 Enhancing Europe†s Competitiveness

†INSEAD, World Economic Forum (2013), The Global Information technology Report †Johansen (2006), Experiences from Participation in JA-YE Company Programmes, Eastern Norway Research Institute


WEF_GlobalCompetitivenessReport_2014-15.pdf.txt

-port human-computing interfaces that empower indi -viduals. And making cities more liveable†improving the

The Global Information technology Report 2012. Geneva World Economic Forum ††â€. 2012c. The Global Competitiveness Report 2012†2013.

computation REFERENCES Barro, R. and X. Sala-i-Martã n. 2004. Economic growth, 2nd edition Cambridge:

Computation and structure of the Global Competitiveness Index 2014†2015 This appendix presents the structure of the Global

The computation of the GCI is based on successive aggregations of scores from the indicator level (i e

information technology (IT) sector, where â€oesustainability is fast becoming an important corporate-performance  2014 World Economic Forum

metric. †12 Information technology companies†concerned with energy costs, reputational risks, and difficulties they confront in continuing to expand their capacity†are

/37 See http://www. footprintnetwork. org/en/index. php/GFN/page /methodology/for information about information about the Global

php/rae/article/view/3361/3258 Commission on Growth and Development. 2008. The Growth Report

Available at http://www. uncsd2012. org/index. php page=view&type=400&nr=11&menu=45 ††â€. 2011b. â€oesustainable Agriculture and Food security in LDCS. â€

The computation of the sustainability components is based on an arithmetic mean aggregation of scores from the indicator level. b

Survey edition (s) used for the computation of economy scores: †2012 and 2014; ‡

DATA TREATMENT AND SCORE COMPUTATION This section details the process whereby individual responses are edited and aggregated in order to

Aggregation and computation of country averages Through 2013, the computation of country averages used a weighting by economic sector:

INFO-Can't read the embedded type1c font XLNMQG+Mathematicalpi-Three averages of individual responses were computed for the four main

Moving average and computation of country scores As a final step, the country averages for 2014 are

country scores that are used for the computation of the GCI 2014†2015 and for other projects. 7

used in the computation of the scores of each country while Boxâ 4 details the methodology and provides a

computation of the Survey scores (see the Exceptions section in Boxâ 4). Rwanda therefore is covered still in

-establishment of the standard computation method, we used a weighted average of the Survey data of 2012 and

Example of score computation For this example, we compute the score of Tanzania for indicator 5. 08 Extent of staff training,

the final score used in the computation of the GCI and reported in Table 5. 08 (see page 463).

computation of the Global Competitiveness Index as well as for additional key indicators. In the case of

computation of the two averages, only economies with a two-year average number of at least 100 USPTO applications and 50 PCT

The estimates are used in the computation of the respective Innovation pillar scores of the two economies

-editor of The Global Information technology Report Prior to joining the Forum, Dr Bilbao-Osorio worked at

computation and management of a range of indexes as well as data analysis for various projects and studies

the development and computation of a range of indexes and on the analysis of data for the elaboration of various

and computation of a wide range of composite indicators He is also responsible for the Network†s technical

Information technology Report, and is the lead author of several regional and country studies. A Swiss national


< Back - Next >


Overtext Web Module V3.0 Alpha
Copyright Semantic-Knowledge, 1994-2011