his.sePublikasjoner
Endre søk
Begrens søket
1 - 12 of 12
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Treff pr side
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
  • Standard (Relevans)
  • Forfatter A-Ø
  • Forfatter Ø-A
  • Tittel A-Ø
  • Tittel Ø-A
  • Type publikasjon A-Ø
  • Type publikasjon Ø-A
  • Eldste først
  • Nyeste først
  • Skapad (Eldste først)
  • Skapad (Nyeste først)
  • Senast uppdaterad (Eldste først)
  • Senast uppdaterad (Nyeste først)
  • Disputationsdatum (tidligste først)
  • Disputationsdatum (siste først)
Merk
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Gadolin, Christian
    et al.
    Högskolan i Skövde, Institutionen för handel och företagande. Högskolan i Skövde, Forskningsspecialiseringen Framtidens Företagande. Chalmers tekniska högskola.
    Eriksson, Erik
    Chalmers tekniska högskola.
    Därför avstår forskarna från offentlig debatt2019Inngår i: Göteborgs-Posten, ISSN 1103-9345Artikkel i tidsskrift (Annet (populærvitenskap, debatt, mm))
  • 2. Hooshyar Yousefi, Bahram
    Special Discussion with Abdolhamid NoghrehKar: «The Challenge of Identity»2015Inngår i: Designer Magazine, ISSN 2008-9538, nr 11, s. 40-43Artikkel i tidsskrift (Annet vitenskapelig)
  • 3.
    Huskaj, Gazmend
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningsmiljön Informationsteknologi. Swedish Defence University, Stockholm, Sweden.
    Iftimie, Ion A.
    NATO Defense College, Rome, Italy / European Union Research Center, George Washington School of Business, Washington, DC, United States / Central European University, Vienna, Austria.
    Toward an ambidextrous framework for offensive cyberspace operations: A theory, policy and practice perspective2020Inngår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 / [ed] Brian K. Payne, Hongyi Wu, Academic Conferences and Publishing International Limited , 2020, s. 243-253Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article addresses the rise in state-sponsored cyber attacks over the past three decades and proposes a new ambidextrous framework for offensive cyberspace operations. Since 1982, nation states have embarked in a fierce race to develop both clandestine and covert offensive cyber capabilities. Their intended targets range from foreign militaries and terrorist organizations to civilian populations and the critical infrastructures that they rely upon. Advancements in cyber security have, however, contributed to the discovery and attribution of offensive cyber operations, such as state-sponsored ransomware attacks, where state-built cyber capabilities have been used to attack governments, industries, academia and citizens of adversary nations. The financial and psychological costs of these ransomware attacks are today a threat to any state's national security. This article draws from academic research, the cyber military doctrines of four countries-a total of eight models from the Netherlands, Sweden, the U.S., and the U.K.-and the authors' operational experience to propose a new ambidextrous framework for offensive cyberspace operations. This ambidextrous framework for offensive cyberspace operations and the associated Cyberspace Operations Canvas are needed today in order to increase the resilience of national critical infrastructures against attacks from state-developed tools. We use the WannaCry-case to illustrate how the implementation of the ambidextrous framework for offensive cyberspace operations would result in increased awareness and understanding of the prospective cyber threats, their intended target(s), the likelihood of cascading effects and the options available by nation states to minimize them. 

  • 4.
    Huskaj, Gazmend
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningsmiljön Informationsteknologi. Swedish Defence University, Stockholm, Sweden.
    Wilson, Richard L.
    Towson University, United States / Hoffberger Center for Professional Ethics, University of Baltimore, United States.
    An anticipatory ethical analysis of offensive cyberspace operations2020Inngår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 / [ed] Brian K. Payne, Hongyi Wu, Academic Conferences and Publishing International Limited , 2020, s. 512-520Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article presents the ethical issues using offensive cyberspace operations. Previously enshrouded in secrecy, and now becoming the new norm, countries are using offensive cyberspace operations to achieve their strategic interests. Russia has conducted multiple offensive operations targeting Estonia, Georgia and the Ukraine; Hamas has targeted Israeli targets; and Iran has been targeting U.S. targets. The response to these operations has varied; Estonia and Georgia struggled with the attacks and were unable to respond while Ukraine tried to respond but the response was inefficient. Israel's response on Hamas offensive operations was an air strike on a building with Hamas Cyber-operatives. Iran shot down a U.S. Drone over the Strait of Hormuz, and the U.S. initially intended to respond with kinetic capabilities in the form of missile strikes. However, in the last minute, the U.S. chose to respond with offensive cyberspace operations targeting the Iranian missile systems. This last-minute change of response choosing between kinetic or cyber capabilities shows a need to further investigate how offensive cyberspace operations can be used against which targets from an ethical perspective. This article applies anticipatory ethical analysis on U.S. offensive operations in the “Global Hawk”-case when Iran shot down a U.S. drone over the Strait of Hormuz. Anticipatory ethical analysis looks at emerging technologies and their potential consequences. Offensive cyberspace operations present a range of possibilities, which include lowering the risk of harm to cyber operatives' lives belonging to the responding nation. However, a response can also be kinetic. Therefore, the analysis of the “Global Hawk”-case is compared with the Israeli-air strike of the building of Hamas Cyber-operatives. The authors argue that applying anticipatory ethical analysis on offensive operations and kinetic operations assist decision makers in choosing response actions to re-establish deterrence through the use of offensive cyberspace operations. 

  • 5.
    Huskaj, Gazmend
    et al.
    Högskolan i Skövde, Institutionen för informationsteknologi. Högskolan i Skövde, Forskningsmiljön Informationsteknologi. Swedish Defence University, Stockholm, Sweden.
    Wilson, Richard L.
    Towson University, United States / Hoffberger Center for Professional Ethics, University of Baltimore, United States.
    Anticipatory ethics for vulnerability disclosure2020Inngår i: Proceedings of the 15th International Conference on Cyber Warfare and Security, ICCWS 2020 / [ed] Brian K. Payne, Hongyi Wu, Academic Conferences and Publishing International Limited , 2020, s. 254-261Konferansepaper (Fagfellevurdert)
    Abstract [en]

    This article presents the ethical dilemma related to under what circumstances vulnerabilities should be disclosed. Vulnerabilities exist in hardware and software, and can be as a consequence of programming errors or design flaws. Threat actors can exploit these vulnerabilities to gain otherwise unintended access to information systems, resources and/or stored information. In other words, they can be used to impact the confidentiality, integrity and availability of information in information systems. As a result, various types of vulnerabilities are highly sought after since they enable this type of access. The most highly sought are so-called “zero-day”-vulnerabilities. These are vulnerabilities that exist but are unknown, and when exploited, enable one way of entry into a system that is not thought possible. This is also why zero-day vulnerabilities are very popular among criminal organizations, states and state-sponsored advanced persistent threats. The other side of the coin is when a state identifies a zero-day, and ends up in the ethical dilemma of whether to release the news and inform the vendor to patch it, i.e. close the vulnerability, or to use it for offensive or intelligence purposes. This article employs these distinctions to apply anticipatory ethics in the Stuxnet-case. Stuxnet was a computer software that was allegedly developed by the U.S. together with Israel to disrupt Iran's development of uranium for their nuclear program. More exactly, it was developed to disable the uranium centrifuges used to enrich uranium. To achieve this, Stuxnet exploited four zero-day vulnerabilities and, according to some experts, managed to delay Iran's nuclear program by one to two-years, forcing them to the negotiation table. Using vulnerabilities like zero-days presents opportunities but also risks. The results of the application of anticipatory ethics to the Stuxnet case are then compared with the “Osirak”-case and the “al-Kibar”-case. Osirak was the nuclear reactor in Iraq and was bombed in 1981; al-Kibar was the nuclear reactor being built up in Syria, also bombed in 2007. 

  • 6.
    Kourentzes, Nikolaos
    et al.
    Lancaster University Management School, Department of Management Science, Lancaster, United Kingdom.
    Athanasopoulos, George
    Department of Econometrics and Business Statistics, Monash University, Australia.
    Cross-temporal coherent forecasts for Australian tourism2019Inngår i: Annals of Tourism Research, ISSN 0160-7383, E-ISSN 1873-7722, Vol. 75, s. 393-409Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Key to ensuring a successful tourism sector is timely policy making and detailed planning. National policy formulation and strategic planning requires long-term forecasts at an aggregate level, while regional operational decisions require short-term forecasts, relevant to local tourism operators. For aligned decisions at all levels, supporting forecasts must be ‘coherent’ that is they should add up appropriately, across relevant demarcations (e.g., geographical divisions or market segments) and also across time. We propose an approach for generating coherent forecasts across both cross-sections and planning horizons for Australia. This results in significant improvements in forecast accuracy with substantial decision making benefits. Coherent forecasts help break intra- and inter-organisational information and planning silos, in a data driven fashion, blending information from different sources. This article also launches the Annals of Tourism Research Curated Collection on Tourism Demand Forecast, a special selection of research in this field.

  • 7.
    Le Gal Beneroso, Mikael
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Germinating good behaviors: A game prototype to test players' incentive of choice2019Independent thesis Advanced level (degree of Master (One Year)), 40 poäng / 60 hpOppgave
    Abstract [en]

    In this paper, we propose and develop a model for a prototype research tool based on a social dilemma game which use is widely spread in social psychology and experimental economics, the Public Goods Game. This tool generates from the necessity to expand the accessibility and versatility of this popular game as well as reach for newer audiences that might be otherwise deterred by the traditional Public Goods Game. Also, using this tool, we perform an experiment to try to find a possible preference towards either punishment or reward in the current population and find a possible correlation between said preference and three different cultural spheres (geographical, generational and gender).

    Fulltekst (pdf)
    Masters thesis - Mikael Le Gal
  • 8.
    Linnéusson, Gary
    et al.
    Högskolan i Skövde, Institutionen för ingenjörsvetenskap. Högskolan i Skövde, Forskningscentrum för Virtuella system.
    Galar, Diego
    Högskolan i Skövde, Institutionen för ingenjörsvetenskap. Högskolan i Skövde, Forskningscentrum för Virtuella system. Luleå University of Technology, Luleå, Sweden.
    Wickelgren, Mikael
    Högskolan i Skövde, Institutionen för handel och företagande. Högskolan i Skövde, Forskningsspecialiseringen Framtidens Företagande.
    In Need for Better Maintenance Cost Modelling to Support the Partnership with Manufacturing2016Inngår i: Current Trends in Reliability, Availability, Maintainability and Safety: An Industry Perspective / [ed] Uday Kumar, Alireza Ahmadi, Ajit Kumar Verma & Prabhakar Varde, Springer, 2016, 1, s. 263-282Konferansepaper (Annet vitenskapelig)
    Abstract [en]

    The problem of maintenance consequential costs has to be dealt with in manufacturing and is core of this paper. The need of sustainable partnership between manufacturing and maintenance is addressed. Stuck in a best practice thinking, applying negotiation as a method based on power statements in the service level agreement, the common best possible achievable goal is put on risk. Instead, it may enforce narrow minded sub optimized thinking even though not intended so. Unfortunately, the state of origin is not straightforward business. Present maintenance cost modelling is approached, however limits to its ability to address the dynamic complexity of production flows are acknowledged. The practical problem to deal with is units put together in production flows; in which downtime in any unit may or may not result in decreased throughput depending on its set up. In this environment accounting consequential costs is a conundrum and a way forward is suggested. One major aspect in the matter is the inevitable need of shift in mind, from perspective thinking in maintenance and manufacturing respectively towards shared perspectives, nourishing an advantageous sustainable partnership.

  • 9.
    Pagmert, Sylvester
    Högskolan i Skövde, Institutionen för kommunikation och information.
    Recognition and emotional valence of isolated gestures in autism spectrum disorder.2013Independent thesis Basic level (degree of Bachelor), 20 poäng / 30 hpOppgave
    Abstract [en]

    Earlier research has repeatedly shown that individuals with autism spectrum disorders are significantly impaired in emotional recognition of biological motion. This study adopted an approach where the typically developed and the autistic participants rated emotional valence and recognition of isolated gestures in Point-light display. Results revealed that participant groups did not differ in their emotional valence of the gestures but differed in recognition of the gestures. The method of using isolated gestures in Point-light display has not been used in autism emotional research earlier and this paper functions as a pilot of this technique. The results are discussed from a perspective that individuals with autism perceive the world differently and hence understand and interact differently with the world.

    Fulltekst (pdf)
    fulltext
  • 10.
    Pietilä, Sirpa
    et al.
    Research School of Health and Welfare, School of Health Sciences, Jönköping University, Sweden / Institute of Gerontology, School of Health Sciences, Jönköping University, Sweden.
    Björklund, Anita
    Department of Rehabilitation, School of Health Sciences, Jönköping University, Sweden.
    Bülow, Pia
    Department of Behavioral Science and Social Work, Jönköping University, Sweden.
    Older twins' experiences of the relationship with their co-twin over the life course2012Inngår i: Journal of Aging Studies, ISSN 0890-4065, E-ISSN 1879-193X, Vol. 26, nr 2, s. 119-128Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    Based on 35 life stories of aging twins, this study focuses on personal experiences and recollections of their relationships with the co-twin over the life course. The participants are part of two longitudinal Swedish twin studies on aging, SATSA and Gender. In the narrative analysis, three relationship patterns, labeled ‘nurturing’, ‘draining’, and ‘superficial’, emerged, pointing to qualitative aspects in the co-twin relationship. The dominating aspect was emotional closeness, which differed in the three relationship patterns. In the nurturing twin relationship pattern, emotional closeness was experienced as intimacy and yet independence, while in the draining relationship pattern it was experienced as dependence. The superficial twin relationship was experienced as distant and lacking in emotional involvement. Most of the relationship patterns seemed to remain the same throughout life. However, seen from a life course perspective, this study pointed to complexity and diversity in lifelong twin relationships.

  • 11.
    Rosendahl, Sirpa
    et al.
    Institute of Gerontology, School of Health Sciences, Jönköping University, Sweden.
    Björklund, Anita
    Department of Rehabilitation, School of Health sciences, Jönköping University, Sweden.
    Bülow, Pia
    Department of Behavioral Science and Social work, Jönköping University, Sweden.
    'We are not as alike, as you think' sense of individuality within the co-twin relationship along the life course2013Inngår i: Journal of Aging Studies, ISSN 0890-4065, E-ISSN 1879-193X, Vol. 27, nr 4, s. 339-346Artikkel i tidsskrift (Fagfellevurdert)
    Abstract [en]

    We have explored how older twins experience and describe themselves in relation to their co-twin. The life stories of 20 older twins were analyzed with narrative analysis.

    Results showed that the twins described themselves from the point of differences in relation to the co-twin. This was based on experiences of how other people viewed them as alike, as well as on life events along the life course, which contributed to the perception of oneself as an individual in relation to the co-twin. The emphasis on unlikeness was therefore interpreted as a way of trying to establish a position as an individual within the co-twin relationship and to assert ones individuality to the rest of the social environment. To claim oneself as an individual was an ongoing identity work along the life course.

  • 12.
    Wu, Yifan
    Högskolan i Skövde, Institutionen för informationsteknologi.
    Varumärkesplacering i digitala spel: Inverkan av interaktiv belöning och bestraffning på spelarens inställning till och minnesbilder av varumärken2014Independent thesis Basic level (degree of Bachelor), 180 hpOppgave
    Abstract [sv]

    Varumärkesplacering i digitala spel i samband med belöning och bestraffning harundersökts i denna studie. Resultat från tidigare studier på varumärkesplacering i spelanvändes i utformningen av undersökningen. Tidigare undersökningar av belöningoch bestraffning och dess inverkan på minnet studerades också. Detta kan vara förstagången som varumärkesplacering i digitala spel undersöks i samband med interaktivbelöning och bestraffning.Två versioner av spelet Supertuxkart skapades för undersökningen; den ena medbelönings- och bestraffningsåterkoppling och den andra utan. Deltagare från Kina ochSverige medverkade i experimentet.Undersökningen visade att varumärken med belöning eller bestraffning har tydligaeffekter på deltagarnas memorering av varumärken. Detta verkar gälla oberoende avdeltagarnas kulturella bakgrund, genus eller erfarenhet av digitala spel. Resultatetvisade även att bestraffning inte nödvändigtvis leder till en negativ inställning hosdeltagarna i samband med varumärkesplacering. Vidare studier behövs för att bättreförstå inställningsförändring i detta sammanhang.

    Fulltekst (pdf)
    Yifan Wu Examensarbete
1 - 12 of 12
RefereraExporteraLink til resultatlisten
Permanent link
Referera
Referensformat
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annet format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annet språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf