The under-sampling technique is an important method to solve the class imbalance issue in software defect prediction. However, the existing under-sampling methods generally ignore the problem that there are great differences in the complexities of different samples. In fact, the complexities of samples can play an important role in defect prediction, since there is a close relation between the complexities of samples and whether they have defects. Therefore, when we use the under-sampling technique to handle the class imbalance issue in software defect prediction, it is necessary to consider the complexities of samples. In this paper, we propose the notion of weighted complexity. When calculating the weighted complexity of each sample, the weights of different condition attributes are considered. Based on the weighted complexity, we propose a new under-sampling algorithm, called WCP-UnderSampler, and apply it to software defect prediction. In WCP-UnderSampler, we first employ the granularity decision entropy in rough sets to calculate the significance and the weight of each condition attribute; Second, the weighted complexity of each sample is obtained by calculating the weighted sum of the values of the sample on all attributes; Third, the majority class samples are sorted in descending order according to their weighted complexities, and the majority class samples with higher complexities are selected until a balanced data set is obtained. Experiments on defect prediction data sets show that we can obtain better software defect prediction results by using WCP-UnderSampler to handle the imbalanced data.
{"title":"An Under-sampling Algorithm Based on Weighted Complexity and Its Application in Software Defect Prediction","authors":"Wei Wei, Feng Jiang, Xu Yu, Junwei Du","doi":"10.1145/3520084.3520091","DOIUrl":"https://doi.org/10.1145/3520084.3520091","url":null,"abstract":"The under-sampling technique is an important method to solve the class imbalance issue in software defect prediction. However, the existing under-sampling methods generally ignore the problem that there are great differences in the complexities of different samples. In fact, the complexities of samples can play an important role in defect prediction, since there is a close relation between the complexities of samples and whether they have defects. Therefore, when we use the under-sampling technique to handle the class imbalance issue in software defect prediction, it is necessary to consider the complexities of samples. In this paper, we propose the notion of weighted complexity. When calculating the weighted complexity of each sample, the weights of different condition attributes are considered. Based on the weighted complexity, we propose a new under-sampling algorithm, called WCP-UnderSampler, and apply it to software defect prediction. In WCP-UnderSampler, we first employ the granularity decision entropy in rough sets to calculate the significance and the weight of each condition attribute; Second, the weighted complexity of each sample is obtained by calculating the weighted sum of the values of the sample on all attributes; Third, the majority class samples are sorted in descending order according to their weighted complexities, and the majority class samples with higher complexities are selected until a balanced data set is obtained. Experiments on defect prediction data sets show that we can obtain better software defect prediction results by using WCP-UnderSampler to handle the imbalanced data.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128803894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As biobanks require storing a large amount of data, the use of ontologies offer an effective solution to properly organise data and for data management. However, the specialised jargon embedded into an ontology, especially in the biomedical field, may constitute a difficulty for the people outside the proper domain. Our solution to this is to enhance ontology usability by automatically enriching an ontology. In this article we illustrate an enrichment process that allows us to expand in a controlled way the terms within an ontology. Our proposed enrichment process automatically adds in the ontological structure information extracted from external sources, in order to offer a more complete and clear knowledge of the domain and let users more easily query the ontology. Our enrichment process carefully selects from the wealth of information available in Wikipedia.
{"title":"Ontology Enrichment with Text Extracted from Wikipedia","authors":"E. Tramontana, Gabriella Verga","doi":"10.1145/3520084.3520102","DOIUrl":"https://doi.org/10.1145/3520084.3520102","url":null,"abstract":"As biobanks require storing a large amount of data, the use of ontologies offer an effective solution to properly organise data and for data management. However, the specialised jargon embedded into an ontology, especially in the biomedical field, may constitute a difficulty for the people outside the proper domain. Our solution to this is to enhance ontology usability by automatically enriching an ontology. In this article we illustrate an enrichment process that allows us to expand in a controlled way the terms within an ontology. Our proposed enrichment process automatically adds in the ontological structure information extracted from external sources, in order to offer a more complete and clear knowledge of the domain and let users more easily query the ontology. Our enrichment process carefully selects from the wealth of information available in Wikipedia.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121945420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As an ancient natural crime, rape is a serious violation of the sexual autonomy of the women victims and has always been a key target of the judicial authorities in China. A standardised and reasonable sentence for the crime of rape can help safeguard the legal rights of women as well as maintain social harmony and stability. This paper investigates the sentence decisions of 341 cases of rape defendants heard by the basic people's courts in Zhejiang Province from 2017 to 2021, selecting 24 types of sentence influencing factors such as type of behaviour, defendant's mental condition ,defendant's age and so on, considering the effect of factors influencing the term of a fixed-term imprisonment and the application of probation and establishing a linear prediction model for a fixed-term imprisonment and a logistic prediction model for the application of probation. After examining the various factors influencing sentencing, it was found that the current degree of standardization of sentencing for rape is high, but there are problems such as insufficient protection for special groups such as young girls and mentally ill people, and low correlation between aggravated outcomes and sentencing, so the Supreme People's Court should further refine the sentencing guidance applicable to the whole country and make reasonable improvements
{"title":"An Empirical Analysis of Rape Sentence Based on SPSS","authors":"Yue Liu, Zhou Xu","doi":"10.1145/3520084.3520114","DOIUrl":"https://doi.org/10.1145/3520084.3520114","url":null,"abstract":"As an ancient natural crime, rape is a serious violation of the sexual autonomy of the women victims and has always been a key target of the judicial authorities in China. A standardised and reasonable sentence for the crime of rape can help safeguard the legal rights of women as well as maintain social harmony and stability. This paper investigates the sentence decisions of 341 cases of rape defendants heard by the basic people's courts in Zhejiang Province from 2017 to 2021, selecting 24 types of sentence influencing factors such as type of behaviour, defendant's mental condition ,defendant's age and so on, considering the effect of factors influencing the term of a fixed-term imprisonment and the application of probation and establishing a linear prediction model for a fixed-term imprisonment and a logistic prediction model for the application of probation. After examining the various factors influencing sentencing, it was found that the current degree of standardization of sentencing for rape is high, but there are problems such as insufficient protection for special groups such as young girls and mentally ill people, and low correlation between aggravated outcomes and sentencing, so the Supreme People's Court should further refine the sentencing guidance applicable to the whole country and make reasonable improvements","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133933052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The number of ransomware attacks has been on the rise. Ransomware is a malware attack in which the cybercriminal encrypts a file or a device and then demands a payment from the victim. There are many different variants of ransomware, and they continue to evolve. The number of IoT devices has been increasing over the years. IoT devices also face a considerable challenge from ransomware. In this study, a survey was administered to 27 Information Technology (IT) professionals. They were asked if they would recommend an organization attacked by ransomware to pay the ransom. The data collected from the professionals was analyzed, and the results indicated that only 4% would pay. Furthermore, the number of those who would not pay or were not sure was evenly divided at 48%. Moreover, the results indicate that the decision to pay or not to pay is difficult even for IT professionals with many years of experience in the field. The literature review revealed that the decision whether to pay or not to pay is a business decision. Some factors to consider when choosing to pay or not pay were presented. The use of cybersecurity insurance with ransomware coverage is recommended. Practices that can prevent ransomware attacks were covered and they include educating users, backups, and multi-layer security.
{"title":"Ransomware: To Pay or Not to Pay? The results of what IT professionals recommend","authors":"Stephen Mujeye","doi":"10.1145/3520084.3520096","DOIUrl":"https://doi.org/10.1145/3520084.3520096","url":null,"abstract":"The number of ransomware attacks has been on the rise. Ransomware is a malware attack in which the cybercriminal encrypts a file or a device and then demands a payment from the victim. There are many different variants of ransomware, and they continue to evolve. The number of IoT devices has been increasing over the years. IoT devices also face a considerable challenge from ransomware. In this study, a survey was administered to 27 Information Technology (IT) professionals. They were asked if they would recommend an organization attacked by ransomware to pay the ransom. The data collected from the professionals was analyzed, and the results indicated that only 4% would pay. Furthermore, the number of those who would not pay or were not sure was evenly divided at 48%. Moreover, the results indicate that the decision to pay or not to pay is difficult even for IT professionals with many years of experience in the field. The literature review revealed that the decision whether to pay or not to pay is a business decision. Some factors to consider when choosing to pay or not pay were presented. The use of cybersecurity insurance with ransomware coverage is recommended. Practices that can prevent ransomware attacks were covered and they include educating users, backups, and multi-layer security.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133594914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The rapid development and frequent revolutions in information technology (like Edge Computing, Wireless Sensor Network) highlight the significance of Internet of Things. Nowadays, a variety of infrastructures from diverse fields are limited by external and internal environmental factors. In actual operation, these factors may cause serious anomalies and aggravate the burden of facilities’ maintenance. With a rise in the number and running time, the performance of these facilities would be unstable and complex. This paper proposes a deep learning framework (CLAD) to do adaptive anomaly detection. It implements dynamic anomaly thresholding based on the prediction of incremental Long Short-Term Memory. This framework employs a replay buffer to solve the decline of detection accuracy. With this framework, models can keep perfect detection accuracy under a quite high load (time and number). This framework is valuable for further research of adaptive anomaly detection.
{"title":"CLAD: A Deep Learning Framework for Continually Learning in Anomaly Detection","authors":"Yu Cao, Hong-sheng Gan","doi":"10.1145/3520084.3520109","DOIUrl":"https://doi.org/10.1145/3520084.3520109","url":null,"abstract":"The rapid development and frequent revolutions in information technology (like Edge Computing, Wireless Sensor Network) highlight the significance of Internet of Things. Nowadays, a variety of infrastructures from diverse fields are limited by external and internal environmental factors. In actual operation, these factors may cause serious anomalies and aggravate the burden of facilities’ maintenance. With a rise in the number and running time, the performance of these facilities would be unstable and complex. This paper proposes a deep learning framework (CLAD) to do adaptive anomaly detection. It implements dynamic anomaly thresholding based on the prediction of incremental Long Short-Term Memory. This framework employs a replay buffer to solve the decline of detection accuracy. With this framework, models can keep perfect detection accuracy under a quite high load (time and number). This framework is valuable for further research of adaptive anomaly detection.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the continuous innovation of computer software technology, the e-government and other related information work of government departments has received increasing attention. Ministry-level information software projects are characterized by large scale, wide range of users, complex business logic, long project cycle, and large amount of post-operation and maintenance. In order to guarantee the quality of software projects, improve work efficiency, strengthen software process management capability, and effectively deal with software project risks, the article takes SW-CMM model as the basic framework, starts from three management models: project management process, engineering management process, and support activity process, and splits them into 12 sub-process domains according to the actual needs, and elaborates and analyzes the software process improvement of ministry-level information projects The main points of software process improvement for ministry-level information technology projects are elaborated and analyzed. Combining with the software engineering process improvement practices of actual software organizations, the corresponding implementation strategies are elaborated in six aspects, including controlling key links, covering the whole life cycle, promoting development standards and specifications, strengthening requirements management, enhancing project asset management and strengthening risk management, which provide an optimal solution for the process improvement of ministry-level software projects.
{"title":"Research and practice of ministry-level software process improvement based on SW − CMM model","authors":"Xuefei Wang, KongYi Wu","doi":"10.1145/3520084.3520094","DOIUrl":"https://doi.org/10.1145/3520084.3520094","url":null,"abstract":"With the continuous innovation of computer software technology, the e-government and other related information work of government departments has received increasing attention. Ministry-level information software projects are characterized by large scale, wide range of users, complex business logic, long project cycle, and large amount of post-operation and maintenance. In order to guarantee the quality of software projects, improve work efficiency, strengthen software process management capability, and effectively deal with software project risks, the article takes SW-CMM model as the basic framework, starts from three management models: project management process, engineering management process, and support activity process, and splits them into 12 sub-process domains according to the actual needs, and elaborates and analyzes the software process improvement of ministry-level information projects The main points of software process improvement for ministry-level information technology projects are elaborated and analyzed. Combining with the software engineering process improvement practices of actual software organizations, the corresponding implementation strategies are elaborated in six aspects, including controlling key links, covering the whole life cycle, promoting development standards and specifications, strengthening requirements management, enhancing project asset management and strengthening risk management, which provide an optimal solution for the process improvement of ministry-level software projects.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124991833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The situation we are facing right now because of the COVID-19 virus is rapidly changing and gives a noticeable impact. Everything has become an online-based activity, which leads to the increasing number of internet and social media users. On the other hand, business owners need to find new ways to survive in the new normal situation. With that in mind, business owners can take advantage of the internet and social media as a marketplace. Social media is a perfect fit for an O2O (Online-to-Offline or Offline-to-Online) implementation. O2O method strategy is designed to educate more than half of online customers of the product's information. The purpose of this study is to analyze the O2O channel via social media as a marketing place. This research uses the quantitative method and snowball sampling method. The result of this study shows that 98.7% of Generation Z have already shopped online before and are using social media to seek information about product's information. The result of this study can be used to help the business owners to determine the right strategy for their business, either implementing Online-to-Offline or Offline-to-Online business model in this pandemic situation.
{"title":"Analysis Factors that Influence the Increasing of Generation Z's Interest in Using Social Media as the Implementation of Online to Offline and Offline to Online Business Model in Pandemic Era at Indonesia","authors":"Dyadra Audreyta Aliftya Kurniawan, Jihan Baisa, Vania Mashandra Zahra, Yohannes Kurniawan","doi":"10.1145/3520084.3520117","DOIUrl":"https://doi.org/10.1145/3520084.3520117","url":null,"abstract":"The situation we are facing right now because of the COVID-19 virus is rapidly changing and gives a noticeable impact. Everything has become an online-based activity, which leads to the increasing number of internet and social media users. On the other hand, business owners need to find new ways to survive in the new normal situation. With that in mind, business owners can take advantage of the internet and social media as a marketplace. Social media is a perfect fit for an O2O (Online-to-Offline or Offline-to-Online) implementation. O2O method strategy is designed to educate more than half of online customers of the product's information. The purpose of this study is to analyze the O2O channel via social media as a marketing place. This research uses the quantitative method and snowball sampling method. The result of this study shows that 98.7% of Generation Z have already shopped online before and are using social media to seek information about product's information. The result of this study can be used to help the business owners to determine the right strategy for their business, either implementing Online-to-Offline or Offline-to-Online business model in this pandemic situation.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121352072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kretawiweka Nuraga Sani, E. K. Budiardjo, Kodrat Mahatma
The Covid-19 pandemic has changed many things in our activities, including how we work. Almost all countries, including Indonesia, require remote working or working from home, including technology companies. Many technology companies use Scrum as a framework for their software development. Because of Scrum framework flexibility, organizations with different work cultures can adapt. However, the Covid-19 pandemic forced the team to work remotely and adjust to this separation situation. In this research, we want to determine how this situation influences software development activities in Scrum-based software development in Indonesia. We interview Scrum Experts in three leading e-commerce companies in Indonesia during the pandemic in 2021. Experts found no significant obstacles or impacts when running Scrum during the Covid-19 pandemic remote working. As the research result, the organization needs to consider technical and non-technical aspects to maintain the Scrum team's productivity during the Covid-19 pandemic. Based on interview and survey, as many as 37% of expert Scrum Team state that the product backlog management needs attention because most Scrum teams don't regularly manage the tasks on the product backlog item, so old tasks are drowned out with lots of new tasks added to the list. The Scrum team must also pay more attention to self-discipline to stay focused while working from home. As many as 73% of expert Scrum Team express that the Indonesian E-Commerce Companies must also provide the Scrum team with self-development initiatives to remain motivated.
{"title":"Impact of Remote Working During Covid-19 Pandemic on Scrum Team: Experts View on Indonesian E-Commerce Companies Case","authors":"Kretawiweka Nuraga Sani, E. K. Budiardjo, Kodrat Mahatma","doi":"10.1145/3520084.3520089","DOIUrl":"https://doi.org/10.1145/3520084.3520089","url":null,"abstract":"The Covid-19 pandemic has changed many things in our activities, including how we work. Almost all countries, including Indonesia, require remote working or working from home, including technology companies. Many technology companies use Scrum as a framework for their software development. Because of Scrum framework flexibility, organizations with different work cultures can adapt. However, the Covid-19 pandemic forced the team to work remotely and adjust to this separation situation. In this research, we want to determine how this situation influences software development activities in Scrum-based software development in Indonesia. We interview Scrum Experts in three leading e-commerce companies in Indonesia during the pandemic in 2021. Experts found no significant obstacles or impacts when running Scrum during the Covid-19 pandemic remote working. As the research result, the organization needs to consider technical and non-technical aspects to maintain the Scrum team's productivity during the Covid-19 pandemic. Based on interview and survey, as many as 37% of expert Scrum Team state that the product backlog management needs attention because most Scrum teams don't regularly manage the tasks on the product backlog item, so old tasks are drowned out with lots of new tasks added to the list. The Scrum team must also pay more attention to self-discipline to stay focused while working from home. As many as 73% of expert Scrum Team express that the Indonesian E-Commerce Companies must also provide the Scrum team with self-development initiatives to remain motivated.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Real estate resource is not only an important part of fixed assets in colleges and universities, but also a necessary place for schools to carry out teaching and scientific research activities. The orderly management of real estate in colleges and universities is the necessary basis for the development of school education. With the continuous expansion of the school running scale, the total demand for public housing resources in Chinese colleges and universities has increased unabatedly, but the housing utilization rate of each unit is extremely unbalanced. As the management means and management information construction of the school public housing management department are relatively backward, which has brought many problems to the public housing management. Taking W school as an example, this paper has established a unified housing resource database through information technology, and built a public housing management information system based on Geographic Information Systems (GIS) technology, realizes the comprehensive management of "campus-partition-building-floor-room", comprehensively covers all kinds of business needs of public housing management, effectively improves the level of public housing management.
{"title":"Research and Practice on Information Construction of Public Housing in Colleges and Universities","authors":"Xue Luo, Jun Xiao, Bingsong Qian","doi":"10.1145/3520084.3520122","DOIUrl":"https://doi.org/10.1145/3520084.3520122","url":null,"abstract":"Real estate resource is not only an important part of fixed assets in colleges and universities, but also a necessary place for schools to carry out teaching and scientific research activities. The orderly management of real estate in colleges and universities is the necessary basis for the development of school education. With the continuous expansion of the school running scale, the total demand for public housing resources in Chinese colleges and universities has increased unabatedly, but the housing utilization rate of each unit is extremely unbalanced. As the management means and management information construction of the school public housing management department are relatively backward, which has brought many problems to the public housing management. Taking W school as an example, this paper has established a unified housing resource database through information technology, and built a public housing management information system based on Geographic Information Systems (GIS) technology, realizes the comprehensive management of \"campus-partition-building-floor-room\", comprehensively covers all kinds of business needs of public housing management, effectively improves the level of public housing management.","PeriodicalId":444957,"journal":{"name":"Proceedings of the 2022 5th International Conference on Software Engineering and Information Management","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131083629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}