User-generated online comments and posts increasingly contain abusive content that needs moderation from an ethical but also legislative perspective. The amount of comments and the need for moderation in our digital world often overpower the capacity of manual moderation. To remedy this, platforms often adopt semi-automated moderation systems. However, because such systems are typically black boxes, user trust in and acceptance of the system is not easily achieved, as black box systems can be perceived as nontransparent and moderating user comments is easily associated with censorship. Therefore, we investigate the relationship of system transparency through explanations, user trust and system acceptance with an online experiment. Our results show that the transparency of an automatic online comment moderation system is a prerequisite for user trust in the system. However, the objective transparency of the moderation system does not influence the user's acceptance.
{"title":"Effect of Transparency and Trust on Acceptance of Automatic Online Comment Moderation Systems","authors":"Jens Brunk, J. Mattern, Dennis M. Riehle","doi":"10.1109/CBI.2019.00056","DOIUrl":"https://doi.org/10.1109/CBI.2019.00056","url":null,"abstract":"User-generated online comments and posts increasingly contain abusive content that needs moderation from an ethical but also legislative perspective. The amount of comments and the need for moderation in our digital world often overpower the capacity of manual moderation. To remedy this, platforms often adopt semi-automated moderation systems. However, because such systems are typically black boxes, user trust in and acceptance of the system is not easily achieved, as black box systems can be perceived as nontransparent and moderating user comments is easily associated with censorship. Therefore, we investigate the relationship of system transparency through explanations, user trust and system acceptance with an online experiment. Our results show that the transparency of an automatic online comment moderation system is a prerequisite for user trust in the system. However, the objective transparency of the moderation system does not influence the user's acceptance.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121894788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Stepanovic, Tobias Mettler, Manuel Schmidt-Kraepelin, Scott Thiebes, A. Sunyaev
The use of wearable health devices, such as activity trackers or biosensors, offers great potential for managing one’s health levels. Since they are affordable and widely available, organizations are also taking advantage of these systems (referred to as physiolytics), seeing an opportunity to handle some health-related challenges in the workplace. However, once physiolytics are implemented in the workspace, organizations face difficulties in sustaining employees' participation. This is a major problem because, to generate data that can contribute to personal health empowerment, physiolytics need to be used in a continuous manner. Habits are recognized as significant factors in determining sustained use of physiolytics, but there are no precise investigations on how organizations can have an impact on this matter. Because habits are highly contextdependent, organizations have the opportunity to create favorable conditions so that participating employees develop a habituation towards the use of physiolytics. Accordingly, in this paper, we conduct a narrative review to critically evaluate reported evidence and, then, formulate concrete propositions to support wearable health devices’ habituation. We therefore aim to provide practitioners with upstream interventions to concretely help them in increasing the success of physiolytics' implementation as well as open the way for further investigations in this strand of research.
{"title":"Wearable health devices in the workplace: The importance of habits to sustain the use","authors":"Stefan Stepanovic, Tobias Mettler, Manuel Schmidt-Kraepelin, Scott Thiebes, A. Sunyaev","doi":"10.1109/CBI.2019.00048","DOIUrl":"https://doi.org/10.1109/CBI.2019.00048","url":null,"abstract":"The use of wearable health devices, such as activity trackers or biosensors, offers great potential for managing one’s health levels. Since they are affordable and widely available, organizations are also taking advantage of these systems (referred to as physiolytics), seeing an opportunity to handle some health-related challenges in the workplace. However, once physiolytics are implemented in the workspace, organizations face difficulties in sustaining employees' participation. This is a major problem because, to generate data that can contribute to personal health empowerment, physiolytics need to be used in a continuous manner. Habits are recognized as significant factors in determining sustained use of physiolytics, but there are no precise investigations on how organizations can have an impact on this matter. Because habits are highly contextdependent, organizations have the opportunity to create favorable conditions so that participating employees develop a habituation towards the use of physiolytics. Accordingly, in this paper, we conduct a narrative review to critically evaluate reported evidence and, then, formulate concrete propositions to support wearable health devices’ habituation. We therefore aim to provide practitioners with upstream interventions to concretely help them in increasing the success of physiolytics' implementation as well as open the way for further investigations in this strand of research.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116969435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quality management in real time enables increased efficiency of a production process. A multitude of sensors make it possible to collect a large amount of data and builds the basis for a real time fault detection in the Smart Factory. Hence, it is important that this data, the resulting information, and the knowledge generated by the algorithmic analysis is available at the right time. Therefore, appropriate network architectures such as Edge Computing are required for efficient data transfer. In this context, the paper deals with the challenges of analyzing data gathered by an image sensor in production. The consideration is based on the implementation of an Im-age-Mining-Application for real time error detection in production, which was developed by a design science research approach. In addition to identifying the challenges in this area, algorithms with a high accuracy of fit could be identified. Thus, the results obtained form an important basis for the use of Image-Mining-Applications in Smart Factories.
{"title":"Image Mining for Real Time Fault Detection within the Smart Factory","authors":"Sebastian Trinks, Carsten Felden","doi":"10.1109/CBI.2019.00074","DOIUrl":"https://doi.org/10.1109/CBI.2019.00074","url":null,"abstract":"Quality management in real time enables increased efficiency of a production process. A multitude of sensors make it possible to collect a large amount of data and builds the basis for a real time fault detection in the Smart Factory. Hence, it is important that this data, the resulting information, and the knowledge generated by the algorithmic analysis is available at the right time. Therefore, appropriate network architectures such as Edge Computing are required for efficient data transfer. In this context, the paper deals with the challenges of analyzing data gathered by an image sensor in production. The consideration is based on the implementation of an Im-age-Mining-Application for real time error detection in production, which was developed by a design science research approach. In addition to identifying the challenges in this area, algorithms with a high accuracy of fit could be identified. Thus, the results obtained form an important basis for the use of Image-Mining-Applications in Smart Factories.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121269837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Connection in todays world is no longer between people but also between people and things, and between things. The World-of-Persons (WoP) and the World-of-Things (WoT) collide in ways that have never been imagined before. Nevertheless, there are obstacles in progressing both technically and socially. This paper proposes a modeling framework for bridging the gap between WoP and WoT which addresses some of the technical obstacles while also acknowledging the potential social obstacles.
{"title":"The Socio-Net of Things Modeling Framework","authors":"Amjad Fayoumi, J. Sutanto, Z. Maamar","doi":"10.1109/CBI.2019.00023","DOIUrl":"https://doi.org/10.1109/CBI.2019.00023","url":null,"abstract":"Connection in todays world is no longer between people but also between people and things, and between things. The World-of-Persons (WoP) and the World-of-Things (WoT) collide in ways that have never been imagined before. Nevertheless, there are obstacles in progressing both technically and socially. This paper proposes a modeling framework for bridging the gap between WoP and WoT which addresses some of the technical obstacles while also acknowledging the potential social obstacles.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Because of an increasing flow of data being derived from external economic environment and inner business processes, it has become vital to create an automatized tool for prescribing scenarios for most of the standardized cases occurring within the manufacturing mainframe. This work aims to study the needs of the businesses and to design a simple tool for maintaining the decision support process in obedience with the existing market demand. In the context of the paper, various approaches to demand plan establishment will be considered and further methods for its remote control will be researched. For the existing problem solved, a model of Decision Support System will be designed which will operate based on Supervisory Control Theory.
{"title":"DSS-Tool for Demand Planning: An Example of Automotive Industry","authors":"Z. Avdeeva, S. Kovriga, Ekaterina Fedko","doi":"10.1109/CBI.2019.10096","DOIUrl":"https://doi.org/10.1109/CBI.2019.10096","url":null,"abstract":"Because of an increasing flow of data being derived from external economic environment and inner business processes, it has become vital to create an automatized tool for prescribing scenarios for most of the standardized cases occurring within the manufacturing mainframe. This work aims to study the needs of the businesses and to design a simple tool for maintaining the decision support process in obedience with the existing market demand. In the context of the paper, various approaches to demand plan establishment will be considered and further methods for its remote control will be researched. For the existing problem solved, a model of Decision Support System will be designed which will operate based on Supervisory Control Theory.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose the use of multi-level modeling as an underlying language architecture for the creation and use of reference models. We focus on the added flexibility and expressiveness offered by multi-level modeling, such as, among others, the ability to express domain information at the appropriate level of abstraction, and removing the need for additional consistency checking mechanisms. We illustrate the use of multi-level modeling on the basis of a multi-level reference model for smart grid cybersecurity created using the Flexible Meta Modeling and Execution Language (FMMLx), and briefly showcase an implementation in the integrated modeling and programming environment XModeler.
{"title":"Multi-level Modeling as a Language Architecture for Reference Models: On the Example of the Smart Grid Domain","authors":"S. Kinderen, Monika Kaczmarek-Heß","doi":"10.1109/CBI.2019.00027","DOIUrl":"https://doi.org/10.1109/CBI.2019.00027","url":null,"abstract":"In this paper, we propose the use of multi-level modeling as an underlying language architecture for the creation and use of reference models. We focus on the added flexibility and expressiveness offered by multi-level modeling, such as, among others, the ability to express domain information at the appropriate level of abstraction, and removing the need for additional consistency checking mechanisms. We illustrate the use of multi-level modeling on the basis of a multi-level reference model for smart grid cybersecurity created using the Flexible Meta Modeling and Execution Language (FMMLx), and briefly showcase an implementation in the integrated modeling and programming environment XModeler.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128501227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Foreword to WSM 2019","authors":"","doi":"10.1109/cbi.2019.10086","DOIUrl":"https://doi.org/10.1109/cbi.2019.10086","url":null,"abstract":"","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124041228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Technical developments have always played an important role in the history of accounting and auditing practice. The Smart Computing Age urges us to rethink the way auditability of organizations is designed in an effective and efficient way. The goal of this conceptual paper is to define auditability on a general level and frame it as a design problem. It particularly addresses what is considered a key concern in auditing: What should be the ramification of missing or weak completeness controls on the external audit of financial statements? The paper introduces a general auditability framework that builds on the Dutch auditing tradition but is novel in the way this proven approach is summarized and formalized in a Five Cycle model. It makes an argument for a design role for the external auditor and gives directions how this role can be filled in, making optimal use of new technological possibilities.
{"title":"Auditability as a Design Problem","authors":"H. Weigand, P. Elsas","doi":"10.1109/CBI.2019.00038","DOIUrl":"https://doi.org/10.1109/CBI.2019.00038","url":null,"abstract":"Technical developments have always played an important role in the history of accounting and auditing practice. The Smart Computing Age urges us to rethink the way auditability of organizations is designed in an effective and efficient way. The goal of this conceptual paper is to define auditability on a general level and frame it as a design problem. It particularly addresses what is considered a key concern in auditing: What should be the ramification of missing or weak completeness controls on the external audit of financial statements? The paper introduces a general auditability framework that builds on the Dutch auditing tradition but is novel in the way this proven approach is summarized and formalized in a Five Cycle model. It makes an argument for a design role for the external auditor and gives directions how this role can be filled in, making optimal use of new technological possibilities.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This work proposes the use of a Fuzzy Clustering Algorithm for asset allocation based on their correlation. The objective of the algorithm is to propose the allocation to help investors improve their investment process, suggesting the allocation using the information of the groups and the membership degree of each asset to each group. This work is different from the approaches already proposed in the literature, which essentially use hierarchical clustering algorithms, whereas in this proposal we use a fuzzy partitioning method. The membership degree of each asset to the group was used to determine the percentage of asset allocation: the closer to the medoid, the greater its allocation. Experiments were carried out using data from the Brazilian Stock Exchange and the assets eligible to enter into the allocation were those that were part of the Ibovespa index at the time of portfolio rebalancing. The results were compared with other allocation methods and with the Ibovespa index itself. The proposed algorithm illustrates the potential of soft-computing and machine learning techniques in portfolio optimization.
{"title":"A Fuzzy Clustering Algorithm for Portfolio Selection","authors":"Flavio Gabriel Duarte, L. Castro","doi":"10.1109/CBI.2019.00054","DOIUrl":"https://doi.org/10.1109/CBI.2019.00054","url":null,"abstract":"This work proposes the use of a Fuzzy Clustering Algorithm for asset allocation based on their correlation. The objective of the algorithm is to propose the allocation to help investors improve their investment process, suggesting the allocation using the information of the groups and the membership degree of each asset to each group. This work is different from the approaches already proposed in the literature, which essentially use hierarchical clustering algorithms, whereas in this proposal we use a fuzzy partitioning method. The membership degree of each asset to the group was used to determine the percentage of asset allocation: the closer to the medoid, the greater its allocation. Experiments were carried out using data from the Brazilian Stock Exchange and the assets eligible to enter into the allocation were those that were part of the Ibovespa index at the time of portfolio rebalancing. The results were compared with other allocation methods and with the Ibovespa index itself. The proposed algorithm illustrates the potential of soft-computing and machine learning techniques in portfolio optimization.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131542113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Checking conformance between a process model and an event log, which records information about a current process behavior, is a widely used technique for business process audit. It allows discovering changes in the behavior represented by the model. There are several methods to perform conformance checking: most of them are based on 'token replay' and trace alignments. There is also a recent technique which employs Partially Synchronized Product (PSP) of event structures discovered from a model and an event log. Unfortunately, the above mentioned methods do not allow to identify model fragments still matching the current process behavior or do this by applying complex algorithms. The purpose of this paper is to provide a technique for solving this problem. For this we check conformance between event relations mined from a process model and an event log.
{"title":"What Has Remained Unchanged in Your Business Process Model?","authors":"K. Artamonov, I. Lomazova","doi":"10.1109/CBI.2019.00070","DOIUrl":"https://doi.org/10.1109/CBI.2019.00070","url":null,"abstract":"Checking conformance between a process model and an event log, which records information about a current process behavior, is a widely used technique for business process audit. It allows discovering changes in the behavior represented by the model. There are several methods to perform conformance checking: most of them are based on 'token replay' and trace alignments. There is also a recent technique which employs Partially Synchronized Product (PSP) of event structures discovered from a model and an event log. Unfortunately, the above mentioned methods do not allow to identify model fragments still matching the current process behavior or do this by applying complex algorithms. The purpose of this paper is to provide a technique for solving this problem. For this we check conformance between event relations mined from a process model and an event log.","PeriodicalId":193238,"journal":{"name":"2019 IEEE 21st Conference on Business Informatics (CBI)","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130879354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}