Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
37,442
result(s) for
"information age"
Sort by:
Informatica
2023
Informatica -the updated
edition of Alex Wright's previously published Glut-continues the
journey through the history of the information age to show how
information systems emerge . Today's \"information
explosion\" may seem like a modern phenomenon, but we are not the
first generation-or even the first species-to wrestle with the
problem of information overload. Long before the advent of
computers, human beings were collecting, storing, and organizing
information: from Ice Age taxonomies to Sumerian archives, Greek
libraries to Christian monasteries.
Wright weaves a narrative that connects such seemingly far-flung
topics as insect colonies, Stone Age jewelry, medieval monasteries,
Renaissance encyclopedias, early computer networks, and the World
Wide Web. He suggests that the future of the information age may
lie deep in our cultural past.
We stand at a precipice struggling to cope with a tsunami of
data. Wright provides some much-needed historical perspective. We
can understand the predicament of information overload not just as
the result of technological change but as the latest chapter in an
ancient story that we are only beginning to understand.
Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems
2011
Information privacy refers to the desire of individuals to control or have some influence over data about themselves. Advances in information technology have raised concerns about information privacy and its impacts, and have motivated Information Systems researchers to explore information privacy issues, including technical solutions to address these concerns. In this paper, we inform researchers about the current state of information privacy research in IS through a critical analysis of the IS literature that considers information privacy as a key construct. The review of the literature reveals that information privacy is a multilevel concept, but rarely studied as such. We also find that information privacy research has been heavily reliant on studentbased and USA-centric samples, which results in findings of limited generalizability. Information privacy research focuses on explaining and predicting theoretical contributions, with few studies in journal articles focusing on design and action contributions. We recommend that future research should consider different levels of analysis as well as multilevel effects of information privacy. We illustrate this with a multilevel framework for information privacy concerns. We call for research on information privacy to use a broader diversity of sampling populations, and for more design and action information privacy research to be published in journal articles that can result in IT artifacts for protection or control of information privacy.
Journal Article
Modeling age of information in a cooperative slotted Aloha network
2023
In this paper, we study a slotted Aloha cooperative network where a source node and a relay node send status updates of two underlying stochastic processes to a common destination. Additionally, the relay node cooperates with the source by accepting its packets for further re-transmissions using probabilistic acceptance and relaying. We obtain the exact steady state distributions of Age of Information (AoI) and Peak AoI sequences of both nodes using Quasi-Birth-Death Markov chains. The analytical model is first validated by simulations and then used to obtain optimal cooperation policies when transmission probabilities are fixed. Subsequently, we study the more general problem of joint optimization of the transmission probabilities and cooperation level between the source and relay, with detailed numerical examples.
Journal Article
Implementation and Evaluation of Age-Aware Downlink Scheduling Policies in Push-Based and Pull-Based Communication
by
Ceran, Elif Tuğçe
,
Oğuz, Tahir Kerem
,
Uysal, Elif
in
age of information
,
Algorithms
,
Communication
2022
As communication systems evolve to better cater to the needs of machine-type applications such as remote monitoring and networked control, advanced perspectives are required for the design of link layer protocols. The age of information (AoI) metric has firmly taken its place in the literature as a metric and tool to measure and control the data freshness demands of various applications. AoI measures the timeliness of transferred information from the point of view of the destination. In this study, we experimentally investigate AoI of multiple packet flows on a wireless multi-user link consisting of a transmitter (base station) and several receivers, implemented using software-defined radios (SDRs). We examine the performance of various scheduling policies under push-based and pull-based communication scenarios. For the push-based communication scenario, we implement age-aware scheduling policies from the literature and compare their performance with those of conventional scheduling methods. Then, we investigate the query age of information (QAoI) metric, an adaptation of the AoI concept for pull-based scenarios. We modify the former age-aware policies to propose variants that have a QAoI minimization objective. We share experimental results obtained in a simulation environment as well as on the SDR testbed.
Journal Article
Shaping Agility through Digital Options: Reconceptualizing the Role of Information Technology in Contemporary Firms
by
Bharadwaj, Anandhi
,
Sambamurthy, V.
,
Grover, Varun
in
Agility
,
Alertness
,
Business innovation
2003
Agility is vital to the innovation and competitive performance of firms in contemporary business environments. Firms are increasingly relying on information technologies, including process, knowledge, and communication technologies, to enhance their agility. The purpose of this paper is to broaden understanding about the strategic role of IT by examining the nomological network of influences through which IT impacts firm performance. By drawing upon recent thinking in the strategy, entrepreneurship, and IT management literatures, this paper uses a multitheoretic lens to argue that information technology investments and capabilities influence firm performance through three significant organizational capabilities (agility, digital options, and entrepreneurial alertness) and strategic processes (capabilitybuilding, entrepreneurial action, and coevolutionary adaptation). We also propose that these dynamic capabilities and strategic processes impact the ability of firms to launch many and varied competitive actions and that, in turn, these competitive actions are a significant antecedent of firm performance. Through our theorizing, we draw attention to a significant and reframed role of IT as a digital options generator in contemporary firms.
Journal Article
Digital technology and the conservation of nature
by
van der Wal, René
,
Arts, Koen
,
Adams, William M.
in
Access to information
,
Adoption of innovations
,
Atmospheric Sciences
2015
Digital technology is changing nature conservation in increasingly profound ways. We describe this impact and its significance through the concept of 'digital conservation', which we found to comprise five pivotal dimensions: data on nature, data on people, data integration and analysis, communication and experience, and participatory governance. Examining digital innovation in nature conservation and addressing how its development, implementation and diffusion may be steered, we warn against hypes, techno-fix thinking, good news narratives and unverified assumptions. We identify a need for rigorous evaluation, more comprehensive consideration of social exclusion, frameworks for regulation and increased multi-sector as well as multi-discipline awareness and cooperation. Along the way, digital technology may best be reconceptualised by conservationists from something that is either good or bad, to a dual-faced force in need of guidance.
Journal Article
Reconceptualizing Users as Social Actors in Information Systems Research
by
Lamb, Roberta
,
Kling, Rob
in
Industrial regulation
,
Information resources
,
Information storage and retrieval systems
2003
A concept of the user is fundamental to much of the research and practice of information systems design, development, and evaluation. Usercentered information studies have relied on individualistic cognitive models to carefully examine the criteria that influence the selection of information and communication technologies (ICTs) that people make. In many ways, these studies have improved our understanding of how a good information resource fits the people who use it. However, research approaches based on an individualistic user concept are limited. In this paper, we examine the theoretical constructs that shape this user concept and contrast these with alternative views that help to reconceptualize the user as a social actor. Despite pervasive ICT use, social actors are not primarily users of ICTs. Most people who use ICT applications utilize multiple applications, in various roles, and as part of their efforts to produce goods and services while interacting with a variety of other people, and often in multiple social contexts. Moreover, the socially thin user construct limits our understanding of information selection, manipulation, communication, and exchange within complex social contexts. Using analyses from a recent study of online information service use, we develop an institutionalist concept of a social actor whose everyday interactions are infused with ICT use. We then encourage a shift from the user concept to a concept of the social actor in IS research. We suggest that such a shift will sharpen perceptions of how organizational contexts shape ICT-related practices, and at the same time will help researchers more accurately portray the complex and multiple roles that people fulfill while adopting, adapting, and using information systems.
Journal Article
Virtualness and Knowledge in Teams: Managing the Love Triangle of Organizations, Individuals, and Information Technology
by
Neale, Margaret A.
,
Griffith, Terri L.
,
Sawyer, John E.
in
Communities
,
Expert systems
,
Information technology
2003
Information technology can facilitate the dissemination of knowledge across the organization-even to the point of making virtual teams a viable alternative to face-to-face work. However, unless managed, the combination of information technology and virtual work may serve to change the distribution of different types of knowledge across individuals, teams, and the organization. Implications include the possibility that information technology plays the role of a jealous mistress when it comes to the development and ownership of valuable knowledge in organizations; that is, information technology may destabilize the relationship between organizations and their employees when it comes to the transfer of knowledge. The paper advances theory and informs practice by illustrating the dynamics of knowledge development and transfer in more and less virtual teams.
Journal Article
Freshwater biomonitoring in the Information Age
by
Vasselon, Valentin
,
Keck, François
,
Bouchez, Agnès
in
Aquatic communities
,
Bar codes
,
Big data
2017
Freshwaters worldwide face serious threats, making their protection increasingly important. Freshwater monitoring has historically produced valuable data and continues to develop. Rapid improvements to biomolecular techniques are revolutionizing the way scientists describe biological communities and are bringing about major changes in biomonitoring. Combined with high-throughput sequencing, DNA metabarcoding is fast and cost-effective, generating massive amounts of data. In a world with numerous ecological threats, \"big data\" constitute a tremendous opportunity to improve the efficiency of biological monitoring. These fundamental changes in biomonitoring will require freshwater ecologists and environmental managers to reconsider how they handle large amounts of data.
Journal Article