Search for dissertations about: "information behavior context"
Showing result 1 - 5 of 205 swedish dissertations containing the words information behavior context.
-
1. What's the use? : Internet and information behavior in everyday life
Abstract : A widespread access to computers and the Internet at home signals a change in the "information environment" of everyday life. This thesis deals with how this new situation can be studied and understood. READ MORE
-
2. Information system and organization as multipurpose network
Abstract : Information systems (IS) are widely acknowledged to be central for contemporary organizations. Along with the increasing importance of new IS in organizations, a school of thought has developed over the last few years that claims that IS and organizations mutually shape each other. READ MORE
-
3. Knowledge discovery for interactive decision support and knowledge-driven optimization
Abstract : Multi-objective optimization involves the simultaneous optimization of several objective functions. In real-world problems, these objectives are often in conflict, giving rise to trade-offs in the optimal solutions from the optimization process. All these solutions are equally viable, with no single solution being better or worse than the others. READ MORE
-
4. Make It Easier : A psychological perspective on sustainable behavior change
Abstract : Human behavior is the cause of most environmental challenges we face today, and widespread behavioral change is urgently needed across actors and scales. Even though the public perception of the current ecological crisis has changed drastically in recent decades, a corresponding shift in behavior is lacking — unfortunately, mere belief in climate change is a poor predictor of taking action. READ MORE
-
5. An Information Flow Approach to Fault-Tolerant Security and Information Erasure
Abstract : Sensitive information is a crucial asset for both individuals and companies. Since it is processed in a largely automated way, it is important that the computational infrastructures are equipped with methods for reasoning about and enforcing security policies. Information flow security has been proposed for this purpose in many contexts. READ MORE