Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2017 ( 1 )

2015 ( 28 )

2014 ( 40 )

2013 ( 45 )

Custom range...

Search Results: 1 - 10 of 710 matches for " Petter Gottschalk "
All listed articles are free for downloading (OA Articles)
Page 1 /710
Display every page Item
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
Petter Gottschalk
Journal of Emerging Trends in Computing and Information Sciences , 2011,
Abstract: The European Online Grooming Project from 2009 to 2011 involved researchers from Norway, Italy, Belgium and the UK. The project had three separate but interlinked phases. The first was a scooping project. The second and third phases involved interviews with convicted online groomers across Europe and dissemination activity respectively. The key features of grooming behavior the study identified do not apply to all groomers in all contacts they have with young people. These features of online grooming include factors that help maintain the behavior such as the online environment, dissonance and offenders perceptions of young people and their behavior. The research also identified salient behaviors in the grooming process such as: scanning the online environment for potential people to contact, the identity adopted by the groomer (be it their own or another); the nature of contact with the young person; the different ways in which the online groomer can intensify the process of grooming and the diverse range of outcomes toward the end of the process. In particular, it is clear from the research that not all episodes of online grooming result in a physical meeting. The first ‘type’ of groomer identified is the distorted attachment offender. Men in this group had offence supportive beliefs that involved seeing contact with the young person as a ‘relationship’. The second type is the adaptable online groomer. This group of men had offence supportive beliefs that involved their own needs and seeing the victim as mature and capable. Finally, the hyper-sexualized group of men was characterized by extensive indecent image collections of children and significant online contact with other sexual offenders or offender groups.
Petter Gottschalk
Journal of Emerging Trends in Computing and Information Sciences , 2010,
Abstract: Information, intelligence and knowledge are required in corporation to detect and prevent white-collar crime. Information and to a similar extent intelligence consist of facts and other data which is organized to characterize or profile a particular situation, incident, or crime and the individual or group of individuals presumed to be involved. This article presents knowledge management, knowledge categories that are applied in the value configuration of a value shop to combat financial crime.
Empirical Validation Procedure for the Knowledge Management Technology Stage Model
Petter Gottschalk
Informing Science The International Journal of an Emerging Transdiscipline , 2002,
Abstract: Stages of growth models have been used widely in both organizational research and information technology management research. However, stages of growth models are criticized for lack of empirical validity. This paper develops a survey instrument to empirically validate a knowledge management technology stage model. The survey instrument has several parts that enable cross-examination of responses. One important instrument part is concerned with Guttman scaling which is a cumulative scaling technique.
Information Systems Executives: The Changing Role of New IS/IT Leaders
Petter Gottschalk
Informing Science The International Journal of an Emerging Transdiscipline , 2000,
Abstract: Leadership in information systems (IS) and information technology (IT) has changed in fundamental ways over the past decade. While interest in the topic has increased in recent years, little empirical research on IS/IT leadership has been conducted. This study compares leadership roles, individual characteristics and position characteristics of newly appointed IS/IT executives (those who have been in their position for two years or less) with established IS/IT executives using a survey conducted in Norway. Survey results indicate that new leaders spend more time in the informational role and in the change-leader role than established leaders. New leaders have worked a shorter time in the organization and a shorter time in IS/IT than established leaders. New leaders have less responsibility for computer operations, communication networks and technical infrastructure than established leaders.
Knowledge Management Systems: A Comparison of Law Firms and Consulting Firms
Petter Gottschalk
Informing Science The International Journal of an Emerging Transdiscipline , 2000,
Abstract: This paper reports results from a survey of Norwegian law firms on the use of information technology to support inter-organizational knowledge management. Two predictors of IT support were significant: firm cooperation and knowledge cooperation. Inter-organizational trust was not a significant predictor. Software and systems most frequently used include word processing, electronic mail and legal databases. It has been argued that law firms are old fashioned and not ready for extensive use of information technology. An impression is created that other professional service firms such as consulting firms are much more advanced. To evaluate the relative performance of law firms in the area of IT support for knowledge trans-fer an identical survey was conducted among a limited number of consulting firms in Norway. Survey results indicate that the average IT use in consulting firms was slightly higher than in law firms, but the most interesting differences were found in the different systems and software used rather than the level of IT use. Consulting firms are high-level users of general information sources on the Internet, while law firms are high-level users of structured information in databases.
Toward a Model of Growth Stages for Knowledge Management Technology in Law Firms
Petter Gottschalk
Informing Science The International Journal of an Emerging Transdiscipline , 2002,
Abstract: Knowledge management was introduced to law firms to help create, share, and use knowledge more effectively. Information technology can play an important role in successful knowledge management initiatives. In this paper, information technology support for knowledge management is linked to stages of growth. A model of growth stages is proposed consisting of four stages. The first stage is end-user tools that are made available to knowledge workers, the second stage is information about who knows, the third stage is information from knowledge workers, and the final stage is information systems solving knowledge problems. The model can be used to empirically assess the growth stage of law firms as well as indicate future evolution of law firms in the area of knowledge management technology.
Information Computing in Crime Mapping: The Pocket Man Case of Criminal Child Sexual Abuse
Petter Gottschalk,Morten Espen ?rn
Journal of Emerging Trends in Computing and Information Sciences , 2011,
Abstract: It took Norwegian police thirty-two years to capture the Pocket Man who was responsible for more than hundred sexual abuses over that same time period. This article presents a study police investigations of the abuses by applying the value shop configuration. Primary activities in the value shop are (i) problem definition; (ii) investigation steps; (iii) investigation decision; (iv) investigation implementation; and (v) police performance evaluation. As discussed in this article, each value shop activity had serious deficiencies in the investigations of Pocket Man cases.
Prevention of White-Collar Crime by Knowledge and Learning in Business Organizations: An Empirical Study of Chief Financial Officer Management
Petter Gottschalk,Hans Solli-Soether
International Journal of Management, Knowledge and Learning , 2012,
Abstract: Knowledge and learning are important in combating financial crime generallyand white-collar crime in particular. The purpose of this research is to generateinsights into prevention approaches in practice that may reflect on acontingent approach. The five hundred largest business companies in termsof annual turnover were identified in Norway for our empirical study of whitecollarcrime. A paper letter was mailed to the chief financial officer (CFO)asking him or her to fill in the questionnaire to be found on a web site usinga password found in the letter. The open-ended question in the questionnaireto CFOs about prevention of white-collar crime was formulated as follows:How can white-collar crime best be prevented in your company? Survey resultsindicate an even distribution of respondents emphasizing control and respondentsemphasizing influence. This empirical research steps back from manybest practice articles and provides insights into preferences of chief financialofficers on how to prevent white-collar crime in the company.
Differences in Stage of Integration between Business Planning and Information Systems Planning according to Value Configurations
Petter Gottschalk,Hans Solli-S?ther
Informing Science The International Journal of an Emerging Transdiscipline , 2001,
Abstract: Integration between business planning and information systems (IS) planning is considered an important enabler of business - IS alignment. A con-tent analysis of IS plans was conducted to identify stages of integration between business and IS planning. The companies studied were also classified according to value configurations and eras of IS growth. Empirical results indicate that companies classified as value networks are at a higher stage of integration than value shops and chains probably because they are in the network era rather than the data processing or information technology eras.
Effect of temperature on crossing over in the mus309 mutant, deficient in DNA double-strand break repair, of Drosophila melanogaster suggests a mechanism for crossover interference  [PDF]
Petter Portin
Open Journal of Genetics (OJGen) , 2011, DOI: 10.4236/ojgen.2011.13008
Abstract: Crossing-over frequencies, crossover interference, recombination frequencies and map distances were compared in the cv-v-f region of the X chromosome of Drosophila melanogaster in females bearing either wild type 3rd chromosomes (control) or having the DNA double-strand break repair deficient mus309D2/mus309D3 mutant constitution in the 3rd chromosomes (experiment), and raised in three different temperatures viz. 18C, 25C and 29C. In addition, the fecundity of the females was also measured. In the control crosses none of the mean values of the parameters measured was dependent on the temperature, whereas in the experimental crosses all the parameters, except for the frequency of true single crossovers in the cv-v interval, the recombination frequency of the v and f markers, and the coefficient of coincidence, changed due to the effect of temperature. When comparing the genotypes studied, a significant difference between them was observed in all the parameters measured, apart from the frequency of the true single cross-overs in the cv-v interval. These results support the counting number model of the mechanism of interference based on the genetic distance, but are in contradiction with the models based on physical distance.
Page 1 /710
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.