Pub Date : 2024-09-12DOI: 10.1007/s10796-024-10527-5
Francesca Angelone, Federica Kiyomi Ciliberti, Giovanni Paolo Tobia, Halldór Jónsson, Alfonso Maria Ponsiglione, Magnus Kjartan Gislason, Francesco Tortorella, Francesco Amato, Paolo Gargiulo
Osteoarthritis (OA) is a common joint disease affecting people worldwide, notably impacting quality of life due to joint pain and functional limitations. This study explores the potential of radiomics — quantitative image analysis combined with machine learning — to enhance knee OA diagnosis. Using a multimodal dataset of MRI and CT scans from 138 knees, radiomic features were extracted from cartilage segments. Machine learning algorithms were employed to classify degenerated and healthy knees based on radiomic features. Feature selection, guided by correlation and importance analyses, revealed texture and shape-related features as key predictors. Robustness analysis, assessing feature stability across segmentation variations, further refined feature selection. Results demonstrate high accuracy in knee OA classification using radiomics, showcasing its potential for early disease detection and personalized treatment approaches. This work contributes to advancing OA assessment and is part of the European SINPAIN project aimed at developing new OA therapies.
骨关节炎(OA)是一种常见的关节疾病,影响着全世界的人们,关节疼痛和功能受限严重影响了人们的生活质量。这项研究探索了放射组学(定量图像分析与机器学习相结合)在增强膝关节OA诊断方面的潜力。利用 138 个膝关节的核磁共振成像和 CT 扫描的多模态数据集,从软骨片段中提取了放射组学特征。采用机器学习算法,根据放射学特征对退化膝关节和健康膝关节进行分类。在相关性和重要性分析的指导下进行特征选择,发现纹理和形状相关特征是关键的预测因素。稳健性分析评估了特征在分割变化中的稳定性,进一步完善了特征选择。结果表明,利用放射组学对膝关节 OA 进行分类的准确率很高,展示了其在早期疾病检测和个性化治疗方法方面的潜力。这项工作有助于推进OA评估,也是旨在开发OA新疗法的欧洲SINPAIN项目的一部分。
{"title":"Innovative Diagnostic Approaches for Predicting Knee Cartilage Degeneration in Osteoarthritis Patients: A Radiomics-Based Study","authors":"Francesca Angelone, Federica Kiyomi Ciliberti, Giovanni Paolo Tobia, Halldór Jónsson, Alfonso Maria Ponsiglione, Magnus Kjartan Gislason, Francesco Tortorella, Francesco Amato, Paolo Gargiulo","doi":"10.1007/s10796-024-10527-5","DOIUrl":"https://doi.org/10.1007/s10796-024-10527-5","url":null,"abstract":"<p>Osteoarthritis (OA) is a common joint disease affecting people worldwide, notably impacting quality of life due to joint pain and functional limitations. This study explores the potential of radiomics — quantitative image analysis combined with machine learning — to enhance knee OA diagnosis. Using a multimodal dataset of MRI and CT scans from 138 knees, radiomic features were extracted from cartilage segments. Machine learning algorithms were employed to classify degenerated and healthy knees based on radiomic features. Feature selection, guided by correlation and importance analyses, revealed texture and shape-related features as key predictors. Robustness analysis, assessing feature stability across segmentation variations, further refined feature selection. Results demonstrate high accuracy in knee OA classification using radiomics, showcasing its potential for early disease detection and personalized treatment approaches. This work contributes to advancing OA assessment and is part of the European SINPAIN project aimed at developing new OA therapies.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"52 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142170506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1007/s10796-024-10536-4
Giulia Pellegrino, Massimiliano Gervasi, Mario Angelelli, Angelo Corallo
Digital Twin (DT) technology monitors, simulates, optimizes, models, and predicts the behavior of physical entities. Healthcare is a significant domain where a DT can be functional for multiple purposes. However, these diverse uses of DTs need a clear understanding of both general and specific aspects that can affect their adoption and integration. This paper is a meta-review that leads to the development of a conceptual framework designed to support the high-level evaluation of DTs in healthcare. Using the PRISMA methodology, the meta-review synthesizes insights from 20 selected reviews out of 1,075 studies. Based on this comprehensive analysis, we extract the functional, technological, and operational aspects that characterize DTs in healthcare. Additionally, we examine the structural (e.g., hierarchical) relationships among these aspects to address the various complexity scales in digital health. The resulting framework can promote the effective design and implementation of DTs, offering a structured approach for their assessment.
{"title":"A Conceptual Framework for Digital Twin in Healthcare: Evidence from a Systematic Meta-Review","authors":"Giulia Pellegrino, Massimiliano Gervasi, Mario Angelelli, Angelo Corallo","doi":"10.1007/s10796-024-10536-4","DOIUrl":"https://doi.org/10.1007/s10796-024-10536-4","url":null,"abstract":"<p>Digital Twin (DT) technology monitors, simulates, optimizes, models, and predicts the behavior of physical entities. Healthcare is a significant domain where a DT can be functional for multiple purposes. However, these diverse uses of DTs need a clear understanding of both general and specific aspects that can affect their adoption and integration. This paper is a meta-review that leads to the development of a conceptual framework designed to support the high-level evaluation of DTs in healthcare. Using the PRISMA methodology, the meta-review synthesizes insights from 20 selected reviews out of 1,075 studies. Based on this comprehensive analysis, we extract the functional, technological, and operational aspects that characterize DTs in healthcare. Additionally, we examine the structural (e.g., hierarchical) relationships among these aspects to address the various complexity scales in digital health. The resulting framework can promote the effective design and implementation of DTs, offering a structured approach for their assessment.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"49 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142170507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-07DOI: 10.1007/s10796-024-10532-8
Mousa Albashrawi, Amir Zaib Abbasi, Lin Li, Umair Rehman
Blockchain has become a promising technology with huge benefits; nevertheless, its adoption intention has been scarce across different organizations, especially in government-to-citizens service (e.g., blockchain-based e-voting). Therefore, we aim to investigate how blockchain can affect citizens' adoption intention to use blockchain-based e-voting service. We study blockchain adoption intention by employing UTAUT2 as a theoretical base and the Replacement-Amplification-Transformation (R.A.T) technology integration model to study digital literacy as a mediating mechanism in our study model due to its significance in the contemporary business world. On the method side, we obtained 315 valid responses that we utilized to conduct a PLS-SEM-based analysis. Our findings state that digital literacy positively mediates the relationship between five determinants of UTAUT2 (e.g., facilitating conditions, social influence, hedonic motivation, habit, and price value) and citizens' intention to adopt blockchain e-voting service for casting their votes in elections. This study is among the first to examine the mediating mechanism of digital literacy between UTAUT2 factors and citizens' intention to adopt blockchain e-voting service. It is also worthwhile to quote that our study is a pioneer in extending the UTAUT2 model in the context of blockchain e-voting service. Lastly, we communicate the study's theoretical and practical implications to enrich both knowledge and industry.
{"title":"Adoption of Blockchain E-Voting Service: Digital Literacy as a Mediating Mechanism","authors":"Mousa Albashrawi, Amir Zaib Abbasi, Lin Li, Umair Rehman","doi":"10.1007/s10796-024-10532-8","DOIUrl":"https://doi.org/10.1007/s10796-024-10532-8","url":null,"abstract":"<p>Blockchain has become a promising technology with huge benefits; nevertheless, its adoption intention has been scarce across different organizations, especially in government-to-citizens service (e.g., blockchain-based e-voting). Therefore, we aim to investigate how blockchain can affect citizens' adoption intention to use blockchain-based e-voting service. We study blockchain adoption intention by employing UTAUT2 as a theoretical base and the Replacement-Amplification-Transformation (R.A.T) technology integration model to study digital literacy as a mediating mechanism in our study model due to its significance in the contemporary business world. On the method side, we obtained 315 valid responses that we utilized to conduct a PLS-SEM-based analysis. Our findings state that digital literacy positively mediates the relationship between five determinants of UTAUT2 (e.g., facilitating conditions, social influence, hedonic motivation, habit, and price value) and citizens' intention to adopt blockchain e-voting service for casting their votes in elections. This study is among the first to examine the mediating mechanism of digital literacy between UTAUT2 factors and citizens' intention to adopt blockchain e-voting service. It is also worthwhile to quote that our study is a pioneer in extending the UTAUT2 model in the context of blockchain e-voting service. Lastly, we communicate the study's theoretical and practical implications to enrich both knowledge and industry.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142144332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-07DOI: 10.1007/s10796-024-10530-w
Yuanyuan Gao, Anqi Xu, Paul Jen-Hwa Hu
Accurate estimates of medication rankings and volumes can benefit patients, physicians, online health communities, pharmaceutical companies, and the healthcare industry at large. This study analyzes patient-generated content in online health communities to discover important medication transition and combination patterns for better ranking and volume predictions. The current research takes a data-driven analytics approach to identify medication information from patient posts and classify different types of medication relations. The identified relation patterns then are represented in a medication relation network with an adjusted transition model for ranking and volume estimates. Evaluation results of real-world patient posts show the proposed method is more effective for predicting medication rankings than existing network-based measures. Moreover, a regression-based model, informed by the proposed method’s network-based outcomes, attains promising accuracy in estimating medication volumes, as revealed by the relatively low mean squared errors. Overall, the proposed method is capable of identifying important features for increased predictive power, as manifested by ({text{R}}^{2}) and adjusted ({text{R}}^{2}) values. It has the potential for better medication ranking and volume predictions, and offers insights for decision making by different stakeholders. This method is generalizable and can be applied in important prediction tasks in healthcare and other domains.
{"title":"Mining Patient-Generated Content for Medication Relations and Transition Network to Predict the Rankings and Volumes of Different Medications","authors":"Yuanyuan Gao, Anqi Xu, Paul Jen-Hwa Hu","doi":"10.1007/s10796-024-10530-w","DOIUrl":"https://doi.org/10.1007/s10796-024-10530-w","url":null,"abstract":"<p>Accurate estimates of medication rankings and volumes can benefit patients, physicians, online health communities, pharmaceutical companies, and the healthcare industry at large. This study analyzes patient-generated content in online health communities to discover important medication transition and combination patterns for better ranking and volume predictions. The current research takes a data-driven analytics approach to identify medication information from patient posts and classify different types of medication relations. The identified relation patterns then are represented in a medication relation network with an adjusted transition model for ranking and volume estimates. Evaluation results of real-world patient posts show the proposed method is more effective for predicting medication rankings than existing network-based measures. Moreover, a regression-based model, informed by the proposed method’s network-based outcomes, attains promising accuracy in estimating medication volumes, as revealed by the relatively low mean squared errors. Overall, the proposed method is capable of identifying important features for increased predictive power, as manifested by <span>({text{R}}^{2})</span> and adjusted <span>({text{R}}^{2})</span> values. It has the potential for better medication ranking and volume predictions, and offers insights for decision making by different stakeholders. This method is generalizable and can be applied in important prediction tasks in healthcare and other domains.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"71 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142144253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1007/s10796-024-10534-6
So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee
As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively.
随着对无线网络的干扰攻击日益频繁,传统的本地干扰检测方法已无法应对高级干扰攻击。为了最大限度地提高基于机器学习(ML)的检测方法的干扰检测性能,有必要建立一个能反映每个本地节点的本地检测结果的全局模型。本研究提出了一种基于 ML 的合作聚类(MLCC)技术,旨在利用智能中继器在超 5G 网络中有效检测和反击干扰。MLCC 算法根据每个本地节点确定的干扰检测结果,创建并更新全局 ML 模型,从而优化检测率。通过智能中继器和接入点之间的负载平衡优化网络性能,并选择最佳路径以避开干扰器。实验结果表明,MLCC 可将检测率和吞吐量分别提高 5.21% 和 26.35%,同时将能耗和延迟分别降低 76.68% 和 7.14%。
{"title":"Machine Learning-Based Cooperative Clustering for Detecting and Mitigating Jamming Attacks in beyond 5G Networks","authors":"So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee","doi":"10.1007/s10796-024-10534-6","DOIUrl":"https://doi.org/10.1007/s10796-024-10534-6","url":null,"abstract":"<p>As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"35 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142142472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-03DOI: 10.1007/s10796-024-10529-3
Fouad Zablith
Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience.
{"title":"Leveraging Action Knowledge from Product Reviews to Enhance Human-Centered Recommender Systems: A Knowledge Graph-Based Framework","authors":"Fouad Zablith","doi":"10.1007/s10796-024-10529-3","DOIUrl":"https://doi.org/10.1007/s10796-024-10529-3","url":null,"abstract":"<p>Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"571 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-30DOI: 10.1007/s10796-024-10531-9
Lu Yu, Li He, Jian Du, Xiaobo Wu
Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.
{"title":"Protection or Cynicism? Dual Strategies for Coping with Privacy Threats","authors":"Lu Yu, Li He, Jian Du, Xiaobo Wu","doi":"10.1007/s10796-024-10531-9","DOIUrl":"https://doi.org/10.1007/s10796-024-10531-9","url":null,"abstract":"<p>Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"7 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142101414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-29DOI: 10.1007/s10796-024-10533-7
Riyaz Sikora, Yoon Sang Lee
Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall.
{"title":"Class Imbalance Problem: A Wrapper-Based Approach using Under-Sampling with Ensemble Learning","authors":"Riyaz Sikora, Yoon Sang Lee","doi":"10.1007/s10796-024-10533-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10533-7","url":null,"abstract":"<p>Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-23DOI: 10.1007/s10796-024-10528-4
Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry
The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of AI through a maturity lens. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value.
{"title":"Understanding Artificial Intelligence Diffusion through an AI Capability Maturity Model","authors":"Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry","doi":"10.1007/s10796-024-10528-4","DOIUrl":"https://doi.org/10.1007/s10796-024-10528-4","url":null,"abstract":"<p>The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of <i>AI through a maturity lens</i>. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"42 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142042704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-22DOI: 10.1007/s10796-024-10511-z
Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir
In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.
{"title":"When Your Thing Won’t Behave: Security Governance in the Internet of Things","authors":"Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir","doi":"10.1007/s10796-024-10511-z","DOIUrl":"https://doi.org/10.1007/s10796-024-10511-z","url":null,"abstract":"<p>In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142022250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}