首页 > 最新文献

Information Systems Frontiers最新文献

英文 中文
Innovative Diagnostic Approaches for Predicting Knee Cartilage Degeneration in Osteoarthritis Patients: A Radiomics-Based Study 预测骨关节炎患者膝关节软骨退化的创新诊断方法:基于放射组学的研究
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1007/s10796-024-10527-5
Francesca Angelone, Federica Kiyomi Ciliberti, Giovanni Paolo Tobia, Halldór Jónsson, Alfonso Maria Ponsiglione, Magnus Kjartan Gislason, Francesco Tortorella, Francesco Amato, Paolo Gargiulo

Osteoarthritis (OA) is a common joint disease affecting people worldwide, notably impacting quality of life due to joint pain and functional limitations. This study explores the potential of radiomics — quantitative image analysis combined with machine learning — to enhance knee OA diagnosis. Using a multimodal dataset of MRI and CT scans from 138 knees, radiomic features were extracted from cartilage segments. Machine learning algorithms were employed to classify degenerated and healthy knees based on radiomic features. Feature selection, guided by correlation and importance analyses, revealed texture and shape-related features as key predictors. Robustness analysis, assessing feature stability across segmentation variations, further refined feature selection. Results demonstrate high accuracy in knee OA classification using radiomics, showcasing its potential for early disease detection and personalized treatment approaches. This work contributes to advancing OA assessment and is part of the European SINPAIN project aimed at developing new OA therapies.

骨关节炎(OA)是一种常见的关节疾病,影响着全世界的人们,关节疼痛和功能受限严重影响了人们的生活质量。这项研究探索了放射组学(定量图像分析与机器学习相结合)在增强膝关节OA诊断方面的潜力。利用 138 个膝关节的核磁共振成像和 CT 扫描的多模态数据集,从软骨片段中提取了放射组学特征。采用机器学习算法,根据放射学特征对退化膝关节和健康膝关节进行分类。在相关性和重要性分析的指导下进行特征选择,发现纹理和形状相关特征是关键的预测因素。稳健性分析评估了特征在分割变化中的稳定性,进一步完善了特征选择。结果表明,利用放射组学对膝关节 OA 进行分类的准确率很高,展示了其在早期疾病检测和个性化治疗方法方面的潜力。这项工作有助于推进OA评估,也是旨在开发OA新疗法的欧洲SINPAIN项目的一部分。
{"title":"Innovative Diagnostic Approaches for Predicting Knee Cartilage Degeneration in Osteoarthritis Patients: A Radiomics-Based Study","authors":"Francesca Angelone, Federica Kiyomi Ciliberti, Giovanni Paolo Tobia, Halldór Jónsson, Alfonso Maria Ponsiglione, Magnus Kjartan Gislason, Francesco Tortorella, Francesco Amato, Paolo Gargiulo","doi":"10.1007/s10796-024-10527-5","DOIUrl":"https://doi.org/10.1007/s10796-024-10527-5","url":null,"abstract":"<p>Osteoarthritis (OA) is a common joint disease affecting people worldwide, notably impacting quality of life due to joint pain and functional limitations. This study explores the potential of radiomics — quantitative image analysis combined with machine learning — to enhance knee OA diagnosis. Using a multimodal dataset of MRI and CT scans from 138 knees, radiomic features were extracted from cartilage segments. Machine learning algorithms were employed to classify degenerated and healthy knees based on radiomic features. Feature selection, guided by correlation and importance analyses, revealed texture and shape-related features as key predictors. Robustness analysis, assessing feature stability across segmentation variations, further refined feature selection. Results demonstrate high accuracy in knee OA classification using radiomics, showcasing its potential for early disease detection and personalized treatment approaches. This work contributes to advancing OA assessment and is part of the European SINPAIN project aimed at developing new OA therapies.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"52 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142170506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Framework for Digital Twin in Healthcare: Evidence from a Systematic Meta-Review 医疗保健领域数字双胞胎的概念框架:来自系统性元综述的证据
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-12 DOI: 10.1007/s10796-024-10536-4
Giulia Pellegrino, Massimiliano Gervasi, Mario Angelelli, Angelo Corallo

Digital Twin (DT) technology monitors, simulates, optimizes, models, and predicts the behavior of physical entities. Healthcare is a significant domain where a DT can be functional for multiple purposes. However, these diverse uses of DTs need a clear understanding of both general and specific aspects that can affect their adoption and integration. This paper is a meta-review that leads to the development of a conceptual framework designed to support the high-level evaluation of DTs in healthcare. Using the PRISMA methodology, the meta-review synthesizes insights from 20 selected reviews out of 1,075 studies. Based on this comprehensive analysis, we extract the functional, technological, and operational aspects that characterize DTs in healthcare. Additionally, we examine the structural (e.g., hierarchical) relationships among these aspects to address the various complexity scales in digital health. The resulting framework can promote the effective design and implementation of DTs, offering a structured approach for their assessment.

数字孪生(DT)技术可对物理实体的行为进行监控、模拟、优化、建模和预测。医疗保健是数字孪生技术可用于多种目的的重要领域。然而,DT 的这些不同用途需要清楚地了解可能影响其采用和集成的一般和具体方面。本文是一篇荟萃综述,旨在开发一个概念框架,支持对医疗保健领域的 DT 进行高层次评估。元综述采用 PRISMA 方法,从 1,075 项研究中精选出 20 项综述进行综合分析。在此综合分析的基础上,我们提取了医疗保健领域 DT 的功能、技术和操作方面的特征。此外,我们还研究了这些方面之间的结构关系(如层次关系),以应对数字医疗中的各种复杂性尺度。由此产生的框架可以促进数字技术的有效设计和实施,并为其评估提供结构化方法。
{"title":"A Conceptual Framework for Digital Twin in Healthcare: Evidence from a Systematic Meta-Review","authors":"Giulia Pellegrino, Massimiliano Gervasi, Mario Angelelli, Angelo Corallo","doi":"10.1007/s10796-024-10536-4","DOIUrl":"https://doi.org/10.1007/s10796-024-10536-4","url":null,"abstract":"<p>Digital Twin (DT) technology monitors, simulates, optimizes, models, and predicts the behavior of physical entities. Healthcare is a significant domain where a DT can be functional for multiple purposes. However, these diverse uses of DTs need a clear understanding of both general and specific aspects that can affect their adoption and integration. This paper is a meta-review that leads to the development of a conceptual framework designed to support the high-level evaluation of DTs in healthcare. Using the PRISMA methodology, the meta-review synthesizes insights from 20 selected reviews out of 1,075 studies. Based on this comprehensive analysis, we extract the functional, technological, and operational aspects that characterize DTs in healthcare. Additionally, we examine the structural (e.g., hierarchical) relationships among these aspects to address the various complexity scales in digital health. The resulting framework can promote the effective design and implementation of DTs, offering a structured approach for their assessment.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"49 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142170507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adoption of Blockchain E-Voting Service: Digital Literacy as a Mediating Mechanism 区块链电子投票服务的采用:作为中介机制的数字素养
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1007/s10796-024-10532-8
Mousa Albashrawi, Amir Zaib Abbasi, Lin Li, Umair Rehman

Blockchain has become a promising technology with huge benefits; nevertheless, its adoption intention has been scarce across different organizations, especially in government-to-citizens service (e.g., blockchain-based e-voting). Therefore, we aim to investigate how blockchain can affect citizens' adoption intention to use blockchain-based e-voting service. We study blockchain adoption intention by employing UTAUT2 as a theoretical base and the Replacement-Amplification-Transformation (R.A.T) technology integration model to study digital literacy as a mediating mechanism in our study model due to its significance in the contemporary business world. On the method side, we obtained 315 valid responses that we utilized to conduct a PLS-SEM-based analysis. Our findings state that digital literacy positively mediates the relationship between five determinants of UTAUT2 (e.g., facilitating conditions, social influence, hedonic motivation, habit, and price value) and citizens' intention to adopt blockchain e-voting service for casting their votes in elections. This study is among the first to examine the mediating mechanism of digital literacy between UTAUT2 factors and citizens' intention to adopt blockchain e-voting service. It is also worthwhile to quote that our study is a pioneer in extending the UTAUT2 model in the context of blockchain e-voting service. Lastly, we communicate the study's theoretical and practical implications to enrich both knowledge and industry.

区块链已成为一项前景广阔、益处巨大的技术;然而,在不同组织中,尤其是在政府对公民的服务(如基于区块链的电子投票)中,区块链的采用意向却很少。因此,我们旨在研究区块链如何影响公民采用基于区块链的电子投票服务的意愿。我们以UTAUT2为理论基础研究区块链的采用意向,并采用替代-简化-转换(R.A.T)技术整合模型研究数字素养,由于数字素养在当代商业世界中的重要性,数字素养成为我们研究模型中的中介机制。在方法方面,我们获得了 315 份有效答卷,并利用这些答卷进行了基于 PLS-SEM 的分析。我们的研究结果表明,数字素养对UTAUT2的五个决定因素(如便利条件、社会影响、享乐动机、习惯和价格价值)与公民采用区块链电子投票服务在选举中投票的意向之间的关系起到了积极的中介作用。本研究首次考察了数字素养在UTAUT2因素与公民采用区块链电子投票服务意向之间的中介机制。值得指出的是,我们的研究是将UTAUT2 模型扩展到区块链电子投票服务的先驱。最后,我们交流了研究的理论和实践意义,以丰富知识和产业。
{"title":"Adoption of Blockchain E-Voting Service: Digital Literacy as a Mediating Mechanism","authors":"Mousa Albashrawi, Amir Zaib Abbasi, Lin Li, Umair Rehman","doi":"10.1007/s10796-024-10532-8","DOIUrl":"https://doi.org/10.1007/s10796-024-10532-8","url":null,"abstract":"<p>Blockchain has become a promising technology with huge benefits; nevertheless, its adoption intention has been scarce across different organizations, especially in government-to-citizens service (e.g., blockchain-based e-voting). Therefore, we aim to investigate how blockchain can affect citizens' adoption intention to use blockchain-based e-voting service. We study blockchain adoption intention by employing UTAUT2 as a theoretical base and the Replacement-Amplification-Transformation (R.A.T) technology integration model to study digital literacy as a mediating mechanism in our study model due to its significance in the contemporary business world. On the method side, we obtained 315 valid responses that we utilized to conduct a PLS-SEM-based analysis. Our findings state that digital literacy positively mediates the relationship between five determinants of UTAUT2 (e.g., facilitating conditions, social influence, hedonic motivation, habit, and price value) and citizens' intention to adopt blockchain e-voting service for casting their votes in elections. This study is among the first to examine the mediating mechanism of digital literacy between UTAUT2 factors and citizens' intention to adopt blockchain e-voting service. It is also worthwhile to quote that our study is a pioneer in extending the UTAUT2 model in the context of blockchain e-voting service. Lastly, we communicate the study's theoretical and practical implications to enrich both knowledge and industry.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142144332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Patient-Generated Content for Medication Relations and Transition Network to Predict the Rankings and Volumes of Different Medications 挖掘患者生成内容中的用药关系和过渡网络,预测不同药物的排名和用量
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-07 DOI: 10.1007/s10796-024-10530-w
Yuanyuan Gao, Anqi Xu, Paul Jen-Hwa Hu

Accurate estimates of medication rankings and volumes can benefit patients, physicians, online health communities, pharmaceutical companies, and the healthcare industry at large. This study analyzes patient-generated content in online health communities to discover important medication transition and combination patterns for better ranking and volume predictions. The current research takes a data-driven analytics approach to identify medication information from patient posts and classify different types of medication relations. The identified relation patterns then are represented in a medication relation network with an adjusted transition model for ranking and volume estimates. Evaluation results of real-world patient posts show the proposed method is more effective for predicting medication rankings than existing network-based measures. Moreover, a regression-based model, informed by the proposed method’s network-based outcomes, attains promising accuracy in estimating medication volumes, as revealed by the relatively low mean squared errors. Overall, the proposed method is capable of identifying important features for increased predictive power, as manifested by ({text{R}}^{2}) and adjusted ({text{R}}^{2}) values. It has the potential for better medication ranking and volume predictions, and offers insights for decision making by different stakeholders. This method is generalizable and can be applied in important prediction tasks in healthcare and other domains.

对药物排名和用药量的准确估计可使患者、医生、在线健康社区、制药公司和整个医疗保健行业受益。本研究分析了在线健康社区中患者生成的内容,以发现重要的药物过渡和组合模式,从而更好地预测排名和用药量。目前的研究采用数据驱动分析方法,从患者帖子中识别用药信息,并对不同类型的用药关系进行分类。然后,将识别出的关系模式表示在药物关系网络中,并通过调整过渡模型进行排名和数量估算。对真实世界患者帖子的评估结果表明,与现有的基于网络的方法相比,所提出的方法在预测药物排名方面更为有效。此外,从相对较低的均方误差可以看出,基于回归的模型在估算药物用量方面的准确性也很不错,而该模型则是以建议方法的网络结果为基础的。总体而言,所提出的方法能够识别重要特征以提高预测能力,具体表现为 ({text{R}}^{2})值和调整后的({text{R}}^{2})值。它有可能更好地进行药物排名和数量预测,并为不同利益相关者的决策提供启示。该方法具有通用性,可应用于医疗保健和其他领域的重要预测任务。
{"title":"Mining Patient-Generated Content for Medication Relations and Transition Network to Predict the Rankings and Volumes of Different Medications","authors":"Yuanyuan Gao, Anqi Xu, Paul Jen-Hwa Hu","doi":"10.1007/s10796-024-10530-w","DOIUrl":"https://doi.org/10.1007/s10796-024-10530-w","url":null,"abstract":"<p>Accurate estimates of medication rankings and volumes can benefit patients, physicians, online health communities, pharmaceutical companies, and the healthcare industry at large. This study analyzes patient-generated content in online health communities to discover important medication transition and combination patterns for better ranking and volume predictions. The current research takes a data-driven analytics approach to identify medication information from patient posts and classify different types of medication relations. The identified relation patterns then are represented in a medication relation network with an adjusted transition model for ranking and volume estimates. Evaluation results of real-world patient posts show the proposed method is more effective for predicting medication rankings than existing network-based measures. Moreover, a regression-based model, informed by the proposed method’s network-based outcomes, attains promising accuracy in estimating medication volumes, as revealed by the relatively low mean squared errors. Overall, the proposed method is capable of identifying important features for increased predictive power, as manifested by <span>({text{R}}^{2})</span> and adjusted <span>({text{R}}^{2})</span> values. It has the potential for better medication ranking and volume predictions, and offers insights for decision making by different stakeholders. This method is generalizable and can be applied in important prediction tasks in healthcare and other domains.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"71 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142144253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning-Based Cooperative Clustering for Detecting and Mitigating Jamming Attacks in beyond 5G Networks 基于机器学习的合作聚类用于检测和缓解超 5G 网络中的干扰攻击
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-06 DOI: 10.1007/s10796-024-10534-6
So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee

As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively.

随着对无线网络的干扰攻击日益频繁,传统的本地干扰检测方法已无法应对高级干扰攻击。为了最大限度地提高基于机器学习(ML)的检测方法的干扰检测性能,有必要建立一个能反映每个本地节点的本地检测结果的全局模型。本研究提出了一种基于 ML 的合作聚类(MLCC)技术,旨在利用智能中继器在超 5G 网络中有效检测和反击干扰。MLCC 算法根据每个本地节点确定的干扰检测结果,创建并更新全局 ML 模型,从而优化检测率。通过智能中继器和接入点之间的负载平衡优化网络性能,并选择最佳路径以避开干扰器。实验结果表明,MLCC 可将检测率和吞吐量分别提高 5.21% 和 26.35%,同时将能耗和延迟分别降低 76.68% 和 7.14%。
{"title":"Machine Learning-Based Cooperative Clustering for Detecting and Mitigating Jamming Attacks in beyond 5G Networks","authors":"So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee","doi":"10.1007/s10796-024-10534-6","DOIUrl":"https://doi.org/10.1007/s10796-024-10534-6","url":null,"abstract":"<p>As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"35 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142142472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Action Knowledge from Product Reviews to Enhance Human-Centered Recommender Systems: A Knowledge Graph-Based Framework 利用产品评论中的行动知识来增强以人为本的推荐系统:基于知识图谱的框架
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-03 DOI: 10.1007/s10796-024-10529-3
Fouad Zablith

Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience.

人们的目标行动被认为是购买决策和以人为本地挖掘人们需求的主要驱动力之一。这些行动通常由买家在产品评论中表达出来。然而,大多数现有的推荐系统方法在推荐过程中仍然缺乏对买家-产品行动的了解。这一局限加大了买家需求与推荐产品之间的差距。本研究提出了一个基于知识图谱的框架,用于表示来自产品评论的买家行动知识,并将其整合到推荐系统中,以提供更以人为本、更可解释的推荐。该框架通过一组原型进行了验证,这些原型证明了买家以行动的形式表达其需求并据此推荐产品的可行性。初步评估显示,系统可用性量表的得分达到了 75%,而基于访谈的反馈则揭示了所建议的方法在支持买家在线产品选择体验方面的能力。
{"title":"Leveraging Action Knowledge from Product Reviews to Enhance Human-Centered Recommender Systems: A Knowledge Graph-Based Framework","authors":"Fouad Zablith","doi":"10.1007/s10796-024-10529-3","DOIUrl":"https://doi.org/10.1007/s10796-024-10529-3","url":null,"abstract":"<p>Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"571 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection or Cynicism? Dual Strategies for Coping with Privacy Threats 保护还是嘲讽?应对隐私威胁的双重策略
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1007/s10796-024-10531-9
Lu Yu, Li He, Jian Du, Xiaobo Wu

Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.

应对隐私威胁和采取适当策略管理个人信息已成为互联网用户面临的重要挑战。有关信息隐私的文献广泛讨论了适应性问题应对(APFC),但对适应性不良情绪应对(MEFC)却知之甚少。本文提出,个人根据其威胁和应对评估,采用隐私保护动机(APFC 的一种形式)和隐私愤世嫉俗(MEFC 的一种形式)。这两种应对策略将影响他们在互联网上披露个人信息的行为。通过对中国 346 个调查样本数据的实证分析,本文揭示了隐私愤世嫉俗(主要受对隐私的深度担忧和高自我效能但低反应效能的影响)和用户保护隐私的动机与实际披露行为之间的不一致性是隐私悖论的原因。本研究为网民信息隐私管理提供了重要的理论支持和实践指导。
{"title":"Protection or Cynicism? Dual Strategies for Coping with Privacy Threats","authors":"Lu Yu, Li He, Jian Du, Xiaobo Wu","doi":"10.1007/s10796-024-10531-9","DOIUrl":"https://doi.org/10.1007/s10796-024-10531-9","url":null,"abstract":"<p>Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"7 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142101414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Class Imbalance Problem: A Wrapper-Based Approach using Under-Sampling with Ensemble Learning 类不平衡问题:基于包围器的方法,利用采样不足与集合学习
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-29 DOI: 10.1007/s10796-024-10533-7
Riyaz Sikora, Yoon Sang Lee

Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall.

不平衡数据集是数据挖掘和商业分析中一个日益严重的问题。然而,在类不平衡的情况下,机器学习算法预测少数类别的能力会下降。虽然文献中已经研究了很多方法来解决不平衡问题,但大多数方法的成功率都很有限。在本研究中,我们提出了三种基于包装方法的方法,这些方法结合使用了欠采样和集合学习,以提高标准数据挖掘算法的性能。我们在从 UCI 数据库收集的 10 个数据集上测试了我们的集合方法,这些数据集的不平衡率至少为 70%。我们将它们的性能与处理不平衡问题的其他两种传统技术进行了比较,结果表明,它们在召回率、AUROC 以及精确度和召回率的平均值方面都有显著提高。
{"title":"Class Imbalance Problem: A Wrapper-Based Approach using Under-Sampling with Ensemble Learning","authors":"Riyaz Sikora, Yoon Sang Lee","doi":"10.1007/s10796-024-10533-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10533-7","url":null,"abstract":"<p>Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Understanding Artificial Intelligence Diffusion through an AI Capability Maturity Model 通过人工智能能力成熟度模型了解人工智能的扩散
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-23 DOI: 10.1007/s10796-024-10528-4
Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry

The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of AI through a maturity lens. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value.

人工智能(AI)领域的最新进展再次引发了人们对组织如何利用这些技术并从中获取价值的兴趣。尽管人工智能被炒得沸沸扬扬,但最近的报告显示,只有极少数组织成功地在其运营中实施了这些技术。虽然许多早期研究和基于咨询的报告都指出了促进采用人工智能的因素,但人们越来越认识到,采用人工智能更像是一个成熟的过程。基于这种更加细致入微的采用方法,本研究通过成熟度视角重点关注人工智能的传播。为了探索这一过程,我们分两个阶段进行了定性案例研究,以探索企业如何在其运营中推广人工智能。在第一阶段,我们对人工智能专家进行了访谈,以深入了解人工智能的普及过程以及企业面临的一些关键挑战。在第二阶段,我们收集了处于人工智能推广不同阶段的三家企业的数据。在对结果进行综合和交叉分析的基础上,我们开发了人工智能扩散能力成熟度模型(AICMM),并对其进行了验证和测试。研究结果表明,人工智能的普及会带来一些常见的挑战,同时也会带来一些缓解挑战的方法。从研究的角度来看,我们的结果表明,有一些核心任务与早期的人工智能普及相关,随着项目成熟度的提高,这些核心任务也会逐渐演变。对于专业人士来说,我们提出了一些工具来识别当前的成熟度,并就如何在运营中进一步实施人工智能技术以产生商业价值提供了一些实用指南。
{"title":"Understanding Artificial Intelligence Diffusion through an AI Capability Maturity Model","authors":"Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry","doi":"10.1007/s10796-024-10528-4","DOIUrl":"https://doi.org/10.1007/s10796-024-10528-4","url":null,"abstract":"<p>The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of <i>AI through a maturity lens</i>. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"42 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142042704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
When Your Thing Won’t Behave: Security Governance in the Internet of Things 当你的东西不听话时:物联网的安全治理
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-22 DOI: 10.1007/s10796-024-10511-z
Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir

In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.

在物联网(IoT)中,相互连接的智能物可以在网络物理系统中实现新的产品和服务。然而,智能物联网不仅从其数字组件中继承了信息技术(IT)安全风险,而且还可能通过使用技术平台(TPs)加剧这些风险。在物联网背景下,技术平台描述的是一种有形(如硬件)或无形(如软件和标准)的通用技术,不同型号的智能物联网共享这种技术。虽然物联网通用技术因其功能和经济效益而发展迅速,但正如最近发生的几起物联网安全事件所表明的那样,这在一定程度上损害了安全性。为了解决这个问题,我们利用汽车行业平台中的一种成熟的风险量化方法,即伯努利混合模型,将情况的动态形式化。我们概述并讨论了相关参数对物联网中使用 TP 的安全风险的影响,即相关性和异质性、脆弱性概率和符合性成本、利用概率和不符合性成本以及 TP 连接性。我们认为,在物联网治理决策中应考虑这些参数,并划定规范性治理影响,确定个人、组织和监管层面的潜在应对措施。
{"title":"When Your Thing Won’t Behave: Security Governance in the Internet of Things","authors":"Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir","doi":"10.1007/s10796-024-10511-z","DOIUrl":"https://doi.org/10.1007/s10796-024-10511-z","url":null,"abstract":"<p>In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142022250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1