首页 > 最新文献

Information Systems Frontiers最新文献

英文 中文
Enhancing Trustworthiness in Real Time Single Object Detection
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-19 DOI: 10.1007/s10796-025-10584-4
Konstantinos Tarkasis, Konstantinos Kaparis, Andreas C. Georgiou

We propose a method for the dynamic evaluation of the output provided by any Real Time Object Detection Algorithm. This work focuses on single object detection from video streams and the main objective is the enhancement of the process with regard to its so-called trustworthiness based on the spatial consideration of the sequence of video frames that are fed as inputs on a Convolutional Neural Network (CNN). To this end, we propose a method that systematically tests the differences between the consecutive values returned by the employed neural network. The process identifies patterns that flag potential false positive predictions based on classic similarity metrics and evaluates the quality of the CNN results in a methodologically agnostic fashion. An extended computational illustration demonstrates the effectiveness and the potentials of the proposed approach.

{"title":"Enhancing Trustworthiness in Real Time Single Object Detection","authors":"Konstantinos Tarkasis, Konstantinos Kaparis, Andreas C. Georgiou","doi":"10.1007/s10796-025-10584-4","DOIUrl":"https://doi.org/10.1007/s10796-025-10584-4","url":null,"abstract":"<p>We propose a method for the dynamic evaluation of the output provided by any Real Time Object Detection Algorithm. This work focuses on single object detection from video streams and the main objective is the enhancement of the process with regard to its so-called trustworthiness based on the spatial consideration of the sequence of video frames that are fed as inputs on a Convolutional Neural Network (CNN). To this end, we propose a method that systematically tests the differences between the consecutive values returned by the employed neural network. The process identifies patterns that flag potential false positive predictions based on classic similarity metrics and evaluates the quality of the CNN results in a methodologically agnostic fashion. An extended computational illustration demonstrates the effectiveness and the potentials of the proposed approach.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"24 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Being Responsible in Cybersecurity: A Multi-Layered Perspective
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-19 DOI: 10.1007/s10796-025-10588-0
Niki Panteli, Boineelo R Nthubu, Konstantinos Mersinas

The paper posits that in the increasingly connected digital landscape, there is a growing need to examine the scale and scope of responsible cybersecurity. In an exploratory study that involved qualitative interviews with senior cybersecurity professionals, we identify different layers of responsible cybersecurity that span across techno-centric, human-centric, organizational (intra and inter) and societal centric perspectives. We present these in an onion-shaped framework and show that collectively these diverse perspectives highlight the linked responsibilities of different stakeholders both within and beyond the organization. The study also finds that senior leadership plays a crucial role in fostering responsible cybersecurity across the different layers. Implications for research and practice are discussed. 

{"title":"Being Responsible in Cybersecurity: A Multi-Layered Perspective","authors":"Niki Panteli, Boineelo R Nthubu, Konstantinos Mersinas","doi":"10.1007/s10796-025-10588-0","DOIUrl":"https://doi.org/10.1007/s10796-025-10588-0","url":null,"abstract":"<p>The paper posits that in the increasingly connected digital landscape, there is a growing need to examine the scale and scope of responsible cybersecurity. In an exploratory study that involved qualitative interviews with senior cybersecurity professionals, we identify different layers of responsible cybersecurity that span across techno-centric, human-centric, organizational (intra and inter) and societal centric perspectives. We present these in an onion-shaped framework and show that collectively these diverse perspectives highlight the linked responsibilities of different stakeholders both within and beyond the organization. The study also finds that senior leadership plays a crucial role in fostering responsible cybersecurity across the different layers. Implications for research and practice are discussed. </p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"50 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143443469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network Coexistence
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-18 DOI: 10.1007/s10796-025-10586-2
Zhiwei Cui, Baojiang Cui, Jie Xu, Junsong Fu

The Beyond 5G (B5G) network promotes the development of all sectors of society and greatly changes our lives. To provide subscribers with better security and privacy protection, the 3rd Generation Partnership Project (3GPP) has enhanced the Non-Access Stratum (NAS) protocol for B5G. It is crucial to analyze the security of NAS protocol and confirm whether it achieves security goals. However, previous work mainly considered the issues in B5G standard, while overlooking the fact that 4G and B5G networks coexist in actual mobile network operators. In this paper, we provide the first systematic security analysis model for B5G NAS protocol under the assumption of network coexistence. We identified 9 protocol vulnerabilities, including one never reported before. This new vulnerability could be exploited to track the target user. We have reported the novel vulnerability to the GSM Association (GSMA) and obtained a tracking number CVD-2022-0058.

{"title":"A Systematic Security Analysis for Beyond 5G Non-Access Stratum Protocol from the Perspective of Network Coexistence","authors":"Zhiwei Cui, Baojiang Cui, Jie Xu, Junsong Fu","doi":"10.1007/s10796-025-10586-2","DOIUrl":"https://doi.org/10.1007/s10796-025-10586-2","url":null,"abstract":"<p>The Beyond 5G (B5G) network promotes the development of all sectors of society and greatly changes our lives. To provide subscribers with better security and privacy protection, the 3rd Generation Partnership Project (3GPP) has enhanced the Non-Access Stratum (NAS) protocol for B5G. It is crucial to analyze the security of NAS protocol and confirm whether it achieves security goals. However, previous work mainly considered the issues in B5G standard, while overlooking the fact that 4G and B5G networks coexist in actual mobile network operators. In this paper, we provide the first systematic security analysis model for B5G NAS protocol under the assumption of network coexistence. We identified 9 protocol vulnerabilities, including one never reported before. This new vulnerability could be exploited to track the target user. We have reported the novel vulnerability to the GSM Association (GSMA) and obtained a tracking number CVD-2022-0058.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"35 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143435150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reimagining Higher Education: Navigating the Challenges of Generative AI Adoption
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-13 DOI: 10.1007/s10796-025-10582-6
Laurie Hughes, Tegwen Malik, Sandra Dettmer, Adil S. Al-Busaidi, Yogesh K. Dwivedi

The proliferation of generative artificial intelligence (GenAI) has disrupted academic institutions across the world, presenting transformative challenges for decision makers, and leading to questions around existing methods and practices within higher education (HE). The widespread adoption of GenAI tools and processes highlights an ongoing change to existing perceptions of the role of humans and machines. Academics have expressed concerns relating to: academic integrity, undermining critical thinking, lowering of academic standards and the threat to existing academic models. This study presents a mixed methods approach to developing valuable insight to the key underlying challenges impacting GenAI adoption within HE. The results highlight many of the key challenges impacting decision makers in the formation of policy and strategic direction. The findings identify significant interdependencies between the key underlying challenges associated with GenAI adoption in HE. We further discuss the implications in the findings of the high levels of driving power of the factors: (i) perceived risks from Large Language Model training and learning; (ii) the reliability of GenAI outputs in the context of impact on creativity and decision making; (iii) the impact from poor levels of GenAI platform regulation. We posit this research as offering new insight and perspective on the changing landscape of HE through the widespread adoption of GenAI.

{"title":"Reimagining Higher Education: Navigating the Challenges of Generative AI Adoption","authors":"Laurie Hughes, Tegwen Malik, Sandra Dettmer, Adil S. Al-Busaidi, Yogesh K. Dwivedi","doi":"10.1007/s10796-025-10582-6","DOIUrl":"https://doi.org/10.1007/s10796-025-10582-6","url":null,"abstract":"<p>The proliferation of generative artificial intelligence (GenAI) has disrupted academic institutions across the world, presenting transformative challenges for decision makers, and leading to questions around existing methods and practices within higher education (HE). The widespread adoption of GenAI tools and processes highlights an ongoing change to existing perceptions of the role of humans and machines. Academics have expressed concerns relating to: academic integrity, undermining critical thinking, lowering of academic standards and the threat to existing academic models. This study presents a mixed methods approach to developing valuable insight to the key underlying challenges impacting GenAI adoption within HE. The results highlight many of the key challenges impacting decision makers in the formation of policy and strategic direction. The findings identify significant interdependencies between the key underlying challenges associated with GenAI adoption in HE. We further discuss the implications in the findings of the high levels of driving power of the factors: (i) perceived risks from Large Language Model training and learning; (ii) the reliability of GenAI outputs in the context of impact on creativity and decision making; (iii) the impact from poor levels of GenAI platform regulation. We posit this research as offering new insight and perspective on the changing landscape of HE through the widespread adoption of GenAI.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"9 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143401665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Approximate Global Symmetry of Complex Networks with Application to Brain Lateral Symmetry
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-12 DOI: 10.1007/s10796-025-10585-3
Anna Pidnebesna, David Hartman, Aneta Pokorná, Matěj Straka, Jaroslav Hlinka

The symmetry of complex networks is a global property that has recently gained attention since MacArthur et al. 2008 showed that many real-world networks contain a considerable number of symmetries. These authors work with a very strict symmetry definition based on the network’s automorphism detecting mostly local symmetries in complex networks. The potential problem with this approach is that even a slight change in the graph’s structure can remove or create some symmetry. Recently, Liu (2020) proposed to use an approximate automorphism instead of strict automorphism. This method can discover symmetries in the network while accepting some minor imperfections in their structure. The proposed numerical method, however, exhibits some performance problems and has some limitations while it assumes the absence of fixed points and thus concentrates only on global symmetries. In this work, we exploit alternative approaches recently developed for treating the Graph Matching Problem and propose a method, which we will refer to as Quadratic Symmetry Approximator (QSA), to address the aforementioned shortcomings. To test our method, we propose a set of random graph models suitable for assessing a wide family of approximate symmetry algorithms. Although our modified method can potentially be applied to all types of symmetries, in the current work we perform optimization and testing oriented towards more global symmetries motivated by testing on the human brain.

{"title":"Computing Approximate Global Symmetry of Complex Networks with Application to Brain Lateral Symmetry","authors":"Anna Pidnebesna, David Hartman, Aneta Pokorná, Matěj Straka, Jaroslav Hlinka","doi":"10.1007/s10796-025-10585-3","DOIUrl":"https://doi.org/10.1007/s10796-025-10585-3","url":null,"abstract":"<p>The symmetry of complex networks is a global property that has recently gained attention since MacArthur et al. 2008 showed that many real-world networks contain a considerable number of symmetries. These authors work with a very strict symmetry definition based on the network’s automorphism detecting mostly local symmetries in complex networks. The potential problem with this approach is that even a slight change in the graph’s structure can remove or create some symmetry. Recently, Liu (2020) proposed to use an approximate automorphism instead of strict automorphism. This method can discover symmetries in the network while accepting some minor imperfections in their structure. The proposed numerical method, however, exhibits some performance problems and has some limitations while it assumes the absence of fixed points and thus concentrates only on global symmetries. In this work, we exploit alternative approaches recently developed for treating the Graph Matching Problem and propose a method, which we will refer to as Quadratic Symmetry Approximator (QSA), to address the aforementioned shortcomings. To test our method, we propose a set of random graph models suitable for assessing a wide family of approximate symmetry algorithms. Although our modified method can potentially be applied to all types of symmetries, in the current work we perform optimization and testing oriented towards more global symmetries motivated by testing on the human brain.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143393218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pragmatic Interoperability for Human–Machine Value Creation in Agri-Food Supply Chains
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-10 DOI: 10.1007/s10796-024-10567-x
Raymond Obayi, Sonal Choudhary, Rakesh Nayak, Ramanjaneyulu GV

This study delves into the dynamics of pragmatic interoperability, focusing on the case of a digital ecosystem in India —the eKrishi platform—which combines of industry 4.0 technologies with human-centric principles. Through qualitative analysis, we unveil the motivations shaping system and business-level interoperability alignment. We found that three categories of sustainability metrics—socio-economic, socio-ecological, and eco-efficiency— are driven by diverse pragmatic views. Furthermore, we found that system-level alignment is driven by actors’ defensive strategy for compliance and standardization, while business level interoperability is underpinned by actors’ offensive strategy for social and economic innovation. The study introduces a 2 × 2 alignment framework—corporate citizenship, regulatory stewardship, corporate stewardship, and value chain stewardship—offering nuanced insights. By aligning systems and business motives for pragmatic interoperability, we contribute towards theory building on interoperability and provide practical implications for guiding stakeholder alignment in Industry 4.0 initiatives.

{"title":"Pragmatic Interoperability for Human–Machine Value Creation in Agri-Food Supply Chains","authors":"Raymond Obayi, Sonal Choudhary, Rakesh Nayak, Ramanjaneyulu GV","doi":"10.1007/s10796-024-10567-x","DOIUrl":"https://doi.org/10.1007/s10796-024-10567-x","url":null,"abstract":"<p>This study delves into the dynamics of pragmatic interoperability, focusing on the case of a digital ecosystem in India —the eKrishi platform—which combines of industry 4.0 technologies with human-centric principles. Through qualitative analysis, we unveil the motivations shaping system and business-level interoperability alignment. We found that three categories of sustainability metrics—socio-economic, socio-ecological, and eco-efficiency— are driven by diverse pragmatic views. Furthermore, we found that system-level alignment is driven by actors’ defensive strategy for compliance and standardization, while business level interoperability is underpinned by actors’ offensive strategy for social and economic innovation. The study introduces a 2 × 2 alignment framework—corporate citizenship, regulatory stewardship, corporate stewardship, and value chain stewardship—offering nuanced insights. By aligning systems and business motives for pragmatic interoperability, we contribute towards theory building on interoperability and provide practical implications for guiding stakeholder alignment in Industry 4.0 initiatives.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"10 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143375470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence in the Age of Uncertainty 不确定时代的人工智能
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-05 DOI: 10.1007/s10796-024-10574-y
A. Michael Spence, Anurag Behar, Arjun Jayadev
{"title":"Artificial Intelligence in the Age of Uncertainty","authors":"A. Michael Spence, Anurag Behar, Arjun Jayadev","doi":"10.1007/s10796-024-10574-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10574-y","url":null,"abstract":"","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"14 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143125075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does Culture Affect Post-Adoption Privacy Concerns of Mobile Cloud Computing App Users? Insights from the US, the UK, and India
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-05 DOI: 10.1007/s10796-025-10579-1
Hamid Reza Nikkhah, Frederic Schlackl, Rajiv Sabherwal

Mobile cloud computing apps have become the dominant type of mobile app, providing users with many benefits but also causing privacy concerns related to data being uploaded to the cloud. Since many mobile cloud computing apps have billions of current users around the world, the role of culture in privacy after adoption is pertinent to researchers, users, and developers. This study investigates how culture affects privacy considerations of mobile cloud app users in the post-adoption phase and how it shapes their response to developers’ institutional privacy assurances such as privacy policies and ISO 27018 certification. Based on surveys of current mobile cloud computing app users across three countries: the US (n = 1,045), the UK (n = 183), and India (n = 1,189), we find that users from different cultures differ in their considerations of privacy and in perceptions of institutional privacy assurance. The results show that cultural dimensions moderate the effects of value and risk of transferring to the cloud on continued use. We also find counterintuitive results for the direction in which uncertainty avoidance and power distance shape users’ reactions to institutional privacy assurances. Our findings suggest that MCC app developers need to be consider users’ cultures when designing and communicating their institutional privacy assurances.

移动云计算应用程序已成为移动应用程序的主流类型,在为用户带来诸多好处的同时,也引发了与上传到云端的数据有关的隐私问题。由于许多移动云计算应用程序目前在全球拥有数十亿用户,因此文化在采用后对隐私的影响与研究人员、用户和开发人员息息相关。本研究调查了文化如何影响移动云计算应用程序用户在采用后阶段的隐私考虑,以及文化如何影响他们对开发商隐私政策和 ISO 27018 认证等机构隐私保证的反应。基于对三个国家(美国(n = 1,045)、英国(n = 183)和印度(n = 1,189))当前移动云计算应用程序用户的调查,我们发现来自不同文化背景的用户对隐私的考虑和对机构隐私保证的看法各不相同。结果表明,文化因素会缓和向云转移的价值和风险对持续使用的影响。我们还发现,不确定性规避和权力距离对用户对机构隐私保证的反应具有反直觉影响。我们的研究结果表明,MCC 应用程序开发人员在设计和传达机构隐私保证时需要考虑用户的文化。
{"title":"Does Culture Affect Post-Adoption Privacy Concerns of Mobile Cloud Computing App Users? Insights from the US, the UK, and India","authors":"Hamid Reza Nikkhah, Frederic Schlackl, Rajiv Sabherwal","doi":"10.1007/s10796-025-10579-1","DOIUrl":"https://doi.org/10.1007/s10796-025-10579-1","url":null,"abstract":"<p>Mobile cloud computing apps have become the dominant type of mobile app, providing users with many benefits but also causing privacy concerns related to data being uploaded to the cloud. Since many mobile cloud computing apps have billions of current users around the world, the role of culture in privacy after adoption is pertinent to researchers, users, and developers. This study investigates how culture affects privacy considerations of mobile cloud app users in the post-adoption phase and how it shapes their response to developers’ institutional privacy assurances such as privacy policies and ISO 27018 certification. Based on surveys of current mobile cloud computing app users across three countries: the US (<i>n</i> = 1,045), the UK (<i>n</i> = 183), and India (<i>n</i> = 1,189), we find that users from different cultures differ in their considerations of privacy and in perceptions of institutional privacy assurance. The results show that cultural dimensions moderate the effects of value and risk of transferring to the cloud on continued use. We also find counterintuitive results for the direction in which uncertainty avoidance and power distance shape users’ reactions to institutional privacy assurances. Our findings suggest that MCC app developers need to be consider users’ cultures when designing and communicating their institutional privacy assurances.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"20 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143191867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Decision Support Systems: An Analysis of the Literature and a Framework for Development
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-02-03 DOI: 10.1007/s10796-024-10571-1
Gerald Onwujekwe, Heinz Roland Weistroffer

The spread and impact of decision support systems (DSS) have continued to gain intensity with applications in medical diagnosis, control systems, air traffic control, security systems and executive dashboards that help in strategic decision-making. As the field of machine learning (ML) continues to develop, DSS researchers have been incorporating ML techniques into DSS artifacts and this trend is growing. Though researchers have been talking about intelligent decision support systems for about three decades now, there has not been any recent attempt to provide a comprehensive framework to guide researchers and developers in creating DSS that use machine learning techniques. In this paper we examine the progress that has been made in applying ML techniques for developing DSS, based on a literature analysis of 2093 journal papers published from 2014 – 2024, and propose a framework for future development of intelligent DSS.

{"title":"Intelligent Decision Support Systems: An Analysis of the Literature and a Framework for Development","authors":"Gerald Onwujekwe, Heinz Roland Weistroffer","doi":"10.1007/s10796-024-10571-1","DOIUrl":"https://doi.org/10.1007/s10796-024-10571-1","url":null,"abstract":"<p>The spread and impact of decision support systems (DSS) have continued to gain intensity with applications in medical diagnosis, control systems, air traffic control, security systems and executive dashboards that help in strategic decision-making. As the field of machine learning (ML) continues to develop, DSS researchers have been incorporating ML techniques into DSS artifacts and this trend is growing. Though researchers have been talking about intelligent decision support systems for about three decades now, there has not been any recent attempt to provide a comprehensive framework to guide researchers and developers in creating DSS that use machine learning techniques. In this paper we examine the progress that has been made in applying ML techniques for developing DSS, based on a literature analysis of 2093 journal papers published from 2014 – 2024, and propose a framework for future development of intelligent DSS.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"131 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143077559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
eXtended Reality and Artificial Intelligence in Medicine and Rehabilitation
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-01-29 DOI: 10.1007/s10796-025-10580-8
Tomas Krilavičius, Lucio Tommaso De Paolis, Valerio De Luca, Josef Spjut

This special issue focuses on the application of eXtended Reality (XR) technologies—comprising Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR)—and Artificial Intelligence (AI) in the fields of medicine and rehabilitation. AR provides support in minimally invasive surgery, where it visualises internal anatomical structures on the patient’s body and provides real-time feedback to improve accuracy, keep the surgeon’s attention and reduce the risk of errors. Furthermore, XR technologies can be used to develop applications for pre-operative planning or for training surgeons through serious games. AI finds applications both in medical image processing, for the recognition of anatomical structures and the reconstruction of 3D models, and in the analysis of biological data for patient monitoring and disease diagnosis. In rehabilitation, XR and AI can enable personalised therapy plans, increase patient engagement through immersive environments and provide real-time feedback to improve recovery outcomes. The papers in this special issue deal with rehabilitation through serious games, AI-enhanced XR applications for healthcare, digital twins and the analysis of bio/neuro-adaptive signals.

本特刊重点关注扩展现实(XR)技术(包括虚拟现实(VR)、增强现实(AR)和混合现实(MR))以及人工智能(AI)在医疗和康复领域的应用。增强现实技术为微创手术提供支持,它可以将病人身体内部的解剖结构可视化,并提供实时反馈,以提高准确性,保持外科医生的注意力,降低出错风险。此外,XR 技术还可用于开发术前规划应用程序,或通过严肃游戏培训外科医生。人工智能既可应用于医学图像处理,用于识别解剖结构和重建三维模型,也可应用于生物数据分析,用于病人监测和疾病诊断。在康复领域,XR 和人工智能可实现个性化治疗计划,通过身临其境的环境提高患者的参与度,并提供实时反馈以改善康复效果。本特刊的论文涉及通过严肃游戏进行康复、医疗保健领域的人工智能增强型 XR 应用、数字双胞胎以及生物/神经适应信号分析。
{"title":"eXtended Reality and Artificial Intelligence in Medicine and Rehabilitation","authors":"Tomas Krilavičius, Lucio Tommaso De Paolis, Valerio De Luca, Josef Spjut","doi":"10.1007/s10796-025-10580-8","DOIUrl":"https://doi.org/10.1007/s10796-025-10580-8","url":null,"abstract":"<p>This special issue focuses on the application of eXtended Reality (XR) technologies—comprising Virtual Reality (VR), Augmented Reality (AR), and Mixed Reality (MR)—and Artificial Intelligence (AI) in the fields of medicine and rehabilitation. AR provides support in minimally invasive surgery, where it visualises internal anatomical structures on the patient’s body and provides real-time feedback to improve accuracy, keep the surgeon’s attention and reduce the risk of errors. Furthermore, XR technologies can be used to develop applications for pre-operative planning or for training surgeons through serious games. AI finds applications both in medical image processing, for the recognition of anatomical structures and the reconstruction of 3D models, and in the analysis of biological data for patient monitoring and disease diagnosis. In rehabilitation, XR and AI can enable personalised therapy plans, increase patient engagement through immersive environments and provide real-time feedback to improve recovery outcomes. The papers in this special issue deal with rehabilitation through serious games, AI-enhanced XR applications for healthcare, digital twins and the analysis of bio/neuro-adaptive signals.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"24 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143055113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1