توضیحاتی در مورد کتاب Research Challenges in Information Science. Information Science and the Connected World. 17th International Conference, RCIS 2023 Corfu, Greece, May 23–26, 2023 Proceedings
نام کتاب : Research Challenges in Information Science. Information Science and the Connected World. 17th International Conference, RCIS 2023 Corfu, Greece, May 23–26, 2023 Proceedings
عنوان ترجمه شده به فارسی : چالش های تحقیق در علم اطلاعات. علم اطلاعات و دنیای متصل هفدهمین کنفرانس بین المللی، RCIS 2023 کورفو، یونان، 23 تا 26 مه 2023 مجموعه مقالات
سری : Lecture Notes in Business Information Processing, 476
نویسندگان : Selmin Nurcan, Andreas L. Opdahl, Haralambos Mouratidis, Aggeliki Tsohou
ناشر : Springer
سال نشر : 2023
تعداد صفحات : 692
ISBN (شابک) : 9783031330797 , 9783031330803
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 39 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Organization
Abstracts of Keynote Talks
Research Challenges for Large-Scale Interconnected Ecosystems
AI and Cybersecurity in the Connected World: A Viable Partnership?
Contents
Requirements
Goal Modelling: Design and Manufacturing in Aeronautics
1 Introduction
2 Case Study Presentation
2.1 Aircraft Nose Section
2.2 Manufacturing Challenges
3 First Application: Modelling the Overall System
3.1 Goal Elicitation: Modus Operandi
3.2 Goal Model
3.3 Discussion
4 Second Application: Introducing a Core Language for Modelling
4.1 Goal Elicitation: Modus Operandi
4.2 Goal Model
4.3 Discussion
5 Third Application: Narrower System of Interest
5.1 Goal Elicitation: Modus Operandi
5.2 Goal Model
5.3 Discussion
6 Conclusion
References
Cloud Migration High-Level Requirements
1 Introduction
2 Related Work
3 Methodology
4 Corpus
5 Cloud Migration High-Level Requirements
6 Discussion
6.1 Connections with Related Work
6.2 Requirements Classification
7 Conclusion
References
Idea Browsing on Digital Participation Platforms: A Mixed-Methods Requirements Study
1 Introduction
2 Background
2.1 Citizen Participation Through Digital Platforms
2.2 Idea Browsing on Digital Participation Platforms
3 Methodology
3.1 Quantitative Data Collection – Questionnaire
3.2 Qualitative Data Collection – Semi-Structured Interviews
4 Results
4.1 Sample Description
4.2 Evaluation of the Current Idea Browsing Approach
4.3 Toward a More Stimulating Idea Browsing Approach
5 Discussion
5.1 Implications for Research and Practice
5.2 Limitations
5.3 Future Work
6 Conclusion
References
Conceptual Modeling and Ontologies
What Do Users Think About Abstractions of Ontology-Driven Conceptual Models?
1 Introduction
2 Background
3 Empirical Studies in Conceptual Modeling Abstraction
3.1 What Do People Think When Abstracting a Conceptual Model?
3.2 Interviews with Models\' Authors
3.3 Questionnaire for Conceptual Models\' Users
4 Final Considerations
References
On the Semantics of Risk Propagation
1 Introduction
2 Research Baseline
2.1 Risk Assumptions in COVER
2.2 The Ontology of Risk
3 On Risk Propagation
3.1 Some Definitions
3.2 Modeling Risk Propagation
4 Explaining Risk Propagation
4.1 What Does it Mean for Risk to Propagate?
4.2 What is in a Risk Propagation Graph?
5 Implications
6 Conclusion
References
The Omnipresent Role of Technology in Social-Ecological Systems
1 Introduction
2 Perspectives on Technology
3 Technology in Social-Ecological Systems
4 Conceptualising Technology in the Integrated SESs Framework
4.1 Ontological Analysis of Technology and Its Integration
5 Discussing the Example of Aquaculture
6 Conclusions and Future Works
References
Machine Learning and Analytics
Detection of Fishing Activities from Vessel Trajectories
1 Introduction
1.1 Problem Relevance
1.2 The Contribution
2 Research Method
3 Background and Related Work
4 Datasets and Preprosessing
4.1 Data
4.2 Obtaining Labels
4.3 Selecting Features for ML
4.4 Choosing Depth as a Feature
4.5 Segmentation of the Vessel Trajectories
5 Evaluation and Results
5.1 Using Different Architectures
5.2 Some Observation Related to Overfitting
5.3 Using Data from Different Years
5.4 Testing on Outliers
5.5 Speed Analysis to Test Our Method
5.6 Tracks Analysis to Test Our Method
6 Conclusion and Discussion
References
A General Framework for Blockchain Data Analysis
1 Introduction
2 Related Work
3 Requirements of a General Framework for Blockchain Data Analysis
4 Framework Architecture
5 Theoretical Evaluation of the Framework
6 Implementation Discussion
7 Experiments on Analysis of Transferring Transactions
8 Applications of the Framework
9 Conclusion and Future Work
References
Reinforcement Learning for Scriptless Testing: An Empirical Investigation of Reward Functions
1 Introduction
2 Q-Learning
3 Related Work
4 The TESTAR Tool
5 Approach
5.1 Rewarding Test Behaviours
5.2 RL Framework
6 Experiment Design
6.1 Objects: Selection of SUTs
6.2 Studying Rewards: Independent Variables and Factors
6.3 Dependent Variables
7 Results
7.1 RQ1: Exploration Effectiveness
7.2 RQ2: JBS Problem
8 Conclusions and Future Work
References
Conceptual Modeling and Semantic Networks
DBSpark: A System for Natural Language to SPARQL Translation
1 Introduction
2 Related Work
3 DBSpark’s Architecture
3.1 Question Processing and Analysis Component
3.2 Phrase Mapping Component
3.3 Query Construction and Ranking Component
4 System Evaluation
5 Conclusions and Future Improvements
References
An Automated Patterns-Based Model-to-Model Mapping and Transformation System for Labeled Property Graphs
1 Introduction
2 Related Work
3 Transformation Patterns
4 M2M Mapping and Transformation Approach
5 Evaluation Case: The TPC-H Dataset
6 Conclusions
References
Improving Conceptual Domain Characterization in Ontology Networks
1 Introduction
2 Conceptual Characterization in Ontology Networks
3 The Framework for Ontology Classification
4 Establishing Relationships Among Ontologies
4.1 Grounding
4.2 Ontology-Driven Languages
4.3 Sub-Ontologies
4.4 Implementation
4.5 Reuse
4.6 Summary of the Relationships Among Ontologies
5 Conceptual Characterization of BRON
5.1 Classification of BRON
5.2 The Domain Perspective of BRON
5.3 Impact in Ontology Networks
6 Conclusions
References
Business Process Design and Computing in the Continuum
Digital Technology-Driven Business Process Redesign: A Classification Framework
1 Introduction
2 Background
3 Related Work
4 Systematic Literature Review
5 Results
5.1 Capabilities of Digital Technologies for Process Redesign
5.2 Business Process Redesign
6 Discussion
6.1 Limitations
7 Conclusion
References
Supporting the Implementation of Digital Twins for IoT-Enhanced BPs
1 Introduction
2 A Microservice Architecture for IoT-Enhanced BP Digital Twins
2.1 Data Structure for Managing Real-World Entity Characteristics
2.2 Runtime Synchronization
2.3 Visual Representation
2.4 Realisation
3 Model-Driven Development Approach
3.1 Creating a BPMN Model of an IoT-Enhanced BP
3.2 Generating DTDL Models from BPMN
3.3 Generating Java Code from BPMN
4 Related Work
5 Conclusions and Further Work
References
Context-Aware Digital Twins to Support Software Management at the Edge
1 Introduction
2 Research Context and Motivation
2.1 Software Maintenance at the Edge
2.2 Challenge: Context-Awareness for Software Assignment
3 State of the Art and Practice
3.1 Digital Twins for Edge Fleet Management and Context Modelling
3.2 Software Assignment
4 Modelling Principles for Context-Awareness
5 Proof of Concept
5.1 Running Example: Edge Gateways for Remote Patient Monitoring
5.2 Technological Baseline: Eclipse Ditto
5.3 Use Case Scenarios
5.4 Assumptions and Limitations
6 Conclusion and Future Work
References
Adoption of Virtual Agents in Healthcare E-Commerce: A Perceived Value Perspective
1 Introduction
2 Related Work and Research Gap
2.1 Technology Adoption in a Healthcare Context
2.2 Perceived Value Perspective on Virtual Agents’ Adoption
3 Proposed Model
4 Methodology
5 Results
6 Contributions to Theory and Practice
6.1 Theoretical Contributions
6.2 Limitations and Further Research
6.3 Managerial Implications
7 Conclusion
References
Requirements and Evaluation
Addressing Trust Issues in Supply-Chain Management Systems Through Blockchain Software Patterns
1 Introduction
2 Background
2.1 Trust
2.2 Blockchain in Supply Chain Management
2.3 Software Patterns
3 From Trust Issues to Trust Requirements in SCM
3.1 Taxonomy of Trust Issues in SCM
3.2 Translating Trust Issues into Trust Requirements.
4 Use of Blockchain Software Patterns for Meeting Trust Requirements in SCM
5 Illustrative Example and Discussion
5.1 Running the Process on the Illustrative Example
5.2 Results
5.3 Discussion
6 Conclusion
References
Evaluating Process Efficiency with Data Envelopment Analysis: A Case in the Automotive Industry
1 Introduction
2 Background
2.1 DEA Models
2.2 Related Work: DEA in Dealerships
3 Domain Analysis
3.1 Stakeholders
3.2 Standard Service Process
3.3 Performance Measures
4 DEA Model Implementation
4.1 Model Verification
4.2 Additional Features
5 Real Case
5.1 Process
5.2 Data
5.3 Model Implementation
6 Results
6.1 Reference Set
6.2 Process Efficiency and Improvement
6.3 System Efficiency
7 Final Considerations
References
A Model of Qualitative Factors in Forensic-Ready Software Systems
1 Introduction
1.1 Research Questions
1.2 Research Method
2 Related Work
2.1 Forensic Readiness Software Requirements
2.2 Summary
3 Factors of Forensic Readiness Requirements
3.1 Evidence Factors
3.2 Scenario Factors
3.3 Process Factors
3.4 Cross-Cutting Factors
4 Running Example
4.1 Forensic Readiness Scenarios
4.2 Manifestation of the Factors
5 Conclusion
References
Monitoring and Recommending
Monitoring Object-Centric Business Processes: An Empirical Study
1 Introduction
2 Backgrounds
3 Research Questions
4 Creating Charts for Object-Centric Processes
5 Research Methodology
5.1 Data Collection Method
5.2 Study Design
5.3 Data Analysis Method
6 Evaluation
7 Related Work
8 Summary and Outlook
References
A Peek into the Working Day: Comparing Techniques for Recording Employee Behaviour
1 Introduction
2 Related Work
2.1 Work Patterns
2.2 Data Collection Techniques
3 Research Method
3.1 Phase 1: Case Study Selection
3.2 Phase 2: Technical Pilot
3.3 Phase 3: Participant Selection
3.4 Phase 4: Data Collection
3.5 Phase 5: Data Analysis
4 Results
4.1 Timestamp
4.2 Online Versus Offline Activities
4.3 Brief Activities
4.4 Overtime Activities
4.5 Uncategorised Activities
5 Discussion
5.1 Limitations
5.2 Future Work
6 Conclusion
References
Context-Aware Recommender Systems: Aggregation-Based Dimensionality Reduction
1 Introduction
2 Related Works
3 Modelling Context Cube
3.1 Use Case
3.2 Conceptual Modelling
4 Ratings Aggregation
4.1 Use Case
4.2 Aggregating Ratings
5 Experimental Assessments
5.1 Datasets and CARS
5.2 Experiments
6 Conclusion and Perspectives
References
Business Processes Analysis and Improvement
Discovery of Improvement Opportunities in Knock-Out Checks of Business Processes
1 Introduction
2 Background and Related Work
3 Knock-Out Check Discovery and Analysis
3.1 Knock-Out Check Discovery
3.2 Knock-Out Check Analysis
3.3 Improvement Opportunity Identification
4 Implementation
5 Evaluation
5.1 Evaluation of Rediscovery Accuracy
5.2 Evaluation of Classification Rule Quality
5.3 Threats to Validity
6 Conclusion
References
Persuasive Visual Presentation of Prescriptive Business Processes
1 Introduction
2 Background
2.1 Prescriptive Process Monitoring
2.2 Persuasive Technology
3 Methodology
3.1 Setting
3.2 Requirements
3.3 Design
3.4 Evaluation
4 PERSEVERE - PERsuasive System for PrEscriptiVe BusinEss pRocEss Monitoring
4.1 Setting
4.2 Requirements
4.3 Design
4.4 Evaluation
5 Discussion
5.1 Limitations
5.2 Implications and Future Work
References
TraVaG: Differentially Private Trace Variant Generation Using GANs
1 Introduction
2 Related Work
2.1 Releasing Differentially Private Event Data
2.2 Generating Differentially Private Synthetic Data
3 Preliminaries
3.1 Event Log
3.2 Differential Privacy (DP)
3.3 Generative Adversarial Networks (GANs)
3.4 Autoencoder
4 TraVaG
4.1 The TraVaG Framework
4.2 Differentially Private - Stochastic Gradient Descent (DP-SGD)
4.3 Privacy Accounting
5 Experiments
5.1 Evaluation Measures
5.2 Data Utility Analysis
5.3 Process Discovery Analysis
6 Conclusion
References
User Interface and Experience
When Dashboard\'s Content Becomes a Barrier - Exploring the Effects of Cognitive Overloads on BI Adoption
1 Introduction
2 Theoretical Background
2.1 Dashboard Content and Cognitive Load
2.2 Hedonic Dimension of Dashboards
2.3 Cognitive Theory of Multimedia Learning
3 Research Methodology
3.1 Experimental Settings
3.2 Data Collection
3.3 Measurements
4 Results
4.1 Constructs Quality
4.2 Structural Model
5 Discussion and Future Works
6 Conclusion and Limitations
References
The Effect of Visual Information Complexity on Urban Mobility Intention and Behavior
1 Introduction
2 Materials and Methods
2.1 A Lever for Behavioral Change, the Green IS and Self-tracking
2.2 The Effects of Visual Complexity of Information on Individuals
2.3 Experiments and Hypothesis
3 Experiment
3.1 Protocol
3.2 Situational Setting Experiment Methodology
3.3 Real Condition Experiment Methodology
4 Results
4.1 Situational Setting Experiment
4.2 Real Condition Experiment
5 Conclusion and Perspectives
References
Interoperability of Open Science Metadata: What About the Reality?
1 Introduction
2 Related Work
2.1 Metadata Models
2.2 Schema and Ontology Matching
3 Interoperability and Open Science
3.1 Interoperability Definitions in the Literature
3.2 Our Definition: Context-Independent Interoperability
4 Schema Matching Tools Evaluation on Real Open Science Data
4.1 Experimentation Setup
4.2 Evaluation Results and Observations
5 Lessons Learned and Future Directions
6 Conclusion
References
Forum Papers
Online-Notes System: Real-Time Speech Recognition and Translation of Lectures
1 Introduction
2 Related Work
3 System Architecture and Setup
3.1 Speech Recognition
3.2 Machine Translation
3.3 Setup
4 Experiments
5 Conclusion
References
Temporal Relation Extraction from Clinical Texts Using Knowledge Graphs
1 Introduction
2 Related Work
2.1 Improving Relation Extraction Using Additional Knowledge
2.2 Combining Text Data with Knowledge Graphs
3 Model Architecture
3.1 Text Embeddings
3.2 Graph Embeddings
3.3 Combining the Predictions
4 Results
4.1 Constructing the Event Graph for Temporal Relation Extraction
4.2 Discussion
5 Conclusion
References
Domain TILEs: Test Informed Learning with Examples from the Testing Domain
1 Introduction
2 Related Work
3 Test Informed Learning with Examples (TILE)
4 Test Domain TILEs
5 Using TILE — A Report on Our Experience
6 Conclusion
References
Using GUI Change Detection for Delta Testing
1 Introduction
2 Related Work
2.1 State of the Art in GUI Change Detection
2.2 Background of Model-Inference GUI Tools
3 GUI State Model Inference with TESTAR
4 SUT for Proof of Concept Evaluation
5 Change Detection Solution
6 Conclusions and Future Work
References
Enterprise Modeling for Machine Learning: Case-Based Analysis and Initial Framework Proposal
1 Introduction
2 Background
3 ML in an Enterprise Context: Two Cases
4 A Framework for ML Projects in Enterprise Context
5 Conclusive Discussion
References
Towards Creating a Secure Framework for Building Mirror World Applications
1 Introduction
2 Methodology
3 Challenges in Creating a Common Framework for Mirror Worlds
3.1 Building Blocks
3.2 Challenges
3.3 Privacy Implications
4 Discussion
5 Conclusion
References
Towards a Secure and Privacy Compliant Framework for Educational Data Mining
1 Introduction
2 Privacy Regulations Regarding Educational Data
3 Learning Analytics and Educational Data Mining
4 Privacy Frameworks
5 Discussion
6 Conclusion and Future Work
References
Internet of Cloud (IoC): The Need of Raising Privacy and Security Awareness
1 Introduction
2 Internet of Cloud (IoC)
2.1 Cloud Computing
2.2 Internet of Things (IoT)
2.3 Combined Technologies
3 Security and Privacy Challenges
3.1 Internet of Cloud (IoC) Privacy and Security Challenges
4 Training and Awareness
5 Conclusion
References
Comparative Study of Unsupervised Keyword Extraction Methods for Job Recommendation in an Industrial Environment
1 Introduction
2 Unsupervised Keyword Extraction Models
3 Methodology
3.1 Corpus and Gold Standard Construction Preparation
4 Results
5 Discussion
6 Conclusion
References
A Meta-model for Digital Business Ecosystem Design
1 Introduction
2 Research Approach
3 Proposed Meta-model and Instantiation
4 Discussion and Conclusions
References
Supporting Students in Team-Based Software Development Projects: An Exploratory Study
1 Introduction
2 Research Method
2.1 Data Collection
2.2 Threats to Validity
3 RQ1: Students’ Practices and Challenges in TBSDPs
4 RQ2: Students’ Perception on Learning Dashboard Benefits
5 Discussion
6 Conclusions
References
Ontology of Product Provenance for Value Networks
1 Introduction
2 Value Network with Provenance Ontology (VNPO)
2.1 Concepts - Business Need View
2.2 Concepts - Organizational View
3 Ontology Validation
3.1 Technical Action Research (TAR)
3.2 Ontology Assessment
3.3 Research Validity Threats and Limitations
4 Conclusion
References
A Data Value Matrix: Linking FAIR Data with Business Models
1 Introduction
2 Research Methodology
3 Business Models
4 Analysis Matrix
4.1 Procedure for Matrix Use
5 Use Case: Maritime Dataspace MARISPACE-X
5.1 Case Description
5.2 Analysis Matrix Use in MARISPACE-X
6 Summary and Future Work
References
An Information Privacy Competency Model for Online Consumers
1 Introduction
2 Literature Review
2.1 Competency
2.2 Competency Model
3 Methodology
4 Results
5 Conclusions
References
DECENT: A Domain Specific Language to Design Governance Decisions
1 Introduction
2 Research Approach
3 Case Study: Fractional Reserve Banking in DECENT
3.1 Fractional Reserve Banking in DECENT Meta Language
3.2 Governance Design Decision: Business Model Perspective
3.3 Governance Design Decisions: Process Model Perspective
4 Conclusion
References
Doctoral Consortium Papers
Business User-Oriented Recommender System of Data
1 Context
2 Research Objectives
2.1 Problem Statement
2.2 Research Questions
3 Research Approach
3.1 Study 1 - Data RS for SSBI Tools
3.2 Study 2 - Empirical Study on Data RS
3.3 Study 3 - Business User-Centric Data RS
4 Conclusion
References
Secure Infrastructure for Cyber-Physical Ranges
1 Introduction
2 Related Work
3 Cyber-Physical Ranges
4 Reference Architecture for Cyber-Physical Ranges
5 Objectives and Research Questions
6 Research Method
7 Expected Results
8 Conclusions
References
Guidelines for Developers and Recommendations for Users to Mitigate Phishing Attacks: An Interdisciplinary Research Approach
1 Introduction
2 Background
3 Research Goal and Questions
4 Research Methodology
5 Current Results
6 Conclusion and Progress of the Research
References
Leveraging Exogeneous Data for the Predictive Monitoring of IT Service Management Processes
1 Introduction
2 Related Work
2.1 Predictive Monitoring of ITSM Processes
2.2 AITSM and AIOps
3 Research Objectives
4 Method
4.1 Exogenous Data and Prediction Model
4.2 Decision Support System
5 Conclusion
References
Predicting Privacy Decisions in Mobile Applications and Raising Users’ Privacy Awareness
1 Introduction
2 Literature Review
2.1 Android Permission System
2.2 Privacy Management with Machine Learning
2.3 Users’ Privacy Profiles
2.4 Predictive Factors
3 Research Methodology
4 Conclusion
References
Information Overload: Coping Mechanisms and Tools Impact
1 Introduction
2 The Problem
3 State of the Art
4 Research Objectives and Methodology
5 Theoretical Background
6 Expected Tangible Results
7 Conclusion
References
Tutorials
Blockchain Technology in Information Science: How Blockchains Enable the Connected World
Abstract
1 Blockchain Technology
2 Blockchain’s Role in Information Science and Supply Chain Management
References
Comparing Products Using Similarity Matching
Abstract
1 Background of Attendees
2 Added Value of Tutorial
3 Tutorial Plan
References
Getting Started with Scriptless Test Automation Through the Graphical User Interface, a Hands-on Tutorial
1 Learning Objectives and Added Value
2 History of the Tutorial
Reference
How to Develop and Realize Conceptual Models? The Bee-Up Research & Education Support Tool
Abstract
1 Motivation
2 Tutorial Topics and Tool Capabilities
References
Author Index