Pub Date : 2024-07-19DOI: 10.1007/s10796-024-10517-7
Ali Dag, Abdullah Asilkalkan, Osman T. Aydas, Musa Caglar, Serhat Simsek, Dursun Delen
Effective management of colorectal cancer (CRC) necessitates precise prognostication and informed decision-making, yet existing literature often lacks emphasis on parsimonious variable selection and conveying complex interdependencies among factors to medical practitioners. To address this gap, we propose a decision support system integrating Elastic Net (EN) and Simulated Annealing (SA) algorithms for variable selection, followed by Tree Augmented Naive Bayes (TAN) modeling to elucidate conditional relationships. Through k-fold cross-validation, we identify optimal TAN models with varying variable sets and explore interdependency structures. Our approach acknowledges the challenge of conveying intricate relationships among numerous variables to medical practitioners and aims to enhance patient-physician communication. The stage of cancer emerges as a robust predictor, with its significance amplified by the number of metastatic lymph nodes. Moreover, the impact of metastatic lymph nodes on survival prediction varies with the age of diagnosis, with diminished relevance observed in older patients. Age itself emerges as a crucial determinant of survival, yet its effect is modulated by marital status. Leveraging these insights, we develop a web-based tool to facilitate physician–patient communication, mitigate clinical inertia, and enhance decision-making in CRC treatment. This research contributes to a parsimonious model with superior predictive capabilities while uncovering hidden conditional relationships, fostering more meaningful discussions between physicians and patients without compromising patient satisfaction with healthcare provision.
结直肠癌(CRC)的有效治疗需要精确的预后和明智的决策,但现有文献往往缺乏对变量选择的重视,也没有向医疗从业人员传达各因素之间复杂的相互依存关系。为了弥补这一不足,我们提出了一种决策支持系统,该系统集成了弹性网(EN)和模拟退火(SA)算法来选择变量,然后用树增强奈何贝叶(TAN)建模来阐明条件关系。通过 k 倍交叉验证,我们确定了具有不同变量集的最佳 TAN 模型,并探索了相互依存结构。我们的方法认识到了向医疗从业人员传达众多变量之间错综复杂的关系所面临的挑战,旨在加强患者与医生之间的沟通。癌症分期是一个强有力的预测因素,其重要性因转移淋巴结的数量而放大。此外,转移性淋巴结对生存预测的影响随确诊年龄的不同而变化,老年患者的相关性更小。年龄本身是生存率的重要决定因素,但其影响受婚姻状况的调节。利用这些见解,我们开发了一种基于网络的工具,以促进医生与患者之间的交流,缓解临床惰性,并加强对 CRC 治疗的决策。这项研究有助于建立一个具有卓越预测能力的简约模型,同时揭示隐藏的条件关系,促进医生和患者之间进行更有意义的讨论,而不会影响患者对医疗服务的满意度。
{"title":"A Parsimonious Tree Augmented Naive Bayes Model for Exploring Colorectal Cancer Survival Factors and Their Conditional Interrelations","authors":"Ali Dag, Abdullah Asilkalkan, Osman T. Aydas, Musa Caglar, Serhat Simsek, Dursun Delen","doi":"10.1007/s10796-024-10517-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10517-7","url":null,"abstract":"<p>Effective management of colorectal cancer (CRC) necessitates precise prognostication and informed decision-making, yet existing literature often lacks emphasis on parsimonious variable selection and conveying complex interdependencies among factors to medical practitioners. To address this gap, we propose a decision support system integrating Elastic Net (EN) and Simulated Annealing (SA) algorithms for variable selection, followed by Tree Augmented Naive Bayes (TAN) modeling to elucidate conditional relationships. Through k-fold cross-validation, we identify optimal TAN models with varying variable sets and explore interdependency structures. Our approach acknowledges the challenge of conveying intricate relationships among numerous variables to medical practitioners and aims to enhance patient-physician communication. The stage of cancer emerges as a robust predictor, with its significance amplified by the number of metastatic lymph nodes. Moreover, the impact of metastatic lymph nodes on survival prediction varies with the age of diagnosis, with diminished relevance observed in older patients. Age itself emerges as a crucial determinant of survival, yet its effect is modulated by marital status. Leveraging these insights, we develop a web-based tool to facilitate physician–patient communication, mitigate clinical inertia, and enhance decision-making in CRC treatment. This research contributes to a parsimonious model with superior predictive capabilities while uncovering hidden conditional relationships, fostering more meaningful discussions between physicians and patients without compromising patient satisfaction with healthcare provision.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"69 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The COVID-19 pandemic has highlighted the critical need for advanced technology in healthcare. Clinical Decision Support Systems (CDSS) utilizing Artificial Intelligence (AI) have emerged as one of the most promising technologies for improving patient outcomes. This study’s focus on developing a deep state-space model (DSSM) is of utmost importance, as it addresses the current limitations of AI predictive models in handling high-dimensional and longitudinal electronic health records (EHRs). The DSSM’s ability to capture time-varying information from unstructured medical notes, combined with label-dependent attention for interpretability, will allow for more accurate risk prediction for patients. As we move into a post-COVID-19 era, the importance of CDSS in precision medicine cannot be ignored. This study’s contribution to the development of DSSM for unstructured medical notes has the potential to greatly improve patient care and outcomes in the future.
{"title":"Modelling Patient Longitudinal Data for Clinical Decision Support: A Case Study on Emerging AI Healthcare Technologies","authors":"Shuai Niu, Jing Ma, Qing Yin, Zhihua Wang, Liang Bai, Xian Yang","doi":"10.1007/s10796-024-10513-x","DOIUrl":"https://doi.org/10.1007/s10796-024-10513-x","url":null,"abstract":"<p>The COVID-19 pandemic has highlighted the critical need for advanced technology in healthcare. Clinical Decision Support Systems (CDSS) utilizing Artificial Intelligence (AI) have emerged as one of the most promising technologies for improving patient outcomes. This study’s focus on developing a deep state-space model (DSSM) is of utmost importance, as it addresses the current limitations of AI predictive models in handling high-dimensional and longitudinal electronic health records (EHRs). The DSSM’s ability to capture time-varying information from unstructured medical notes, combined with label-dependent attention for interpretability, will allow for more accurate risk prediction for patients. As we move into a post-COVID-19 era, the importance of CDSS in precision medicine cannot be ignored. This study’s contribution to the development of DSSM for unstructured medical notes has the potential to greatly improve patient care and outcomes in the future.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"40 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-18DOI: 10.1007/s10796-024-10512-y
Sara Migliorini, Anna Dalla Vecchia, Alberto Belussi, Elisa Quintarelli
Recommendation systems are becoming an invaluable assistant not only for users, who may be disoriented in the presence of a huge number of different alternatives, but also for service providers or sellers, who would like to be able to guide the choice of customers toward particular items with specific characteristics. This influence capability can be particularly useful in the tourism domain, where the need to manage the industry in a more sustainable way and the ability to predict and control the level of crowding of PoIs (Points of Interest) have become more pressing in recent years. In this paper, we study the role of contextual information in determining both PoI occupations and user preferences, and we explore how machine learning and deep learning techniques can help produce good recommendations for users by enriching historical information with its contextual counterpart. As a result, we propose the architecture of ARTEMIS, a context-Aware Recommender sysTEM wIth crowding forecaSting, able to learn and forecast user preferences and occupation levels based on historical contextual features. Throughout the paper, we refer to a real-world application scenario regarding the tourist visits performed in Verona, a municipality in Northern Italy, between 2014 and 2019.
推荐系统正在成为一种无价的助手,它不仅可以帮助用户在面对大量不同选择时迷失方向,还可以帮助服务提供商或销售商引导客户选择具有特定特征的商品。这种影响能力在旅游领域尤为有用,近年来,以更可持续的方式管理旅游业的需求以及预测和控制兴趣点(PoIs)拥挤程度的能力变得更加迫切。在本文中,我们研究了上下文信息在决定 PoI 职业和用户偏好方面的作用,并探讨了机器学习和深度学习技术如何通过丰富历史信息与上下文信息的对应关系来帮助为用户提供良好的推荐。因此,我们提出了 ARTEMIS 的架构,这是一个具有拥挤预测功能的情境感知推荐系统,能够根据历史情境特征学习和预测用户偏好和职业水平。在整篇论文中,我们引用了一个真实世界的应用场景,涉及 2014 年至 2019 年期间在意大利北部维罗纳市进行的游客访问。
{"title":"ARTEMIS: a Context-Aware Recommendation System with Crowding Forecaster for the Touristic Domain","authors":"Sara Migliorini, Anna Dalla Vecchia, Alberto Belussi, Elisa Quintarelli","doi":"10.1007/s10796-024-10512-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10512-y","url":null,"abstract":"<p>Recommendation systems are becoming an invaluable assistant not only for users, who may be disoriented in the presence of a huge number of different alternatives, but also for service providers or sellers, who would like to be able to guide the choice of customers toward particular items with specific characteristics. This influence capability can be particularly useful in the tourism domain, where the need to manage the industry in a more sustainable way and the ability to predict and control the level of crowding of PoIs (Points of Interest) have become more pressing in recent years. In this paper, we study the role of contextual information in determining both PoI occupations and user preferences, and we explore how machine learning and deep learning techniques can help produce good recommendations for users by enriching historical information with its contextual counterpart. As a result, we propose the architecture of ARTEMIS, a context-Aware Recommender sysTEM wIth crowding forecaSting, able to learn and forecast user preferences and occupation levels based on historical contextual features. Throughout the paper, we refer to a real-world application scenario regarding the tourist visits performed in Verona, a municipality in Northern Italy, between 2014 and 2019.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"66 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141726330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF1 of a 5G, e.g., 5G1, to P’s destinations, e.g., the set {UPF2, UPF3, …UPFn}, respectively, in {5G2, 5G3, …5Gn}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC1 in 5G1 encrypts P and then sends P’s ciphertext which will be decrypted by edge computers {EC2, EC3, …ECn} where ECj is in 5Gj, (2le jle n). Our security scenarios include data transmission among n-parties, n(ge) 2. When n(=) 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As n(>) 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.
近来,5G/B5G/6G 网络(简称 5G)光彩夺目,为我们带来了丰富多彩的生活,使我们的日常活动比以前更加便捷。另一方面,视频会议和在线教育等在线会议已在世界各地普及。然而,在 5G 网络上举行这样的会议时,从用户平面功能(UPF)(如 5G1 的 UPF1)向 P 的目的地(如 {UPF2、UPF3、...UPFn} 中的集合 {UPF2、UPF3、...UPFn})传输的数据包 P 并不安全,甚至没有加密,尤其是当 P 通过互联网时。黑客可能会复制 P,即在这些 UPF 之间的连接上泄漏数据。当会议数据不应泄漏时,如重要的军事会议,就需要避免这种情况。因此,在本研究中,我们提出了一种安全架构,命名为使用IKA的组密钥(GKIKA),它在发送数据包之前对其进行加密/解密,例如,5G1中的EC1对P进行加密,然后发送P的密文,密文将由边缘计算机{EC2,EC3,...ECn}解密,其中ECj在5Gj中,(2le jle n)。我们的安全场景包括n方之间的数据传输,n()2。 当n()2时,根据所需的安全级别和时间限制,采用对称或非对称加密技术。当 n (=)2 时,使用初始密钥协议(IKA)为所有参与的 EC 建立密钥。其他安全机制,如信息验证码和时间戳,也被用来提高数据传输的安全级别。我们的分析表明,GKIKA 可以有效避免某些类型的攻击。
{"title":"Security among UPFs belonging to Different 5G/B5G/6G Networks","authors":"Liang-Sheng Hsiao, Kun-Lin Tsai, Jung-Chun Liu, Fang-Yie Leu, Yu-Syuan Lu, I-Long Lin","doi":"10.1007/s10796-024-10510-0","DOIUrl":"https://doi.org/10.1007/s10796-024-10510-0","url":null,"abstract":"<p>Recently, 5G/B5G/6G networks (5G for short) have been gloriously developed to give us colorful lives and make our daily activities more convenient than before. On the other hand, online meetings, like video conferences and online educations, have been popularly held everywhere in the world. Nevertheless, in such a meeting on 5G networks, a packet P transmitted from a User Plane Function (UPF), e.g., UPF<sub>1</sub> of a 5G, e.g., 5G<sub>1</sub>, to P’s destinations, e.g., the set {UPF<sub>2</sub>, UPF<sub>3</sub>, …UPF<sub><i>n</i></sub>}, respectively, in {5G<sub>2</sub>, 5G<sub>3</sub>, …5G<sub><i>n</i></sub>}, is not secure, even not encrypted, particularly when P goes through the Internet. Hackers may duplicate P, i.e., data leakage on the connections among these UPFs. The situation needs to be avoided when data of the meetings ought not to be leaked, e.g., for an important military conference. Therefore, in this study, we propose a security architecture, named Group Key using IKA (GKIKA), which encrypts/decrypt packets before sending them, e.g., EC<sub>1</sub> in 5G<sub>1</sub> encrypts P and then sends P’s ciphertext which will be decrypted by edge computers {EC<sub>2</sub>, EC<sub>3</sub>, …EC<sub><i>n</i></sub>} where EC<sub><i>j</i></sub> is in 5G<sub><i>j</i></sub>, <span>(2le jle n)</span>. Our security scenarios include data transmission among <i>n</i>-parties, <i>n</i> <span>(ge)</span> 2. When<i> n</i> <span>(=)</span> 2, symmetric or asymmetric cryptography is adopted depending on the security level and time constraints required. As <i>n</i> <span>(>)</span> 2, the Initial Key Agreement (IKA) is utilized to establish a secret key for all participating ECs. Other security mechanisms, like message authentication code and time stamp, are also utilized to enhance the security level of data transmission. Our analyses show that the GKIKA can effectively avoid some types of attacks.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"7 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141625034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-08DOI: 10.1007/s10796-024-10500-2
Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila, Juho Hamari
There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into question when undertaking everyday activities (e.g., working, shopping, and learning etc.), as complex human-technology interaction required may hinder cognitive abilities such as processing of information. Therefore, this study attempts to address whether and how XR impacts abilities to recall and recognize information in daily-life settings. We investigated the effects of VR and AR in a 2 (VR: yes vs. no) × 2 (AR: yes vs. no) between-subjects design experiment related to a shopping task (N = 153) on textual (product names) and pictorial (product pictures) recognition and recall. The results show that textual information recall and pictorial information recognition did not significantly suffer in XR compared to shopping in a brick-and-mortar store. While regarding textual information recognition performance, the results show that fully physical environments offered the highest performance compared to the different XR technologies being used. Overall, the study provides important findings and guidance for the use of extended reality technologies in consumer-facing businesses, as well as the use of XR in everyday life in general.
人们对扩展现实(XR),即 "元宇宙 "寄予厚望。然而,在进行日常活动(如工作、购物和学习等)时,人类在元宇宙中的表现却备受质疑,因为所需的复杂的人机交互可能会阻碍信息处理等认知能力。因此,本研究试图探讨 XR 是否以及如何影响人们在日常生活中回忆和识别信息的能力。我们在一个与购物任务相关的 2(VR:是 vs. 否)×2(AR:是 vs. 否)主体间设计实验中(N = 153)调查了 VR 和 AR 对文字(产品名称)和图像(产品图片)识别和回忆的影响。结果表明,与在实体店购物相比,在 XR 中文字信息的回忆和图片信息的识别没有受到明显影响。在文字信息识别性能方面,结果表明,与所使用的不同 XR 技术相比,完全物理环境提供的性能最高。总之,这项研究为在面向消费者的企业中使用扩展现实技术以及在日常生活中使用 XR 提供了重要的发现和指导。
{"title":"Virtual Experiences, Real Memories? A Study on Information Recall and Recognition in the Metaverse","authors":"Nannan Xi, Juan Chen, Filipe Gama, Henry Korkeila, Juho Hamari","doi":"10.1007/s10796-024-10500-2","DOIUrl":"https://doi.org/10.1007/s10796-024-10500-2","url":null,"abstract":"<p>There are high expectations towards extended reality (XR), namely the “metaverse”. However, human performance in the metaverse has been called into question when undertaking everyday activities (e.g., working, shopping, and learning etc.), as complex human-technology interaction required may hinder cognitive abilities such as processing of information. Therefore, this study attempts to address whether and how XR impacts abilities to recall and recognize information in daily-life settings. We investigated the effects of VR and AR in a 2 (VR: yes vs. no) × 2 (AR: yes vs. no) between-subjects design experiment related to a shopping task (N = 153) on textual (product names) and pictorial (product pictures) recognition and recall. The results show that textual information recall and pictorial information recognition did not significantly suffer in XR compared to shopping in a brick-and-mortar store. While regarding textual information recognition performance, the results show that fully physical environments offered the highest performance compared to the different XR technologies being used. Overall, the study provides important findings and guidance for the use of extended reality technologies in consumer-facing businesses, as well as the use of XR in everyday life in general.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"38 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-08DOI: 10.1007/s10796-024-10509-7
Stephen McCarthy, Titiana Ertiö, Ciara Fitzgerald, Nina Kahma
In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted actions. While digital technologies can support this goal, our understanding of energy practices in a private household context remains nascent. This challenge is amplified by the ‘invisible’ nature of users’ interaction with energy systems and the impact of unconscious habits. Our objective is to explore how touchpoints embedded in digital sustainability platforms shape energy-efficiency behaviours among users. Building on data from semi-structured interviews and a two-hour co-creation workshop with 25 energy experts in the ECO2 project, we first identify three user representations of relevance to such platforms: energy-unaware, living in denial, and energy-aware and active. Our findings suggest that ‘static’ user representations (based on user demographics and average consumption) are giving way to socio-cognitive representations that follow users’ journeys in energy efficiency. We then develop a set of design principles to promote sustainable energy behaviours through digital sustainability platforms across user-owned, social/external, brand-owned, and partner-owned touchpoints. An analysis of user feedback from the ECO2 project shows support for our design principles across users’ journeys. Of 62 respondents covering all three representations, 76% of them intended to “implement changes in terms of energy consumption and energy efficiency”.
{"title":"Digital Sustainability for Energy-Efficient Behaviours: A User Representation and Touchpoint Model","authors":"Stephen McCarthy, Titiana Ertiö, Ciara Fitzgerald, Nina Kahma","doi":"10.1007/s10796-024-10509-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10509-7","url":null,"abstract":"<p>In response to climate change, nations have been tasked with reducing energy consumption and lessening their carbon footprint through targeted actions. While digital technologies can support this goal, our understanding of energy practices in a private household context remains nascent. This challenge is amplified by the ‘invisible’ nature of users’ interaction with energy systems and the impact of unconscious habits. Our objective is to explore how touchpoints embedded in digital sustainability platforms shape energy-efficiency behaviours among users. Building on data from semi-structured interviews and a two-hour co-creation workshop with 25 energy experts in the ECO2 project, we first identify three user representations of relevance to such platforms: <i>energy-unaware</i>, <i>living in denial</i>, and <i>energy-aware and active</i>. Our findings suggest that ‘static’ user representations (based on user demographics and average consumption) are giving way to socio-cognitive representations that follow users’ journeys in energy efficiency. We then develop a set of design principles to promote sustainable energy behaviours through digital sustainability platforms across <i>user-owned</i>, <i>social/external</i>, <i>brand-owned</i>, and <i>partner-owned</i> touchpoints. An analysis of user feedback from the ECO2 project shows support for our design principles across users’ journeys. Of 62 respondents covering all three representations, 76% of them intended to “implement changes in terms of energy consumption and energy efficiency”.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"26 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-08DOI: 10.1007/s10796-024-10496-9
Shabnam FakhrHosseini, Chaiwoo Lee, Sheng-Hung Lee, Joseph Coughlin
Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication technologies (ICT), are transforming homes into interconnected ecosystem of services. Yet, discourse on home technologies remains fragmented due to inconsistent terminologies. This paper addresses the lack of a framework, studying distinctions between smart and non-smart homes and forecasting connectivity and automation growth. Experts (21) participated in online surveys and interviews in 2021, exploring language, structure, and technical/social aspects of basic and smarter homes. Quantitative survey data and qualitative interview analyses yield insights on defining smarter homes, barriers to adoption, and framework improvements to establish universal definitions. This study underscores the urgency of harmonizing language and concepts in the domain of smart homes, revealing user understanding gaps and usability issues as barriers. This bridges gaps for consumer engagement and tech adoption.
{"title":"A Taxonomy of Home Automation: Expert Perspectives on the Future of Smarter Homes","authors":"Shabnam FakhrHosseini, Chaiwoo Lee, Sheng-Hung Lee, Joseph Coughlin","doi":"10.1007/s10796-024-10496-9","DOIUrl":"https://doi.org/10.1007/s10796-024-10496-9","url":null,"abstract":"<p>Recent advancements in digital technologies, including artificial intelligence (AI), Internet of Things (IoT), and information and communication technologies (ICT), are transforming homes into interconnected ecosystem of services. Yet, discourse on home technologies remains fragmented due to inconsistent terminologies. This paper addresses the lack of a framework, studying distinctions between smart and non-smart homes and forecasting connectivity and automation growth. Experts (21) participated in online surveys and interviews in 2021, exploring language, structure, and technical/social aspects of basic and smarter homes. Quantitative survey data and qualitative interview analyses yield insights on defining smarter homes, barriers to adoption, and framework improvements to establish universal definitions. This study underscores the urgency of harmonizing language and concepts in the domain of smart homes, revealing user understanding gaps and usability issues as barriers. This bridges gaps for consumer engagement and tech adoption.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"15 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141557111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-06DOI: 10.1007/s10796-024-10498-7
Klein Galit, Assadi Djamchid, Zwilling Moti
As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional regulatory forces versus those advocating for normative legitimacy, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.
{"title":"Fighting Fire with Fire: Combating Criminal Abuse of Cryptocurrency with a P2P Mindset","authors":"Klein Galit, Assadi Djamchid, Zwilling Moti","doi":"10.1007/s10796-024-10498-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10498-7","url":null,"abstract":"<p>As part of the P2P sharing economy, cryptocurrencies offer both creative and criminal opportunities. To deal with offenders, solutions such as legislation and regulation are proposed. However, these are foreign to the P2P spirit of trusted interactions and transactions. This paper aims to identify solutions that align with P2P technologies and relationships to combat the criminal use of cryptocurrencies. In line with our research question, we adopt the method of grounded theory. Based on 45 interviews on 1,500 h of podcasts, blogs, and TV shows, we observed how experts in finance, technology, and cryptocurrency analyzed the hazards, as well as, the solutions for cryptocurrencies schemes. The results indicate that this new technology has also engendered new types of criminal schemes; thus, we can categorize malicious behaviors into conventional and P2P hazards. In addition, experts also point to conventional and P2P solutions to crypto-crimes at the individual, organizational, communal, and national levels. As such, they underscore the discrepancies between those who push for solutions favoring conventional <i>regulatory</i> forces versus those advocating for <i>normative legitimacy</i>, hence pulling the industry to preserve the P2P identity. Following institutional theory and the need for legitimacy in this new and disruptive industry, we discuss the tension between agendas and suggest unorthodox solutions for an innovative yet troubled technology.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"38 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-05DOI: 10.1007/s10796-024-10504-y
Niels Bylois, Frank Neven, Stijn Vansummeren
We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality validation relies on data unit tests, which use global metrics to determine if data quality falls within expected ranges. Unfortunately, these existing approaches suffer from two limitations. Firstly, they offer only coarse-grained assessments, missing fine-grained errors. Secondly, they fail to pinpoint the specific data causing test failures. To address these issues, we propose a novel approach using conditional metrics, enabling more detailed analysis than global metrics. Our method involves two stages: unit test discovery and monitoring/error identification. In the discovery phase, we derive conditional metric-based unit tests from historical data, focusing on stability to select appropriate metrics. The monitoring phase involves using these tests for new data batches, with conditional metrics helping us identify potential errors. We validate the effectiveness of this approach using two datasets and seven synthetic error scenarios, showing significant improvements over global metrics and promising results in fine-grained error detection for data ingestion validation.
{"title":"Data Ingestion Validation Through Stable Conditional Metrics with Ranking and Filtering","authors":"Niels Bylois, Frank Neven, Stijn Vansummeren","doi":"10.1007/s10796-024-10504-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10504-y","url":null,"abstract":"<p>We introduce an advanced method for validating data quality, which is crucial for ensuring reliable analytics insights. Traditional data quality validation relies on data unit tests, which use global metrics to determine if data quality falls within expected ranges. Unfortunately, these existing approaches suffer from two limitations. Firstly, they offer only coarse-grained assessments, missing fine-grained errors. Secondly, they fail to pinpoint the specific data causing test failures. To address these issues, we propose a novel approach using conditional metrics, enabling more detailed analysis than global metrics. Our method involves two stages: unit test discovery and monitoring/error identification. In the discovery phase, we derive conditional metric-based unit tests from historical data, focusing on stability to select appropriate metrics. The monitoring phase involves using these tests for new data batches, with conditional metrics helping us identify potential errors. We validate the effectiveness of this approach using two datasets and seven synthetic error scenarios, showing significant improvements over global metrics and promising results in fine-grained error detection for data ingestion validation.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"22 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141546008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-02DOI: 10.1007/s10796-024-10508-8
Yueqi Li, Sanjay Goel
Artificial intelligence (AI) technologies have become the key driver of innovation in society. However, numerous vulnerabilities of AI systems can lead to negative consequences for society, such as biases encoded in the training data and algorithms and lack of transparency. This calls for AI systems to be audited to ensure that the impact on society is understood and mitigated. To enable AI audits, auditability measures need to be implemented. This study provides a systematic review of academic work and regulatory work on AI audits and AI auditability. Results reveal the current understanding of the AI audit scope, audit challenges, and auditability measures. We identify and categorize AI auditability measures for each audit area and specific process to be audited and the party responsible for each process to be audited. Our findings will guide existing efforts to make AI systems auditable across the lifecycle of AI systems.
{"title":"Making It Possible for the Auditing of AI: A Systematic Review of AI Audits and AI Auditability","authors":"Yueqi Li, Sanjay Goel","doi":"10.1007/s10796-024-10508-8","DOIUrl":"https://doi.org/10.1007/s10796-024-10508-8","url":null,"abstract":"<p>Artificial intelligence (AI) technologies have become the key driver of innovation in society. However, numerous vulnerabilities of AI systems can lead to negative consequences for society, such as biases encoded in the training data and algorithms and lack of transparency. This calls for AI systems to be audited to ensure that the impact on society is understood and mitigated. To enable AI audits, auditability measures need to be implemented. This study provides a systematic review of academic work and regulatory work on AI audits and AI auditability. Results reveal the current understanding of the AI audit scope, audit challenges, and auditability measures. We identify and categorize AI auditability measures for each audit area and specific process to be audited and the party responsible for each process to be audited. Our findings will guide existing efforts to make AI systems auditable across the lifecycle of AI systems.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"16 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141496024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}