首页 > 最新文献

Information Systems Frontiers最新文献

英文 中文
A Parsimonious Tree Augmented Naive Bayes Model for Exploring Colorectal Cancer Survival Factors and Their Conditional Interrelations 用于探索结直肠癌生存因素及其条件相互关系的解析树增强型 Naive Bayes 模型
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-19 DOI: 10.1007/s10796-024-10517-7
Ali Dag, Abdullah Asilkalkan, Osman T. Aydas, Musa Caglar, Serhat Simsek, Dursun Delen

Effective management of colorectal cancer (CRC) necessitates precise prognostication and informed decision-making, yet existing literature often lacks emphasis on parsimonious variable selection and conveying complex interdependencies among factors to medical practitioners. To address this gap, we propose a decision support system integrating Elastic Net (EN) and Simulated Annealing (SA) algorithms for variable selection, followed by Tree Augmented Naive Bayes (TAN) modeling to elucidate conditional relationships. Through k-fold cross-validation, we identify optimal TAN models with varying variable sets and explore interdependency structures. Our approach acknowledges the challenge of conveying intricate relationships among numerous variables to medical practitioners and aims to enhance patient-physician communication. The stage of cancer emerges as a robust predictor, with its significance amplified by the number of metastatic lymph nodes. Moreover, the impact of metastatic lymph nodes on survival prediction varies with the age of diagnosis, with diminished relevance observed in older patients. Age itself emerges as a crucial determinant of survival, yet its effect is modulated by marital status. Leveraging these insights, we develop a web-based tool to facilitate physician–patient communication, mitigate clinical inertia, and enhance decision-making in CRC treatment. This research contributes to a parsimonious model with superior predictive capabilities while uncovering hidden conditional relationships, fostering more meaningful discussions between physicians and patients without compromising patient satisfaction with healthcare provision.

结直肠癌(CRC)的有效治疗需要精确的预后和明智的决策,但现有文献往往缺乏对变量选择的重视,也没有向医疗从业人员传达各因素之间复杂的相互依存关系。为了弥补这一不足,我们提出了一种决策支持系统,该系统集成了弹性网(EN)和模拟退火(SA)算法来选择变量,然后用树增强奈何贝叶(TAN)建模来阐明条件关系。通过 k 倍交叉验证,我们确定了具有不同变量集的最佳 TAN 模型,并探索了相互依存结构。我们的方法认识到了向医疗从业人员传达众多变量之间错综复杂的关系所面临的挑战,旨在加强患者与医生之间的沟通。癌症分期是一个强有力的预测因素,其重要性因转移淋巴结的数量而放大。此外,转移性淋巴结对生存预测的影响随确诊年龄的不同而变化,老年患者的相关性更小。年龄本身是生存率的重要决定因素,但其影响受婚姻状况的调节。利用这些见解,我们开发了一种基于网络的工具,以促进医生与患者之间的交流,缓解临床惰性,并加强对 CRC 治疗的决策。这项研究有助于建立一个具有卓越预测能力的简约模型,同时揭示隐藏的条件关系,促进医生和患者之间进行更有意义的讨论,而不会影响患者对医疗服务的满意度。
{"title":"A Parsimonious Tree Augmented Naive Bayes Model for Exploring Colorectal Cancer Survival Factors and Their Conditional Interrelations","authors":"Ali Dag, Abdullah Asilkalkan, Osman T. Aydas, Musa Caglar, Serhat Simsek, Dursun Delen","doi":"10.1007/s10796-024-10517-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10517-7","url":null,"abstract":"<p>Effective management of colorectal cancer (CRC) necessitates precise prognostication and informed decision-making, yet existing literature often lacks emphasis on parsimonious variable selection and conveying complex interdependencies among factors to medical practitioners. To address this gap, we propose a decision support system integrating Elastic Net (EN) and Simulated Annealing (SA) algorithms for variable selection, followed by Tree Augmented Naive Bayes (TAN) modeling to elucidate conditional relationships. Through k-fold cross-validation, we identify optimal TAN models with varying variable sets and explore interdependency structures. Our approach acknowledges the challenge of conveying intricate relationships among numerous variables to medical practitioners and aims to enhance patient-physician communication. The stage of cancer emerges as a robust predictor, with its significance amplified by the number of metastatic lymph nodes. Moreover, the impact of metastatic lymph nodes on survival prediction varies with the age of diagnosis, with diminished relevance observed in older patients. Age itself emerges as a crucial determinant of survival, yet its effect is modulated by marital status. Leveraging these insights, we develop a web-based tool to facilitate physician–patient communication, mitigate clinical inertia, and enhance decision-making in CRC treatment. This research contributes to a parsimonious model with superior predictive capabilities while uncovering hidden conditional relationships, fostering more meaningful discussions between physicians and patients without compromising patient satisfaction with healthcare provision.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Patient Longitudinal Data for Clinical Decision Support: A Case Study on Emerging AI Healthcare Technologies 为临床决策支持建立患者纵向数据模型:新兴人工智能医疗技术案例研究
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s10796-024-10513-x
Shuai Niu, Jing Ma, Qing Yin, Zhihua Wang, Liang Bai, Xian Yang

The COVID-19 pandemic has highlighted the critical need for advanced technology in healthcare. Clinical Decision Support Systems (CDSS) utilizing Artificial Intelligence (AI) have emerged as one of the most promising technologies for improving patient outcomes. This study’s focus on developing a deep state-space model (DSSM) is of utmost importance, as it addresses the current limitations of AI predictive models in handling high-dimensional and longitudinal electronic health records (EHRs). The DSSM’s ability to capture time-varying information from unstructured medical notes, combined with label-dependent attention for interpretability, will allow for more accurate risk prediction for patients. As we move into a post-COVID-19 era, the importance of CDSS in precision medicine cannot be ignored. This study’s contribution to the development of DSSM for unstructured medical notes has the potential to greatly improve patient care and outcomes in the future.

COVID-19 大流行凸显了医疗保健领域对先进技术的迫切需求。利用人工智能(AI)的临床决策支持系统(CDSS)已成为改善患者预后的最有前途的技术之一。这项研究的重点是开发深度状态空间模型(DSSM),这一点至关重要,因为它解决了目前人工智能预测模型在处理高维和纵向电子健康记录(EHR)方面的局限性。DSSM 能够从非结构化医疗记录中捕捉随时间变化的信息,再加上可解释性的标签依赖性关注,从而能够为患者提供更准确的风险预测。随着我们进入后 COVID-19 时代,CDSS 在精准医疗中的重要性不容忽视。本研究对非结构化医疗笔记 DSSM 的开发所做的贡献有可能在未来极大地改善患者护理和治疗效果。
{"title":"Modelling Patient Longitudinal Data for Clinical Decision Support: A Case Study on Emerging AI Healthcare Technologies","authors":"Shuai Niu, Jing Ma, Qing Yin, Zhihua Wang, Liang Bai, Xian Yang","doi":"10.1007/s10796-024-10513-x","DOIUrl":"https://doi.org/10.1007/s10796-024-10513-x","url":null,"abstract":"<p>The COVID-19 pandemic has highlighted the critical need for advanced technology in healthcare. Clinical Decision Support Systems (CDSS) utilizing Artificial Intelligence (AI) have emerged as one of the most promising technologies for improving patient outcomes. This study’s focus on developing a deep state-space model (DSSM) is of utmost importance, as it addresses the current limitations of AI predictive models in handling high-dimensional and longitudinal electronic health records (EHRs). The DSSM’s ability to capture time-varying information from unstructured medical notes, combined with label-dependent attention for interpretability, will allow for more accurate risk prediction for patients. As we move into a post-COVID-19 era, the importance of CDSS in precision medicine cannot be ignored. This study’s contribution to the development of DSSM for unstructured medical notes has the potential to greatly improve patient care and outcomes in the future.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARTEMIS: a Context-Aware Recommendation System with Crowding Forecaster for the Touristic Domain ARTEMIS:带拥挤预报功能的旅游领域情境感知推荐系统
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-18 DOI: 10.1007/s10796-024-10512-y
Sara Migliorini, Anna Dalla Vecchia, Alberto Belussi, Elisa Quintarelli

Recommendation systems are becoming an invaluable assistant not only for users, who may be disoriented in the presence of a huge number of different alternatives, but also for service providers or sellers, who would like to be able to guide the choice of customers toward particular items with specific characteristics. This influence capability can be particularly useful in the tourism domain, where the need to manage the industry in a more sustainable way and the ability to predict and control the level of crowding of PoIs (Points of Interest) have become more pressing in recent years. In this paper, we study the role of contextual information in determining both PoI occupations and user preferences, and we explore how machine learning and deep learning techniques can help produce good recommendations for users by enriching historical information with its contextual counterpart. As a result, we propose the architecture of ARTEMIS, a context-Aware Recommender sysTEM wIth crowding forecaSting, able to learn and forecast user preferences and occupation levels based on historical contextual features. Throughout the paper, we refer to a real-world application scenario regarding the tourist visits performed in Verona, a municipality in Northern Italy, between 2014 and 2019.

推荐系统正在成为一种无价的助手,它不仅可以帮助用户在面对大量不同选择时迷失方向,还可以帮助服务提供商或销售商引导客户选择具有特定特征的商品。这种影响能力在旅游领域尤为有用,近年来,以更可持续的方式管理旅游业的需求以及预测和控制兴趣点(PoIs)拥挤程度的能力变得更加迫切。在本文中,我们研究了上下文信息在决定 PoI 职业和用户偏好方面的作用,并探讨了机器学习和深度学习技术如何通过丰富历史信息与上下文信息的对应关系来帮助为用户提供良好的推荐。因此,我们提出了 ARTEMIS 的架构,这是一个具有拥挤预测功能的情境感知推荐系统,能够根据历史情境特征学习和预测用户偏好和职业水平。在整篇论文中,我们引用了一个真实世界的应用场景,涉及 2014 年至 2019 年期间在意大利北部维罗纳市进行的游客访问。
{"title":"ARTEMIS: a Context-Aware Recommendation System with Crowding Forecaster for the Touristic Domain","authors":"Sara Migliorini, Anna Dalla Vecchia, Alberto Belussi, Elisa Quintarelli","doi":"10.1007/s10796-024-10512-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10512-y","url":null,"abstract":"<p>Recommendation systems are becoming an invaluable assistant not only for users, who may be disoriented in the presence of a huge number of different alternatives, but also for service providers or sellers, who would like to be able to guide the choice of customers toward particular items with specific characteristics. This influence capability can be particularly useful in the tourism domain, where the need to manage the industry in a more sustainable way and the ability to predict and control the level of crowding of PoIs (Points of Interest) have become more pressing in recent years. In this paper, we study the role of contextual information in determining both PoI occupations and user preferences, and we explore how machine learning and deep learning techniques can help produce good recommendations for users by enriching historical information with its contextual counterpart. As a result, we propose the architecture of ARTEMIS, a context-Aware Recommender sysTEM wIth crowding forecaSting, able to learn and forecast user preferences and occupation levels based on historical contextual features. Throughout the paper, we refer to a real-world application scenario regarding the tourist visits performed in Verona, a municipality in Northern Italy, between 2014 and 2019.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security among UPFs belonging to Different 5G/B5G/6G Networks 属于不同 5G/B5G/6G 网络的 UPF 之间的安全性
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1007/s10796-024-10510-0
Liang-Sheng Hsiao, Kun-Lin Tsai, Jung-Chun Liu, Fang-Yie Leu, Yu-Syuan Lu, I-Long Lin

Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF1 of a 5G, e.g., 5G1, to P’s destinations, e.g., the set {UPF2, UPF3, …UPFn}, respectively, in {5G2, 5G3, …5Gn}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC1 in 5G1 encrypts P and then sends P’s ciphertext which will be decrypted by edge computers {EC2, EC3, …ECn} where ECj is in 5Gj, (2le jle n). Our security scenarios include data transmission among n-parties, n (ge) 2. When n (=) 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As n (>) 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.

近来,5G/B5G/6G 网络(简称 5G)光彩夺目,为我们带来了丰富多彩的生活,使我们的日常活动比以前更加便捷。另一方面,视频会议和在线教育等在线会议已在世界各地普及。然而,在 5G 网络上举行这样的会议时,从用户平面功能(UPF)(如 5G1 的 UPF1)向 P 的目的地(如 {UPF2、UPF3、...UPFn} 中的集合 {UPF2、UPF3、...UPFn})传输的数据包 P 并不安全,甚至没有加密,尤其是当 P 通过互联网时。黑客可能会复制 P,即在这些 UPF 之间的连接上泄漏数据。当会议数据不应泄漏时,如重要的军事会议,就需要避免这种情况。因此,在本研究中,我们提出了一种安全架构,命名为使用IKA的组密钥(GKIKA),它在发送数据包之前对其进行加密/解密,例如,5G1中的EC1对P进行加密,然后发送P的密文,密文将由边缘计算机{EC2,EC3,...ECn}解密,其中ECj在5Gj中,(2le jle n)。我们的安全场景包括n方之间的数据传输,n()2。 当n()2时,根据所需的安全级别和时间限制,采用对称或非对称加密技术。当 n (=)2 时,使用初始密钥协议(IKA)为所有参与的 EC 建立密钥。其他安全机制,如信息验证码和时间戳,也被用来提高数据传输的安全级别。我们的分析表明,GKIKA 可以有效避免某些类型的攻击。
{"title":"Security among UPFs belonging to Different 5G/B5G/6G Networks","authors":"Liang-Sheng Hsiao, Kun-Lin Tsai, Jung-Chun Liu, Fang-Yie Leu, Yu-Syuan Lu, I-Long Lin","doi":"10.1007/s10796-024-10510-0","DOIUrl":"https://doi.org/10.1007/s10796-024-10510-0","url":null,"abstract":"<p>Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF<sub>1</sub> of a 5G, e.g., 5G<sub>1</sub>, to P’s destinations, e.g., the set {UPF<sub>2</sub>, UPF<sub>3</sub>, …UPF<sub><i>n</i></sub>}, respectively, in {5G<sub>2</sub>, 5G<sub>3</sub>, …5G<sub><i>n</i></sub>}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC<sub>1</sub> in 5G<sub>1</sub> encrypts P and then sends P’s ciphertext which will be decrypted by edge computers {EC<sub>2</sub>, EC<sub>3</sub>, …EC<sub><i>n</i></sub>} where EC<sub><i>j</i></sub> is in 5G<sub><i>j</i></sub>, <span>(2le jle n)</span>. Our security scenarios include data transmission among <i>n</i>-parties, <i>n</i> <span>(ge)</span> 2. When<i> n</i> <span>(=)</span> 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As <i>n</i> <span>(&gt;)</span> 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141625034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Comparing and Improving Active Learning Uncertainty Measures for Transformer Models by Discarding Outliers 更正:通过剔除异常值来比较和改进变压器模型的主动学习不确定性测量方法
IF 6.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-15 DOI: 10.1007/s10796-024-10519-5
Julius Gonsior, Christian Falkenberg, Silvio Magino, Anja Reusch, Claudio Hartmann, Maik Thiele, Wolfgang Lehner
{"title":"Correction to: Comparing and Improving Active Learning Uncertainty Measures for Transformer Models by Discarding Outliers","authors":"Julius Gonsior, Christian Falkenberg, Silvio Magino, Anja Reusch, Claudio Hartmann, Maik Thiele, Wolfgang Lehner","doi":"10.1007/s10796-024-10519-5","DOIUrl":"https://doi.org/10.1007/s10796-024-10519-5","url":null,"abstract":"","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141644410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse 虚拟体验,真实记忆?元宇宙中的信息回忆与识别研究
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10796-024-10500-2
Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila, Juho Hamari

There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into question when undertaking everyday activities (e.g., working, shopping, and learning etc.), as complex human-technology interaction required may hinder cognitive abilities such as processing of information. Therefore, this study attempts to address whether and how XR impacts abilities to recall and recognize information in daily-life settings. We investigated the effects of VR and AR in a 2 (VR: yes vs. no) × 2 (AR: yes vs. no) between-subjects design experiment related to a shopping task (N = 153) on textual (product names) and pictorial (product pictures) recognition and recall. The results show that textual information recall and pictorial information recognition did not significantly suffer in XR compared to shopping in a brick-and-mortar store. While regarding textual information recognition performance, the results show that fully physical environments offered the highest performance compared to the different XR technologies being used. Overall, the study provides important findings and guidance for the use of extended reality technologies in consumer-facing businesses, as well as the use of XR in everyday life in general.

人们对扩展现实(XR),即 "元宇宙 "寄予厚望。然而,在进行日常活动(如工作、购物和学习等)时,人类在元宇宙中的表现却备受质疑,因为所需的复杂的人机交互可能会阻碍信息处理等认知能力。因此,本研究试图探讨 XR 是否以及如何影响人们在日常生活中回忆和识别信息的能力。我们在一个与购物任务相关的 2(VR:是 vs. 否)×2(AR:是 vs. 否)主体间设计实验中(N = 153)调查了 VR 和 AR 对文字(产品名称)和图像(产品图片)识别和回忆的影响。结果表明,与在实体店购物相比,在 XR 中文字信息的回忆和图片信息的识别没有受到明显影响。在文字信息识别性能方面,结果表明,与所使用的不同 XR 技术相比,完全物理环境提供的性能最高。总之,这项研究为在面向消费者的企业中使用扩展现实技术以及在日常生活中使用 XR 提供了重要的发现和指导。
{"title":"Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse","authors":"Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila, Juho Hamari","doi":"10.1007/s10796-024-10500-2","DOIUrl":"https://doi.org/10.1007/s10796-024-10500-2","url":null,"abstract":"<p>There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into question when undertaking everyday activities (e.g., working, shopping, and learning etc.), as complex human-technology interaction required may hinder cognitive abilities such as processing of information. Therefore, this study attempts to address whether and how XR impacts abilities to recall and recognize information in daily-life settings. We investigated the effects of VR and AR in a 2 (VR: yes vs. no) × 2 (AR: yes vs. no) between-subjects design experiment related to a shopping task (N = 153) on textual (product names) and pictorial (product pictures) recognition and recall. The results show that textual information recall and pictorial information recognition did not significantly suffer in XR compared to shopping in a brick-and-mortar store. While regarding textual information recognition performance, the results show that fully physical environments offered the highest performance compared to the different XR technologies being used. Overall, the study provides important findings and guidance for the use of extended reality technologies in consumer-facing businesses, as well as the use of XR in everyday life in general.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model 数字可持续性促进节能行为:用户表征和接触点模型
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10796-024-10509-7
Stephen McCarthy, Titiana Ertiö, Ciara Fitzgerald, Nina Kahma

In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted actions. While digital technologies can support this goal, our understanding of energy practices in a private household context remains nascent. This challenge is amplified by the ‘invisible’ nature of users’ interaction with energy systems and the impact of unconscious habits. Our objective is to explore how touchpoints embedded in digital sustainability platforms shape energy-efficiency behaviours among users. Building on data from semi-structured interviews and a two-hour co-creation workshop with 25 energy experts in the ECO2 project, we first identify three user representations of relevance to such platforms: energy-unaware, living in denial, and energy-aware and active. Our findings suggest that ‘static’ user representations (based on user demographics and average consumption) are giving way to socio-cognitive representations that follow users’ journeys in energy efficiency. We then develop a set of design principles to promote sustainable energy behaviours through digital sustainability platforms across user-owned, social/external, brand-owned, and partner-owned touchpoints. An analysis of user feedback from the ECO2 project shows support for our design principles across users’ journeys. Of 62 respondents covering all three representations, 76% of them intended to “implement changes in terms of energy consumption and energy efficiency”.

为应对气候变化,各国都肩负着通过有针对性的行动减少能源消耗和碳足迹的任务。虽然数字技术可以支持这一目标,但我们对私人家庭能源使用情况的了解仍处于起步阶段。用户与能源系统互动的 "无形 "性质以及无意识习惯的影响加剧了这一挑战。我们的目标是探索嵌入在数字可持续发展平台中的接触点如何影响用户的节能行为。在半结构化访谈和与 25 位 ECO2 项目能源专家进行的两小时共同创造研讨会所获得的数据基础上,我们首先确定了与此类平台相关的三种用户表征:缺乏能源意识、生活在否定中,以及积极的能源意识。我们的研究结果表明,"静态 "用户表征(基于用户人口统计和平均消耗量)正在让位于社会认知表征,即用户的节能历程。随后,我们制定了一套设计原则,通过用户、社交/外部、品牌和合作伙伴的数字可持续发展平台,促进可持续能源行为。对 ECO2 项目用户反馈的分析表明,我们的设计原则在用户的整个旅程中都得到了支持。在涵盖所有三种表现形式的 62 位受访者中,76% 的人打算 "在能源消耗和能源效率方面做出改变"。
{"title":"Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model","authors":"Stephen McCarthy, Titiana Ertiö, Ciara Fitzgerald, Nina Kahma","doi":"10.1007/s10796-024-10509-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10509-7","url":null,"abstract":"<p>In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted actions. While digital technologies can support this goal, our understanding of energy practices in a private household context remains nascent. This challenge is amplified by the ‘invisible’ nature of users’ interaction with energy systems and the impact of unconscious habits. Our objective is to explore how touchpoints embedded in digital sustainability platforms shape energy-efficiency behaviours among users. Building on data from semi-structured interviews and a two-hour co-creation workshop with 25 energy experts in the ECO2 project, we first identify three user representations of relevance to such platforms: <i>energy-unaware</i>, <i>living in denial</i>, and <i>energy-aware and active</i>. Our findings suggest that ‘static’ user representations (based on user demographics and average consumption) are giving way to socio-cognitive representations that follow users’ journeys in energy efficiency. We then develop a set of design principles to promote sustainable energy behaviours through digital sustainability platforms across <i>user-owned</i>, <i>social/external</i>, <i>brand-owned</i>, and <i>partner-owned</i> touchpoints. An analysis of user feedback from the ECO2 project shows support for our design principles across users’ journeys. Of 62 respondents covering all three representations, 76% of them intended to “implement changes in terms of energy consumption and energy efficiency”.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes 家庭自动化分类学:智能家居未来的专家视角
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1007/s10796-024-10496-9
Shabnam FakhrHosseini, Chaiwoo Lee, Sheng-Hung Lee, Joseph Coughlin

Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication technologies (ICT), are transforming homes into interconnected ecosystem of services. Yet, discourse on home technologies remains fragmented due to inconsistent terminologies. This paper addresses the lack of a framework, studying distinctions between smart and non-smart homes and forecasting connectivity and automation growth. Experts (21) participated in online surveys and interviews in 2021, exploring language, structure, and technical/social aspects of basic and smarter homes. Quantitative survey data and qualitative interview analyses yield insights on defining smarter homes, barriers to adoption, and framework improvements to establish universal definitions. This study underscores the urgency of harmonizing language and concepts in the domain of smart homes, revealing user understanding gaps and usability issues as barriers. This bridges gaps for consumer engagement and tech adoption.

人工智能(AI)、物联网(IoT)以及信息和通信技术(ICT)等数字技术的最新进展正在将家庭转变为相互关联的服务生态系统。然而,由于术语不一致,有关家居技术的讨论仍然支离破碎。本文针对缺乏框架的问题,研究了智能和非智能家居之间的区别,并预测了互联性和自动化的增长。专家(21 位)参与了 2021 年的在线调查和访谈,探讨了基本家庭和智能家居的语言、结构以及技术/社会方面的问题。通过定量调查数据和定性访谈分析,我们对智能家居的定义、采用障碍以及改进框架以建立通用定义有了深入了解。这项研究强调了统一智能家居领域的语言和概念的紧迫性,揭示了用户理解方面的差距和作为障碍的可用性问题。这将缩小消费者参与和技术采用方面的差距。
{"title":"A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes","authors":"Shabnam FakhrHosseini, Chaiwoo Lee, Sheng-Hung Lee, Joseph Coughlin","doi":"10.1007/s10796-024-10496-9","DOIUrl":"https://doi.org/10.1007/s10796-024-10496-9","url":null,"abstract":"<p>Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication technologies (ICT), are transforming homes into interconnected ecosystem of services. Yet, discourse on home technologies remains fragmented due to inconsistent terminologies. This paper addresses the lack of a framework, studying distinctions between smart and non-smart homes and forecasting connectivity and automation growth. Experts (21) participated in online surveys and interviews in 2021, exploring language, structure, and technical/social aspects of basic and smarter homes. Quantitative survey data and qualitative interview analyses yield insights on defining smarter homes, barriers to adoption, and framework improvements to establish universal definitions. This study underscores the urgency of harmonizing language and concepts in the domain of smart homes, revealing user understanding gaps and usability issues as barriers. This bridges gaps for consumer engagement and tech adoption.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset 以毒攻毒:以 P2P 思维打击滥用加密货币的犯罪行为
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1007/s10796-024-10498-7
Klein Galit, Assadi Djamchid, Zwilling Moti

As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional regulatory forces versus those advocating for normative legitimacy, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.

作为 P2P 共享经济的一部分,加密货币既提供了创造性机会,也提供了犯罪机会。为了对付犯罪者,人们提出了立法和监管等解决方案。然而,这些都与可信互动和交易的 P2P 精神格格不入。本文旨在找出符合 P2P 技术和关系的解决方案,以打击使用加密货币的犯罪行为。根据我们的研究问题,我们采用了基础理论的方法。基于对 1,500 h 的播客、博客和电视节目进行的 45 次访谈,我们观察了金融、技术和加密货币领域的专家如何分析加密货币计划的危害以及解决方案。结果表明,这项新技术也催生了新型犯罪计划;因此,我们可以将恶意行为分为传统危害和 P2P 危害。此外,专家们还指出了在个人、组织、社区和国家层面应对加密犯罪的传统和 P2P 解决方案。因此,他们强调了推动传统监管力量解决方案的人与倡导规范合法性的人之间的差异,从而拉动行业维护 P2P 特性。根据制度理论和这一新的颠覆性行业对合法性的需求,我们讨论了各种议程之间的紧张关系,并为这一创新但问题重重的技术提出了非正统的解决方案。
{"title":"Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset","authors":"Klein Galit, Assadi Djamchid, Zwilling Moti","doi":"10.1007/s10796-024-10498-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10498-7","url":null,"abstract":"<p>As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional <i>regulatory</i> forces versus those advocating for <i>normative legitimacy</i>, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering 通过具有排序和过滤功能的稳定条件度量对数据输入进行验证
IF 5.9 3区 管理学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1007/s10796-024-10504-y
Niels Bylois, Frank Neven, Stijn Vansummeren

We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality validation relies on data unit tests, which use global metrics to determine if data quality falls within expected ranges. Unfortunately, these existing approaches suffer from two limitations. Firstly, they offer only coarse-grained assessments, missing fine-grained errors. Secondly, they fail to pinpoint the specific data causing test failures. To address these issues, we propose a novel approach using conditional metrics, enabling more detailed analysis than global metrics. Our method involves two stages: unit test discovery and monitoring/error identification. In the discovery phase, we derive conditional metric-based unit tests from historical data, focusing on stability to select appropriate metrics. The monitoring phase involves using these tests for new data batches, with conditional metrics helping us identify potential errors. We validate the effectiveness of this approach using two datasets and seven synthetic error scenarios, showing significant improvements over global metrics and promising results in fine-grained error detection for data ingestion validation.

我们介绍了一种先进的数据质量验证方法,这对于确保可靠的分析洞察力至关重要。传统的数据质量验证依赖于数据单元测试,这些测试使用全局指标来确定数据质量是否在预期范围内。遗憾的是,这些现有方法存在两个局限性。首先,它们只能提供粗粒度的评估,缺少细粒度的误差。其次,它们无法精确定位导致测试失败的特定数据。为了解决这些问题,我们提出了一种使用条件度量的新方法,它能比全局度量进行更详细的分析。我们的方法包括两个阶段:单元测试发现和监控/错误识别。在发现阶段,我们从历史数据中推导出基于条件指标的单元测试,重点关注稳定性以选择合适的指标。在监控阶段,我们将这些测试用于新的数据批次,并利用条件指标帮助我们识别潜在的错误。我们使用两个数据集和七个合成错误场景验证了这种方法的有效性,结果表明它比全局度量方法有显著改进,在数据摄取验证的细粒度错误检测方面也取得了可喜成果。
{"title":"Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering","authors":"Niels Bylois, Frank Neven, Stijn Vansummeren","doi":"10.1007/s10796-024-10504-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10504-y","url":null,"abstract":"<p>We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality validation relies on data unit tests, which use global metrics to determine if data quality falls within expected ranges. Unfortunately, these existing approaches suffer from two limitations. Firstly, they offer only coarse-grained assessments, missing fine-grained errors. Secondly, they fail to pinpoint the specific data causing test failures. To address these issues, we propose a novel approach using conditional metrics, enabling more detailed analysis than global metrics. Our method involves two stages: unit test discovery and monitoring/error identification. In the discovery phase, we derive conditional metric-based unit tests from historical data, focusing on stability to select appropriate metrics. The monitoring phase involves using these tests for new data batches, with conditional metrics helping us identify potential errors. We validate the effectiveness of this approach using two datasets and seven synthetic error scenarios, showing significant improvements over global metrics and promising results in fine-grained error detection for data ingestion validation.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141546008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information Systems Frontiers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1