首页 > 最新文献

ACM Transactions on Management Information Systems最新文献

英文 中文
Peer-to-Peer (P2P) Lending Risk Management: Assessing Credit Risk on Social Lending Platforms Using Textual Factors P2P借贷风险管理:利用文本因素评估社会借贷平台上的信用风险
IF 2.5 Q2 Computer Science Pub Date : 2023-03-28 DOI: 10.1145/3589003
Michael Siering
Peer-to-peer (P2P) lending platforms offer Internet users the possibility to borrow money from peers without the intervention of traditional financial institutions. Due to the anonymity on such social lending platforms, determining the creditworthiness of borrowers is of high importance. Beyond the disclosure of traditional financial variables that enable risk assessment, peer-to-peer lending platforms offer the opportunity to reveal additional information on the loan purpose. We investigate whether this self-disclosed information is used to show reliability and to outline creditworthiness of platform participants. We analyze more than 70,000 loans funded at a leading social lending platform. We show that linguistic and content-based factors help to explain a loan's probability of default and that content-based factors are more important than linguistic variables. Surprisingly, not every information provided by borrowers underlines creditworthiness. Instead, certain aspects rather indicate a higher probability of default. Our study provides important insights on information disclosure in the context of peer-to-peer lending, shows how to increase performance in credit scoring and is highly relevant for the stakeholders on social lending platforms.
P2P借贷平台为互联网用户提供了在没有传统金融机构干预的情况下向同行借款的可能性。由于此类社交贷款平台的匿名性,确定借款人的信用度非常重要。除了披露能够进行风险评估的传统财务变量外,点对点借贷平台还提供了披露贷款目的额外信息的机会。我们调查了这些自我披露的信息是否用于显示可靠性和概述平台参与者的信誉。我们分析了一家领先的社会贷款平台提供的7万多笔贷款。我们发现,语言和基于内容的因素有助于解释贷款的违约概率,基于内容的因子比语言变量更重要。令人惊讶的是,并非借款人提供的每一条信息都强调了信用。相反,某些方面表明违约的可能性更高。我们的研究为点对点借贷背景下的信息披露提供了重要见解,展示了如何提高信用评分的绩效,并与社交借贷平台上的利益相关者高度相关。
{"title":"Peer-to-Peer (P2P) Lending Risk Management: Assessing Credit Risk on Social Lending Platforms Using Textual Factors","authors":"Michael Siering","doi":"10.1145/3589003","DOIUrl":"https://doi.org/10.1145/3589003","url":null,"abstract":"Peer-to-peer (P2P) lending platforms offer Internet users the possibility to borrow money from peers without the intervention of traditional financial institutions. Due to the anonymity on such social lending platforms, determining the creditworthiness of borrowers is of high importance. Beyond the disclosure of traditional financial variables that enable risk assessment, peer-to-peer lending platforms offer the opportunity to reveal additional information on the loan purpose. We investigate whether this self-disclosed information is used to show reliability and to outline creditworthiness of platform participants. We analyze more than 70,000 loans funded at a leading social lending platform. We show that linguistic and content-based factors help to explain a loan's probability of default and that content-based factors are more important than linguistic variables. Surprisingly, not every information provided by borrowers underlines creditworthiness. Instead, certain aspects rather indicate a higher probability of default. Our study provides important insights on information disclosure in the context of peer-to-peer lending, shows how to increase performance in credit scoring and is highly relevant for the stakeholders on social lending platforms.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47469514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on Design and Data Science Research in Healthcare 医疗保健设计与数据科学研究特刊简介
IF 2.5 Q2 Computer Science Pub Date : 2023-03-13 DOI: 10.1145/3579646
G. Leroy, B. Tulu, Xiao Liu
For many decades, ‘design science’ was used to depict the process around the systematic formation of artifacts. In information systems, the term is used more broadly to describe systematic approaches to creating an expansive set of diverse artifacts, ranging from knowledge frameworks to full-fledged information systems. Design science in information systems denotes research that focuses on the creation of new technology, knowledge about technology, and the process of creation. ‘Data science’ refers to an interdisciplinary field that focuses on data and its collection, preparation, and integration. Although different from ‘design science,’ ‘data science’ also has seen increasing use in the information systems (IS) literature. The growing availability of high-quality software libraries and technology to reuse existing code has most likely contributed to this increase. Regardless, data science research plays an essential role in the increase in design science research. Hevner et al. [2004] portray design science in a framework comprised of the environment, information systems research, and an application domain. They suggest that design science research addresses important unsolved problems in unique or innovative ways or that it solves problems in more effective or efficient ways. Similarly, the Design Science Research knowledge contribution framework later developed by Gregor and Hevner [2013] proposes three types of research contributions: developing new solutions for known problems, extending known solutions to new problems, and inventing new solutions for new problems. In contrast to other computing fields, the IS field has historically emphasized using kernel theories to invent, adjust, and improve artifacts. However, notable contributions can also be made without reliance on kernel theories in the intersection of data science and design science. For example, no comprehensive theories explain why artificial neural networks (ANNs) work as well as they do. And yet, ANNs serve as a cornerstone technology in most classification projects ranging from tumor identification in medicine to recognizing handwritten checks or recommendations in e-commerce. Even when theories exist, they may be irrelevant to the artifact design. For example,
几十年来,“设计科学”一直被用来描述人工制品系统形成的过程。在信息系统中,该术语被更广泛地用于描述创建一组广泛的不同工件的系统方法,从知识框架到成熟的信息系统。信息系统中的设计科学是指专注于新技术的创造、技术知识和创造过程的研究数据科学是指一个跨学科的领域,专注于数据及其收集、准备和集成。尽管与“设计科学”不同,“数据科学”在信息系统(IS)文献中的应用也越来越多。高质量软件库和重用现有代码的技术的不断增加很可能是导致这一增长的原因。无论如何,数据科学研究在设计科学研究的增长中起着至关重要的作用。Hevner等人[2004]在一个由环境、信息系统研究和应用领域组成的框架中描述了设计科学。他们认为,设计科学研究以独特或创新的方式解决重要的未解决问题,或者以更有效或高效的方式解决问题。类似地,Gregor和Hevner[2013]后来开发的设计科学研究知识贡献框架提出了三种类型的研究贡献:为已知问题开发新的解决方案,将已知的解决方案扩展到新问题,以及为新问题发明新的解决方案。与其他计算领域相比,IS领域历来强调使用内核理论来发明、调整和改进工件。然而,在数据科学和设计科学的交叉领域,也可以在不依赖核心理论的情况下做出显著贡献。例如,没有全面的理论可以解释为什么人工神经网络能像它们一样工作。然而,人工神经网络是大多数分类项目的基石技术,从医学中的肿瘤识别到电子商务中的手写支票或推荐。即使理论存在,它们也可能与工件设计无关。例如
{"title":"Introduction to the Special Issue on Design and Data Science Research in Healthcare","authors":"G. Leroy, B. Tulu, Xiao Liu","doi":"10.1145/3579646","DOIUrl":"https://doi.org/10.1145/3579646","url":null,"abstract":"For many decades, ‘design science’ was used to depict the process around the systematic formation of artifacts. In information systems, the term is used more broadly to describe systematic approaches to creating an expansive set of diverse artifacts, ranging from knowledge frameworks to full-fledged information systems. Design science in information systems denotes research that focuses on the creation of new technology, knowledge about technology, and the process of creation. ‘Data science’ refers to an interdisciplinary field that focuses on data and its collection, preparation, and integration. Although different from ‘design science,’ ‘data science’ also has seen increasing use in the information systems (IS) literature. The growing availability of high-quality software libraries and technology to reuse existing code has most likely contributed to this increase. Regardless, data science research plays an essential role in the increase in design science research. Hevner et al. [2004] portray design science in a framework comprised of the environment, information systems research, and an application domain. They suggest that design science research addresses important unsolved problems in unique or innovative ways or that it solves problems in more effective or efficient ways. Similarly, the Design Science Research knowledge contribution framework later developed by Gregor and Hevner [2013] proposes three types of research contributions: developing new solutions for known problems, extending known solutions to new problems, and inventing new solutions for new problems. In contrast to other computing fields, the IS field has historically emphasized using kernel theories to invent, adjust, and improve artifacts. However, notable contributions can also be made without reliance on kernel theories in the intersection of data science and design science. For example, no comprehensive theories explain why artificial neural networks (ANNs) work as well as they do. And yet, ANNs serve as a cornerstone technology in most classification projects ranging from tumor identification in medicine to recognizing handwritten checks or recommendations in e-commerce. Even when theories exist, they may be irrelevant to the artifact design. For example,","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43220133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Situational Factor Determinants of the Allocation of Decision Rights to Edge Computers 边缘计算机决策权分配的情境因素决定因素
IF 2.5 Q2 Computer Science Pub Date : 2023-02-17 DOI: 10.1145/3582081
C. Chua, F. Niederman
Internet of Things (IoT) designers frequently must determine whether action-oriented decisions should be made by edge computers or whether they should be made only by central servers combining input from all edge computers. An important example of this design problem occurs in fire protection IoT, where individual edge computers attached to sensors might be empowered to make decisions (have decision rights) about how to manage the fire. Alternatively, decision rights could be held exclusively by a central server isolated from the fire, because the designer is concerned damage to edge computers could cause them to act unreliably. This research models this allocation of decision rights to identify the relative influence of various decision factors. We first model the allocation of decision rights under the following assumptions: (1) The central server cannot make an error the edge computer cannot make; (2) the central server cannot update the edge computer with its information in a timely manner; and (3) the central server cannot reverse an action initiated by the edge computer to explore the factors impacting decision rights conferral. We then relax each of these three assumptions. We show how relaxing each assumption radically changes the factors impacting decision rights conferral. We also show that allowing the central server to update information on the edge computer or reverse the edge computer's decision making can result in overall lower system performance. We then perform a series of numerical experiments to understand how changing various parameters affect the problem. We show for the general real-world scenario, the key factor influencing the decision is the ability of the edge computer to detect false alarms. We also show magnitude of loss and ratio of real to false incidents have a linear and logarithmic relationship to the reliability of the edge computer.
物联网(IoT)设计师经常必须确定是由边缘计算机做出面向行动的决策,还是仅由中央服务器结合所有边缘计算机的输入做出决策。这种设计问题的一个重要例子发生在消防物联网中,连接到传感器的单个边缘计算机可能有权就如何管理火灾做出决定(拥有决策权)。或者,决策权可以由与火灾隔离的中央服务器独家拥有,因为设计者担心边缘计算机的损坏可能会导致它们的行为不可靠。本研究对这种决策权的分配进行建模,以确定各种决策因素的相对影响。我们首先在以下假设下对决策权的分配进行建模:(1)中央服务器不能犯边缘计算机不能犯的错误;(2) 中央服务器不能及时地用其信息更新边缘计算机;以及(3)中央服务器不能逆转边缘计算机发起的探索影响决策权授予的因素的动作。然后我们放松这三个假设中的每一个。我们展示了放松每一个假设如何从根本上改变影响决策权授予的因素。我们还表明,允许中央服务器更新边缘计算机上的信息或逆转边缘计算机的决策可能会导致整体系统性能降低。然后,我们进行了一系列数值实验,以了解改变各种参数如何影响问题。我们表明,对于一般的真实世界场景,影响决策的关键因素是边缘计算机检测假警报的能力。我们还表明,损失的大小和真实与虚假事件的比率与边缘计算机的可靠性具有线性和对数关系。
{"title":"Situational Factor Determinants of the Allocation of Decision Rights to Edge Computers","authors":"C. Chua, F. Niederman","doi":"10.1145/3582081","DOIUrl":"https://doi.org/10.1145/3582081","url":null,"abstract":"Internet of Things (IoT) designers frequently must determine whether action-oriented decisions should be made by edge computers or whether they should be made only by central servers combining input from all edge computers. An important example of this design problem occurs in fire protection IoT, where individual edge computers attached to sensors might be empowered to make decisions (have decision rights) about how to manage the fire. Alternatively, decision rights could be held exclusively by a central server isolated from the fire, because the designer is concerned damage to edge computers could cause them to act unreliably. This research models this allocation of decision rights to identify the relative influence of various decision factors. We first model the allocation of decision rights under the following assumptions: (1) The central server cannot make an error the edge computer cannot make; (2) the central server cannot update the edge computer with its information in a timely manner; and (3) the central server cannot reverse an action initiated by the edge computer to explore the factors impacting decision rights conferral. We then relax each of these three assumptions. We show how relaxing each assumption radically changes the factors impacting decision rights conferral. We also show that allowing the central server to update information on the edge computer or reverse the edge computer's decision making can result in overall lower system performance. We then perform a series of numerical experiments to understand how changing various parameters affect the problem. We show for the general real-world scenario, the key factor influencing the decision is the ability of the edge computer to detect false alarms. We also show magnitude of loss and ratio of real to false incidents have a linear and logarithmic relationship to the reliability of the edge computer.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44090475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Suboptimal is Work-From-Home Security in IT/ICS Enterprises? A Strategic Organizational Theory for Managers IT/ICS企业在家办公的安全性有多不理想?管理者的战略组织理论
IF 2.5 Q2 Computer Science Pub Date : 2023-02-15 DOI: 10.1145/3579645
R. Pal, Rohan Xavier Sequeira, Y. Zhu, Angelica Marotta, Michael Siegel, Edward Y. Hua
The COVID-19 pandemic (e.g., especially the first and second COVID waves) had forced firms (organizations) to radically shift a considerable (if not all) proportion of their employees to serve in a work-from-home (WFH) mode. Industry statistics showcase that despite ushering in significant work-flexibility (and other) benefits, the WFH mode has also expanded an organization’s cyber-vulnerability space, and increased the number of cyber-breaches in IT and IT-OT systems (e.g., ICSs). This leads us to an important fundamental question: is the WFH paradigm detrimental to IT and IoT-driven ICS security in general? While vulnerability reasoning and empirical statistics might qualitatively support an affirmative answer to this question, a rigorous, practically motivated, and strategic cost-benefit analysis is yet to be conducted to establish in principle whether and to what degree WFH-induced cyber-security in an IT/ICS system is sub-optimal when compared to that in the non-WFH work mode. We propose a novel and rigorous strategic method to dynamically quantify the degree of sub-optimal cyber-security in an IT/ICS organization of employees, all of whom work in heterogeneous WFH “siloes”. We first derive as benchmark for a WFH setting - the centrally-planned socially optimal aggregate employee effort in cyber-security best practices at any given time instant. We then derive and compute (using Breton’s Nash equilibrium computation algorithm for stochastic dynamic games) for for the same setting - the distributed time-varying strategic Nash equilibrium amount of aggregate employee effort in cyber-security. The time-varying ratios of these centralized and distributed estimates quantify the free riding dynamics, i.e., a proxy concept for security sub-optimality, within an IT/ICS organization for the WFH setting. We finally compare the free-riding ratio between WFH and non-WFH work modes to gauge the (possible) extent of the increase (lower bound) in security sub-optimality when the organization operates in a WFH mode. We counter-intuitively observe through extensive real-world-trace-driven Monte Carlo simulations that the maximum of the time-dependent median increase in the related security sub-optimality ranges around 25% but decreases fast with time to near 0% (implying security sub-optimality in the WFH mode equals that in the non-WFH mode) if the impact of employee security effort is time-accumulative (sustainable) even for short time intervals.
新冠肺炎大流行(例如,特别是第一波和第二波新冠肺炎)迫使公司(组织)从根本上改变相当大比例(如果不是全部)的员工以工作-工作(WFH)模式服务。行业统计数据显示,尽管WFH模式带来了显著的工作灵活性(和其他)好处,但它也扩大了组织的网络漏洞空间,并增加了IT和IT-OT系统(如ICSs)中的网络漏洞数量。这就引出了一个重要的基本问题:WFH范式总体上是否对IT和物联网驱动的ICS安全有害?虽然脆弱性推理和经验统计可能在质量上支持对这个问题的肯定回答,但仍需进行严格的、有实际动机的和战略性的成本效益分析,以原则上确定与非WFH工作模式相比,IT/ICS系统中WFH引发的网络安全是否以及在多大程度上是次优的。我们提出了一种新颖而严格的战略方法来动态量化IT/ICS员工组织中的次优网络安全程度,所有员工都在异构的WFH“siloes”中工作。我们首先推导出WFH设置的基准——在任何给定的时刻,网络安全最佳实践中集中规划的社会最优员工总努力。然后,我们推导并计算(使用随机动态博弈的Breton纳什均衡计算算法)相同设置的网络安全中员工总努力的分布式时变策略纳什均衡量。这些集中和分布式估计的时变比率量化了搭便车的动态,即WFH设置的IT/ICS组织内的安全次最优的代理概念。最后,我们比较了WFH和非WFH工作模式之间的搭便车率,以衡量当组织在WFH模式下运行时,安全次最优增加(下限)的(可能)程度。我们通过广泛的真实世界跟踪驱动的蒙特卡罗模拟直观地观察到,如果员工安全工作的影响是时间累积的,则相关安全次最优性的时间相关中值增加的最大值在25%左右,但随着时间的推移迅速下降到接近0%(这意味着WFH模式下的安全次最性等于非WFH模式中的安全次最优)(可持续的)即使是短时间间隔。
{"title":"How Suboptimal is Work-From-Home Security in IT/ICS Enterprises? A Strategic Organizational Theory for Managers","authors":"R. Pal, Rohan Xavier Sequeira, Y. Zhu, Angelica Marotta, Michael Siegel, Edward Y. Hua","doi":"10.1145/3579645","DOIUrl":"https://doi.org/10.1145/3579645","url":null,"abstract":"The COVID-19 pandemic (e.g., especially the first and second COVID waves) had forced firms (organizations) to radically shift a considerable (if not all) proportion of their employees to serve in a work-from-home (WFH) mode. Industry statistics showcase that despite ushering in significant work-flexibility (and other) benefits, the WFH mode has also expanded an organization’s cyber-vulnerability space, and increased the number of cyber-breaches in IT and IT-OT systems (e.g., ICSs). This leads us to an important fundamental question: is the WFH paradigm detrimental to IT and IoT-driven ICS security in general? While vulnerability reasoning and empirical statistics might qualitatively support an affirmative answer to this question, a rigorous, practically motivated, and strategic cost-benefit analysis is yet to be conducted to establish in principle whether and to what degree WFH-induced cyber-security in an IT/ICS system is sub-optimal when compared to that in the non-WFH work mode. We propose a novel and rigorous strategic method to dynamically quantify the degree of sub-optimal cyber-security in an IT/ICS organization of employees, all of whom work in heterogeneous WFH “siloes”. We first derive as benchmark for a WFH setting - the centrally-planned socially optimal aggregate employee effort in cyber-security best practices at any given time instant. We then derive and compute (using Breton’s Nash equilibrium computation algorithm for stochastic dynamic games) for for the same setting - the distributed time-varying strategic Nash equilibrium amount of aggregate employee effort in cyber-security. The time-varying ratios of these centralized and distributed estimates quantify the free riding dynamics, i.e., a proxy concept for security sub-optimality, within an IT/ICS organization for the WFH setting. We finally compare the free-riding ratio between WFH and non-WFH work modes to gauge the (possible) extent of the increase (lower bound) in security sub-optimality when the organization operates in a WFH mode. We counter-intuitively observe through extensive real-world-trace-driven Monte Carlo simulations that the maximum of the time-dependent median increase in the related security sub-optimality ranges around 25% but decreases fast with time to near 0% (implying security sub-optimality in the WFH mode equals that in the non-WFH mode) if the impact of employee security effort is time-accumulative (sustainable) even for short time intervals.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42863814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Determinants of Health and ER Utilization: Role of Information Integration during COVID-19 健康和ER利用的社会决定因素:新冠肺炎期间信息整合的作用
IF 2.5 Q2 Computer Science Pub Date : 2023-02-07 DOI: 10.1145/3583077
Tian-Ze Guo, I. Bardhan, Anjum Khurshid
Emergency room (ER) admissions are the front door for the utilization of a community's health resources and serve as a valuable proxy for a community health system's capacity. While recent research suggests that social determinants of health (SDOH) are important predictors of patient health outcomes, their impact on ER utilization during the COVID-19 pandemic is not well understood. Further, the role of hospital information integration in moderating the impact of SDOH on ER utilization has not received adequate attention. Utilizing longitudinal claims data from a regional health information exchange spanning six years including the COVID-19 period, we study how SDOH affects ER utilization and whether effective integration of patient health information across hospitals can moderate its impact. Our results suggest that a patient's economic well-being significantly reduces future ER utilization. The magnitude of this relationship is significant when patients are treated at hospitals with high information integration but is weaker when patients receive care at hospitals with lower levels of information integration. Instead, patients' family and social support can reduce ER utilization when they are treated at hospitals with low information integration. In other words, different dimensions of SDOH are important in low versus high information integration conditions. Furthermore, predictive modeling shows that patient visit type and prior visit history can significantly improve the predictive accuracy of ER utilization. Our research implications support efforts to develop national standards for the collection and sharing of SDOH data, and their use and interpretation for clinical decision making by healthcare providers and policy makers.
急诊室(ER)入院是利用社区卫生资源的前门,也是社区卫生系统能力的宝贵代表。尽管最近的研究表明,健康的社会决定因素(SDOH)是患者健康结果的重要预测因素,但在新冠肺炎大流行期间,它们对ER利用的影响尚不清楚。此外,医院信息整合在调节SDOH对ER利用的影响方面的作用还没有得到足够的重视。利用包括新冠肺炎期间在内的六年区域健康信息交换的纵向索赔数据,我们研究了SDOH如何影响ER的利用,以及医院间患者健康信息的有效整合是否可以缓和其影响。我们的研究结果表明,患者的经济状况显著降低了未来ER的利用率。当患者在信息集成度高的医院接受治疗时,这种关系的重要性是显著的,但当患者在信息化程度较低的医院接受护理时,这种联系就较弱了。相反,当患者在信息集成度低的医院接受治疗时,患者的家庭和社会支持会降低ER的利用率。换句话说,SDOH的不同维度在低信息集成条件与高信息集成条件下是重要的。此外,预测模型显示,患者就诊类型和既往就诊史可以显著提高ER利用率的预测准确性。我们的研究意义支持制定SDOH数据收集和共享的国家标准,以及医疗保健提供者和政策制定者对其临床决策的使用和解释。
{"title":"Social Determinants of Health and ER Utilization: Role of Information Integration during COVID-19","authors":"Tian-Ze Guo, I. Bardhan, Anjum Khurshid","doi":"10.1145/3583077","DOIUrl":"https://doi.org/10.1145/3583077","url":null,"abstract":"Emergency room (ER) admissions are the front door for the utilization of a community's health resources and serve as a valuable proxy for a community health system's capacity. While recent research suggests that social determinants of health (SDOH) are important predictors of patient health outcomes, their impact on ER utilization during the COVID-19 pandemic is not well understood. Further, the role of hospital information integration in moderating the impact of SDOH on ER utilization has not received adequate attention. Utilizing longitudinal claims data from a regional health information exchange spanning six years including the COVID-19 period, we study how SDOH affects ER utilization and whether effective integration of patient health information across hospitals can moderate its impact. Our results suggest that a patient's economic well-being significantly reduces future ER utilization. The magnitude of this relationship is significant when patients are treated at hospitals with high information integration but is weaker when patients receive care at hospitals with lower levels of information integration. Instead, patients' family and social support can reduce ER utilization when they are treated at hospitals with low information integration. In other words, different dimensions of SDOH are important in low versus high information integration conditions. Furthermore, predictive modeling shows that patient visit type and prior visit history can significantly improve the predictive accuracy of ER utilization. Our research implications support efforts to develop national standards for the collection and sharing of SDOH data, and their use and interpretation for clinical decision making by healthcare providers and policy makers.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49599485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach 为云存储实现高效的重复数据消除和安全的去中心化公共审计:一种可还原的区块链方法
IF 2.5 Q2 Computer Science Pub Date : 2023-01-30 DOI: 10.1145/3578555
Rahul Mishra, D. Ramesh, S. Kanhere, D. Edla
Public auditing and data deduplication are integral considerations in providing efficient and secure cloud storage services. Nevertheless, the traditional data deduplication models that support public auditing can endure the enormous waste of storage and computation resources induced through data redundancy and repeated audit work by multiple tenants on trusted third-party auditor (TPA). In this work, we introduce blockchain-based secure decentralized public auditing in a decentralized cloud storage with an efficient deduplication model. We employ blockchain to take on the task of centralized TPA, which also mitigates the implications of malicious blockchain miners by using the concept of a decentralized autonomous organization (DAO). Specifically, we employ the idea of redactability for blockchain to handle often neglected security issues that would adversely affect the integrity of stored auditing records on blockchain in decentralized auditing models. However, the proposed model also employs an efficient deduplication scheme to attain adequate storage savings while preserving the users from data loss due to duplicate faking attacks. Moreover, the detailed concrete security analysis demonstrates the computational infeasibility of the proposed model against proof-of-ownership, duplicate faking attack (DFA), collusion attack, storage free-riding attack, data privacy, and forgery attack with high efficiency. Finally, the comprehensive performance analysis shows the scalability and feasibility of the proposed model.
在提供高效安全的云存储服务时,公共审计和重复数据消除是不可或缺的考虑因素。尽管如此,支持公共审计的传统重复数据消除模型可以承受由于数据冗余和多个租户对可信第三方审计师(TPA)的重复审计工作而导致的存储和计算资源的巨大浪费。在这项工作中,我们在具有高效重复数据消除模型的去中心化云存储中引入了基于区块链的安全去中心化公共审计。我们使用区块链来承担集中式TPA的任务,这也通过使用去中心化自治组织(DAO)的概念来减轻恶意区块链矿工的影响。具体而言,我们采用区块链可编辑性的思想来处理经常被忽视的安全问题,这些问题会对去中心化审计模型中区块链上存储的审计记录的完整性产生不利影响。然而,所提出的模型还采用了一种高效的重复数据消除方案,以获得足够的存储节省,同时保护用户免受重复伪造攻击造成的数据丢失。此外,详细的具体安全分析证明了所提出的模型在高效抵御所有权证明、重复伪造攻击(DFA)、共谋攻击、存储搭便车攻击、数据隐私和伪造攻击方面的计算不可行性。最后,综合性能分析表明了该模型的可扩展性和可行性。
{"title":"Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach","authors":"Rahul Mishra, D. Ramesh, S. Kanhere, D. Edla","doi":"10.1145/3578555","DOIUrl":"https://doi.org/10.1145/3578555","url":null,"abstract":"Public auditing and data deduplication are integral considerations in providing efficient and secure cloud storage services. Nevertheless, the traditional data deduplication models that support public auditing can endure the enormous waste of storage and computation resources induced through data redundancy and repeated audit work by multiple tenants on trusted third-party auditor (TPA). In this work, we introduce blockchain-based secure decentralized public auditing in a decentralized cloud storage with an efficient deduplication model. We employ blockchain to take on the task of centralized TPA, which also mitigates the implications of malicious blockchain miners by using the concept of a decentralized autonomous organization (DAO). Specifically, we employ the idea of redactability for blockchain to handle often neglected security issues that would adversely affect the integrity of stored auditing records on blockchain in decentralized auditing models. However, the proposed model also employs an efficient deduplication scheme to attain adequate storage savings while preserving the users from data loss due to duplicate faking attacks. Moreover, the detailed concrete security analysis demonstrates the computational infeasibility of the proposed model against proof-of-ownership, duplicate faking attack (DFA), collusion attack, storage free-riding attack, data privacy, and forgery attack with high efficiency. Finally, the comprehensive performance analysis shows the scalability and feasibility of the proposed model.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43562966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incorporating Multiple Knowledge Sources for Targeted Aspect-based Financial Sentiment Analysis 结合多个知识来源进行针对性的面向方面的金融情绪分析
IF 2.5 Q2 Computer Science Pub Date : 2023-01-30 DOI: 10.1145/3580480
Kelvin Du, Frank Xing, E. Cambria
Combining symbolic and subsymbolic methods has become a promising strategy as research tasks in AI grow increasingly complicated and require higher levels of understanding. Targeted Aspect-based Financial Sentiment Analysis (TABFSA) is an example of such complicated tasks, as it involves processes like information extraction, information specification, and domain adaptation. However, little is known about the design principles of such hybrid models leveraging external lexical knowledge. To fill this gap, we define anterior, parallel, and posterior knowledge integration and propose incorporating multiple lexical knowledge sources strategically into the fine-tuning process of pre-trained transformer models for TABFSA. Experiments on the Financial Opinion mining and Question Answering challenge (FiQA) Task 1 and SemEval 2017 Task 5 datasets show that the knowledge-enabled models systematically improve upon their plain deep learning counterparts, and some outperform state-of-the-art results reported in terms of aspect sentiment analysis error. We discover that parallel knowledge integration is the most effective and domain-specific lexical knowledge is more important according to our ablation analysis.
随着人工智能研究任务越来越复杂,对理解水平的要求越来越高,将符号和子符号方法相结合已成为一种很有前途的策略。基于目标方面的金融情绪分析(TABFSA)就是这种复杂任务的一个例子,因为它涉及信息提取、信息规范和领域自适应等过程。然而,人们对利用外部词汇知识的这种混合模型的设计原理知之甚少。为了填补这一空白,我们定义了前向、平行和后向知识整合,并建议将多个词汇知识源战略性地纳入TABFSA的预训练转换模型的微调过程中。在金融意见挖掘和问答挑战(FiQA)任务1和SemEval 2017任务5数据集上的实验表明,基于知识的模型系统地改进了其简单的深度学习模型,并且在方面情绪分析误差方面,一些模型优于最先进的结果。根据我们的消融分析,我们发现平行知识整合是最有效的,而特定领域的词汇知识更为重要。
{"title":"Incorporating Multiple Knowledge Sources for Targeted Aspect-based Financial Sentiment Analysis","authors":"Kelvin Du, Frank Xing, E. Cambria","doi":"10.1145/3580480","DOIUrl":"https://doi.org/10.1145/3580480","url":null,"abstract":"Combining symbolic and subsymbolic methods has become a promising strategy as research tasks in AI grow increasingly complicated and require higher levels of understanding. Targeted Aspect-based Financial Sentiment Analysis (TABFSA) is an example of such complicated tasks, as it involves processes like information extraction, information specification, and domain adaptation. However, little is known about the design principles of such hybrid models leveraging external lexical knowledge. To fill this gap, we define anterior, parallel, and posterior knowledge integration and propose incorporating multiple lexical knowledge sources strategically into the fine-tuning process of pre-trained transformer models for TABFSA. Experiments on the Financial Opinion mining and Question Answering challenge (FiQA) Task 1 and SemEval 2017 Task 5 datasets show that the knowledge-enabled models systematically improve upon their plain deep learning counterparts, and some outperform state-of-the-art results reported in terms of aspect sentiment analysis error. We discover that parallel knowledge integration is the most effective and domain-specific lexical knowledge is more important according to our ablation analysis.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49278695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Don’t Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings 不需要所有鸡蛋放在一个篮子里:从单个领域嵌入重构客户的复合嵌入
IF 2.5 Q2 Computer Science Pub Date : 2023-01-18 DOI: 10.1145/3578710
Moshe Unger, Pan Li, Sahana (Shahana) Sen, A. Tuzhilin
Although building a 360-degree comprehensive view of a customer has been a long-standing goal in marketing, this challenge has not been successfully addressed in many marketing applications because fractured customer data stored across different “silos” are hard to integrate under “one roof” for several reasons. Instead of integrating customer data, in this article we propose to integrate several domain-specific partial customer views into one consolidated or composite customer profile using a Deep Learning-based method that is theoretically grounded in Kolmogorov’s Mapping Neural Network Existence Theorem. Furthermore, our method needs to securely access domain-specific or siloed customer data only once for building the initial customer embeddings. We conduct extensive studies on two industrial applications to demonstrate that our method effectively reconstructs stable composite customer embeddings that constitute strong approximations of the ground-truth composite embeddings obtained from integrating the siloed raw customer data. Moreover, we show that these data-security preserving reconstructed composite embeddings not only perform as well as the original ground-truth embeddings but significantly outperform partial embeddings and state-of-the-art baselines in recommendation and consumer preference prediction tasks.
尽管在市场营销中建立一个360度全面的客户视图一直是一个长期的目标,但这一挑战在许多市场营销应用程序中并没有成功解决,因为存储在不同“孤岛”上的破碎的客户数据很难整合到“一个屋檐下”,原因有几个。在本文中,我们建议使用基于深度学习的方法(理论上基于Kolmogorov的映射神经网络存在定理)将几个特定领域的部分客户视图集成到一个整合的或组合的客户配置文件中,而不是集成客户数据。此外,我们的方法只需要在构建初始客户嵌入时安全地访问一次特定于领域或孤立的客户数据。我们对两个工业应用进行了广泛的研究,以证明我们的方法有效地重建了稳定的复合客户嵌入,这些嵌入构成了通过集成孤立的原始客户数据获得的地真复合嵌入的强近似。此外,我们表明,这些保持数据安全的重建复合嵌入不仅表现得与原始的真值嵌入一样好,而且在推荐和消费者偏好预测任务中显著优于部分嵌入和最先进的基线。
{"title":"Don’t Need All Eggs in One Basket: Reconstructing Composite Embeddings of Customers from Individual-Domain Embeddings","authors":"Moshe Unger, Pan Li, Sahana (Shahana) Sen, A. Tuzhilin","doi":"10.1145/3578710","DOIUrl":"https://doi.org/10.1145/3578710","url":null,"abstract":"Although building a 360-degree comprehensive view of a customer has been a long-standing goal in marketing, this challenge has not been successfully addressed in many marketing applications because fractured customer data stored across different “silos” are hard to integrate under “one roof” for several reasons. Instead of integrating customer data, in this article we propose to integrate several domain-specific partial customer views into one consolidated or composite customer profile using a Deep Learning-based method that is theoretically grounded in Kolmogorov’s Mapping Neural Network Existence Theorem. Furthermore, our method needs to securely access domain-specific or siloed customer data only once for building the initial customer embeddings. We conduct extensive studies on two industrial applications to demonstrate that our method effectively reconstructs stable composite customer embeddings that constitute strong approximations of the ground-truth composite embeddings obtained from integrating the siloed raw customer data. Moreover, we show that these data-security preserving reconstructed composite embeddings not only perform as well as the original ground-truth embeddings but significantly outperform partial embeddings and state-of-the-art baselines in recommendation and consumer preference prediction tasks.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43435730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Toulmin's Argumentation Model to Enhance Trust in Analytics-Based Advice Giving Systems 使用Toulmin的论证模型增强基于分析的咨询系统的信任
IF 2.5 Q2 Computer Science Pub Date : 2023-01-18 DOI: 10.1145/3580479
E. Rubin, I. Benbasat
Ecommerce websites increasingly provide predictive analytics-based advice (PAA), such as advice about future potential price reductions. Establishing consumer-trust in these advice-giving systems imposes unique and novel challenges. First, PAA about future alternatives that can benefit the consumer appears to inherently contradict the business goal of selling a product quickly and at high profit margins. Second, PAA is based on mathematical models that are non-transparent to the user. Third, PAA advice is inherently uncertain, and can be perceived as subjectively imposed in algorithms. Utilizing Toulmin's argumentation-model, we investigate the influence of advice-justification statements in overcoming these difficulties. Based on three experimental studies, in which respondents are provided with the advice of PAA systems, we show evidence for the different roles Toulmin's statement-types play in enhancing various trusting-beliefs in PAA systems. Provision of warrants is mostly associated with enhanced competence beliefs; rebuttals with integrity beliefs; backings both competence and benevolence; and data statements enhance competence, integrity, and benevolence beliefs. Implications of the findings for research and practice are provided.
电子商务网站越来越多地提供基于预测分析的建议(PAA),例如关于未来潜在降价的建议。在这些建议提供系统中建立消费者信任带来了独特而新颖的挑战。首先,PAA关于未来的替代品可以使消费者受益,这似乎与快速和高利润率销售产品的业务目标内在矛盾。其次,PAA基于对用户不透明的数学模型。第三,PAA建议本质上是不确定的,可以被认为是主观强加在算法中的。利用图尔敏的论证模型,我们研究了建议-辩护陈述对克服这些困难的影响。基于三个实验研究,我们向被调查者提供了PAA系统的建议,我们证明了图尔敏的陈述类型在增强PAA系统中的各种信任信念方面所起的不同作用。提供认股权证主要与增强的能力信念有关;以诚信信念反驳;能力与仁心兼备;数据报表增强了能力、诚信和仁爱信念。研究结果对研究和实践的启示。
{"title":"Using Toulmin's Argumentation Model to Enhance Trust in Analytics-Based Advice Giving Systems","authors":"E. Rubin, I. Benbasat","doi":"10.1145/3580479","DOIUrl":"https://doi.org/10.1145/3580479","url":null,"abstract":"Ecommerce websites increasingly provide predictive analytics-based advice (PAA), such as advice about future potential price reductions. Establishing consumer-trust in these advice-giving systems imposes unique and novel challenges. First, PAA about future alternatives that can benefit the consumer appears to inherently contradict the business goal of selling a product quickly and at high profit margins. Second, PAA is based on mathematical models that are non-transparent to the user. Third, PAA advice is inherently uncertain, and can be perceived as subjectively imposed in algorithms. Utilizing Toulmin's argumentation-model, we investigate the influence of advice-justification statements in overcoming these difficulties. Based on three experimental studies, in which respondents are provided with the advice of PAA systems, we show evidence for the different roles Toulmin's statement-types play in enhancing various trusting-beliefs in PAA systems. Provision of warrants is mostly associated with enhanced competence beliefs; rebuttals with integrity beliefs; backings both competence and benevolence; and data statements enhance competence, integrity, and benevolence beliefs. Implications of the findings for research and practice are provided.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45657855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT 工业4.0和物联网智能系统特刊简介
IF 2.5 Q2 Computer Science Pub Date : 2022-12-31 DOI: 10.1145/3583985
Mu-Yen Chen, B. Thuraisingham, E. Eğrioğlu, J. J. Rubio
The development of big data applications is driving the dramatic growth of hybrid data, often in the form of complex sets of cross-media content including text, images, videos, audios, and time series. Tremendous volumes of these heterogeneous data are derived from multiple IoT sources and present new challenges for the design, development, and implementation of effective information systems and decision support frameworks tomeet heterogeneous computing requirements. Emerging technologies allow for the near real-time extraction and analysis of heterogeneous data to find meaningful information. Machine-learning algorithms allow computers to learn automatically, analyzing existing data to establish rules to predict outcomes of unknown data. However, traditional machine learning approaches do not meet the needs for Internet of Things (IoT) applications, calling for new technologies. Deep learning is a good example of emerging technologies that tackle the limitations of traditional machine learning through feature engineering, providing superior performance in highly complex applications. However, these technologies also raise new security and privacy concerns. Technology adoption and trust issues are of timely importance as well. Industrial operations are in themidst of rapid transformations, sometimes referred to as Industry 4.0, Industrial Internet of Things (IIoT), or smart manufacturing. These transformations are bringing fundamental changes to factories and workplaces, making them safer and more efficient, flexible, and environmentally friendly. Machines are evolving to have increased autonomy, and new human-machine interfaces such as smart tools, augmented reality, and touchless interfaces are making interaction more natural. Machines are also becoming increasingly interconnected within individual factories as well as to the outside world through cloud computing, enabling many opportunities for operational efficiency and flexibility in manufacturing and maintenance. An increasing number of countries have put forth national advanced manufacturing development strategies, such as Germany’s Industry 4.0, the United States’ Industrial Internet and manufacturing system based on CPS (Cyber-Physical Systems), and China’s Internet Plus Manufacturing and Made in China 2025 initiatives. Smart Manufacturing aims to maximize transparency and access of all manufacturing process information across entire manufacturing supply chains and product lifecycles, with the Internet of Things (IoT) as a centerpiece to increase productivity and output value. This manufacturing revolution depends on technology connectivity and the contextualization of data, thus putting intelligent systems support and data science at the center of these developments.
大数据应用程序的发展正在推动混合数据的急剧增长,混合数据通常以跨媒体内容的复杂集合的形式出现,包括文本、图像、视频、音频和时间序列。大量这些异构数据来源于多个物联网来源,为设计、开发和实施有效的信息系统和决策支持框架以满足异构计算需求提出了新的挑战。新兴技术允许对异构数据进行近乎实时的提取和分析,以找到有意义的信息。机器学习算法允许计算机自动学习,分析现有数据以建立规则来预测未知数据的结果。然而,传统的机器学习方法不能满足物联网(IoT)应用的需求,需要新的技术。深度学习是新兴技术的一个很好的例子,它通过特征工程解决了传统机器学习的局限性,在高度复杂的应用中提供了卓越的性能。然而,这些技术也引发了新的安全和隐私问题。技术采用和信任问题也具有及时的重要性。工业运营正处于快速转型之中,有时被称为工业4.0、工业物联网(IIoT)或智能制造。这些变革正在给工厂和工作场所带来根本性的变化,使它们更安全、更高效、更灵活、更环保。机器正在进化,以提高自主性,新的人机界面,如智能工具、增强现实和非接触式界面,使交互更加自然。通过云计算,机器在单个工厂内部以及与外部世界的互联程度也越来越高,从而为制造和维护的运营效率和灵活性提供了许多机会。越来越多的国家提出了国家先进制造业发展战略,如德国的工业4.0、美国的工业互联网和基于CPS (Cyber-Physical Systems)的制造体系、中国的“互联网+制造”和“中国制造2025”等。智能制造旨在最大限度地提高整个制造供应链和产品生命周期中所有制造过程信息的透明度和访问权限,以物联网(IoT)为核心,以提高生产率和产值。这场制造业革命依赖于技术连接和数据情境化,因此将智能系统支持和数据科学置于这些发展的中心。
{"title":"Introduction to the Special Issue on Smart Systems for Industry 4.0 and IoT","authors":"Mu-Yen Chen, B. Thuraisingham, E. Eğrioğlu, J. J. Rubio","doi":"10.1145/3583985","DOIUrl":"https://doi.org/10.1145/3583985","url":null,"abstract":"The development of big data applications is driving the dramatic growth of hybrid data, often in the form of complex sets of cross-media content including text, images, videos, audios, and time series. Tremendous volumes of these heterogeneous data are derived from multiple IoT sources and present new challenges for the design, development, and implementation of effective information systems and decision support frameworks tomeet heterogeneous computing requirements. Emerging technologies allow for the near real-time extraction and analysis of heterogeneous data to find meaningful information. Machine-learning algorithms allow computers to learn automatically, analyzing existing data to establish rules to predict outcomes of unknown data. However, traditional machine learning approaches do not meet the needs for Internet of Things (IoT) applications, calling for new technologies. Deep learning is a good example of emerging technologies that tackle the limitations of traditional machine learning through feature engineering, providing superior performance in highly complex applications. However, these technologies also raise new security and privacy concerns. Technology adoption and trust issues are of timely importance as well. Industrial operations are in themidst of rapid transformations, sometimes referred to as Industry 4.0, Industrial Internet of Things (IIoT), or smart manufacturing. These transformations are bringing fundamental changes to factories and workplaces, making them safer and more efficient, flexible, and environmentally friendly. Machines are evolving to have increased autonomy, and new human-machine interfaces such as smart tools, augmented reality, and touchless interfaces are making interaction more natural. Machines are also becoming increasingly interconnected within individual factories as well as to the outside world through cloud computing, enabling many opportunities for operational efficiency and flexibility in manufacturing and maintenance. An increasing number of countries have put forth national advanced manufacturing development strategies, such as Germany’s Industry 4.0, the United States’ Industrial Internet and manufacturing system based on CPS (Cyber-Physical Systems), and China’s Internet Plus Manufacturing and Made in China 2025 initiatives. Smart Manufacturing aims to maximize transparency and access of all manufacturing process information across entire manufacturing supply chains and product lifecycles, with the Internet of Things (IoT) as a centerpiece to increase productivity and output value. This manufacturing revolution depends on technology connectivity and the contextualization of data, thus putting intelligent systems support and data science at the center of these developments.","PeriodicalId":45274,"journal":{"name":"ACM Transactions on Management Information Systems","volume":null,"pages":null},"PeriodicalIF":2.5,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45122895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Management Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1