دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1st ed. 2022] نویسندگان: Renata Guizzardi (editor), Jolita Ralyté (editor), Xavier Franch (editor) سری: ISBN (شابک) : 3031057597, 9783031057595 ناشر: Springer سال نشر: 2022 تعداد صفحات: 852 [836] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 54 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, Proceedings (Lecture Notes in Business Information Processing, 446) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب چالش های پژوهشی در علم اطلاعات: شانزدهمین کنفرانس بین المللی، RCIS 2022، بارسلونا، اسپانیا، 17 تا 20 مه، 2022، مجموعه مقالات (یادداشت های سخنرانی در پردازش اطلاعات تجاری، 446) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعه مقالات شانزدهمین کنفرانس بین المللی چالش های پژوهشی در علوم اطلاعات، RCIS 2022 است که در بارسلونا، اسپانیا، طی 17 تا 20 می 2022 برگزار شد. اخلاق و اعتماد در علم اطلاعات\".
حوزه RCIS با حوزه های موضوعی سیستم های اطلاعاتی و مهندسی آنها خلاصه می شود. رویکردهای کاربر محور؛ مدیریت داده و اطلاعات؛ مدیریت فرآیند کسب و کار؛ مهندسی سیستم های اطلاعاتی دامنه خاص؛ علم داده; زیرساخت های اطلاعاتی، و تحقیق و تمرین تأملی.
35 مقاله کامل ارائه شده در این جلد به دقت بررسی و از بین 100 مورد ارسالی انتخاب شدند. 18 مقاله انجمن بر اساس 11 مقاله ارسالی انجمن است که از بین آنها 5 مورد انتخاب شدند و 13 مقاله باقی مانده از ارسال های معمولی منتقل شدند. 6 مقاله کنسرسیوم دکتری از 10 مقاله ارسالی به کنسرسیوم انتخاب شدند. مشارکتها در بخشهای موضوعی به نامهای: علم داده و مدیریت داده سازماندهی شدند. جستجو و تجزیه و تحلیل اطلاعات؛ مدیریت فرآیند کسب و کار؛ استخراج فرآیند کسب و کار؛ تحول دیجیتال و زندگی هوشمند؛ مدلسازی مفهومی و هستیشناسی؛ مهندسی نیازمندیها; مهندسی مدل محور; برنامه های کاربردی یادگیری ماشین علاوه بر این، خلاصههای دو صفحهای از آموزشها را میتوانید در قسمت عقب پیدا کنید.
This book constitutes the proceedings of the 16th International Conference on Research Challenges in Information Sciences, RCIS 2022, which took place in Barcelona, Spain, during May 17–20, 2022. It focused on the special theme "Ethics and Trustworthiness in Information Science".
The scope of RCIS is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice.
The 35 full papers presented in this volume were carefully reviewed and selected from a total 100 submissions. The 18 Forum papers are based on 11 Forum submissions, from which 5 were selected, and the remaining 13 were transferred from the regular submissions. The 6 Doctoral Consortium papers were selected from 10 submissions to the consortium. The contributions were organized in topical sections named: Data Science and Data Management; Information Search and Analysis; Business Process Management; Business Process Mining; Digital Transformation and Smart Life; Conceptual Modelling and Ontologies; Requirements Engineering; Model-Driven Engineering; Machine Learning Applications. In addition, two-page summaries of the tutorials can be found in the back matter.
Preface Organization Engineering the New Fabric of the Information Infrastructure - IoT, Edge, and Cloud “We Are Open. The Door is Just Very Heavy”: New Challenges in Information Science or How can IS Help with Fairness, Diversity, Non-Discrimination? Contents Data Science and Data Management Personal Data Markets: A Narrative Review on Influence Factors of the Price of Personal Data 1 Introduction 2 Research Approach and Sample 2.1 Research Approach 2.2 Sample Description 3 Results 3.1 General Results 3.2 Influence Factors on Pricing Personal Data 4 Synthesis of Findings 5 Conclusion and Limitations Appendix - Overview of Included Papers References What's in a (Data) Type? Meaningful Type Safety for Data Science 1 Introduction 2 Datatypes Fail to Typify Data 2.1 Time 2.2 Mereology 2.3 Provenance 3 Current Approaches 3.1 Documentation Standards 3.2 Provenance Tracking 3.3 Knowledge Representation 4 Case Study: StatCAN Census Data 4.1 Example Operations 5 Meaningful Type Safety Framework (MeTS) 5.1 Interface Component 5.2 Typing Component 6 Type System 6.1 Syntax 6.2 Expression Trees 6.3 Preconditions 6.4 Implementation 7 Application and Evaluation on StatCAN Data 7.1 Disjointedness 7.2 Provenance 8 Research Program 8.1 Correspondence Theorem 8.2 Tractability 9 Conclusion References Research Data Management in the Image Lifecycle: A Study of Current Behaviors 1 Introduction 2 Literature Review 3 Methodology 4 Results 4.1 Planning 4.2 Creation/Compilation 4.3 Quality Assurance 4.4 Processing/Analysis 4.5 Description 4.6 Storage 4.7 Sharing 5 Discussion 6 Conclusion and Future Work References Information Search and Analysis Towards an Arabic Text Summaries Evaluation Based on AraBERT Model 1 Introduction 2 Related Works 3 Challenges of Arabic Language Processing 4 Proposed Method 4.1 Features 4.2 Model Construction 5 Dataset 6 Results and Discussion 6.1 Summary Evaluation Level 6.2 System Evaluation Level 7 Conclusion References A Recommender System for EOSC. Challenges and Possible Solutions 1 Introduction 2 Overview of Recommender Systems 2.1 Goals of a Recommender System 2.2 Academic Recommender Systems 2.3 Novel Approaches for Building Recommender Systems 3 A Recommender System for EOSC 3.1 About EOSC 3.2 EOSC Users 3.3 Motivation for Improved Recommendations in EOSC 3.4 User Demands for Recommendations in EOSC 4 Challenges for the EOSC Recommender System 5 EOSC Recommender System – Architecture and Data Processing 5.1 Online Modules 5.2 Nearline Modules 5.3 Offline Modules 5.4 A Data Flow Example 6 Discussion 7 Summary References ERIS: An Approach Based on Community Boundaries to Assess Polarization in Online Social Networks 1 Introduction 2 Related Work 3 The ERIS Method 3.1 Formal Definitions 3.2 Algorithm 4 Experimentations 4.1 Execution on Large Graphs 4.2 Case Study on Real Data 5 Discussions 6 Conclusion References Business Process Management Progress Determination of a BPM Tool with Ad-Hoc Changes: An Empirical Study 1 Introduction 2 Backgrounds 3 Research Methodology and Study Design 3.1 Research Questions 3.2 Data Collection Method 3.3 Study Design 3.4 Data Analysis Method 4 Evaluation 5 Related Work 6 Summary and Outlook References Enabling Conformance Checking for Object Lifecycle Processes 1 Introduction 2 Fundamentals 3 Problem Statement 4 Granularity and Flexibility of Lifecycle Processes 4.1 Granularity of Object Lifecycle Processes 4.2 Flexibility in Object Lifecycle Processes 4.3 Flexibility on State Level 4.4 Flexibility on Step Level 5 Conformance Checking of Lifecycle Processes 5.1 Conformance Categories 5.2 Leveraging Conformance Categories for Process Analysis 6 Experimental Evaluation 7 Related Work 8 Summary and Outlook References A Framework to Improve the Accuracy of Process Simulation Models 1 Introduction 2 Overall Idea and Motivation 3 Preliminary 4 Our Framework 4.1 Basic Features 4.2 Extended Features for Declare Rules 4.3 Temporal Features 4.4 Application of the Framework Using Different Features 4.5 Feature Selection and Normalization 5 Discussion 6 Implementation and Experiments 7 Related Works 8 Conclusion References Analyzing Process-Aware Information System Updates Using Digital Twins of Organizations 1 Introduction 2 Related Work 3 Background and Preliminaries 3.1 Process-Aware Information Systems (PAISs) 3.2 Object-Centric Petri Nets (OCPNs) 4 Modeling PAISs: Digital Twin Interface Model 4.1 Modeling PAIS Entities 4.2 Modeling PAIS Updates 5 Impact Analysis 5.1 Structural Impact Analysis 5.2 Operational Impact Analysis 5.3 Performance Impact Analysis 6 Evaluation 6.1 Implementation 6.2 Case Study 7 Conclusions References Hybrid Business Process Simulation: Updating Detailed Process Simulation Models Using High-Level Simulations 1 Introduction 2 Related Work 3 Preliminaries 3.1 Process Mining 3.2 System Dynamics 4 Approach 4.1 DES Simulation 4.2 SD Simulation 4.3 Designing and Updating the Interface Variables 5 Proof of Concept 5.1 Implementation 5.2 Designed Process and Scenario 5.3 Hybrid Simulation of the Sample Process 6 Discussion 7 Conclusion References Business Process Mining Towards Event Log Management for Process Mining - Vision and Research Challenges 1 Introduction 2 Preliminaries 2.1 Process Mining 2.2 Event Logs 3 Method 3.1 Narrative 3.2 Artifact Network 4 Event Log Management Framework 4.1 Event Log Lifecycle 4.2 Event Log Foundation 4.3 Event Log Governance 5 Discussion and Limitations 6 Conclusion and Future Research References Process Mining for Process Improvement - An Evaluation of Analysis Practices 1 Introduction 2 Background and Related Work 3 Empirical Method 3.1 Study Setup 3.2 Data Collection and Analysis 4 Findings 4.1 Identifying Improvement Opportunities 4.2 Selecting Improvement Opportunities 4.3 Communicating Results 5 Discussion 5.1 Implications 5.2 Limitations 6 Conclusion References Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes 1 Introduction 2 Background and Related Work 3 Identification of Batch Processing Inefficiencies 3.1 Batch Processing Discovery 3.2 Batch Processing Behavior Analysis 3.3 Waiting Time Analysis of Batch Processing Activities 4 Evaluation 4.1 Experiments with Synthetic Data 4.2 Experiments with a Real-Life Log 5 Conclusion References The Analysis of Online Event Streams: Predicting the Next Activity for Anomaly Detection 1 Introduction 2 Related Work 3 Preliminaries 3.1 Event Log 3.2 Next Activity Prediction 3.3 Unsupervised Anomaly Detection 4 Approach 4.1 Predictive Anomaly Detection (PAD) 4.2 Online PAD Using Sliding Window and Retraining Interval 5 Empirical Evaluation 5.1 Setup of Evaluation 5.2 Baseline - Unsupervised Anomalous Event Detection 6 Result and Discussion 7 Conclusion and Challenges References Process Mining: A Guide for Practitioners 1 Introduction 2 Related Work 3 Systematic Literature Review 4 Results 4.1 Process Mining Use Cases 4.2 Business-Oriented Questions 5 Framework 5.1 Framework Instantiation 5.2 Limitations 6 Conclusion References Digital Transformation and Smart Life How Do Startups and Corporations Engage in Open Innovation? An Exploratory Study 1 Introduction 2 Background 2.1 Digital Transformation 2.2 Open Innovation 3 Research Method 4 Results 4.1 Overview of Studied Startups and Corporations 4.2 Engagement Models Adopted by Startups with Corporations 4.3 Drivers Involved in Startup-Corporation Relationships 4.4 Challenges for Startups and Corporations 4.5 Benefits for Startups and Corporations 5 Lessons Learned and Recommendations 5.1 Recommendations for Startups 5.2 Recommendations for Corporations 6 Related Work 7 Conclusions, Limitations and Future Work References Smart Life: Review of the Contemporary Smart Applications 1 Introduction 2 Research Approach 3 Analysis of Smart Application Research 3.1 Taxonomy and Evolution of Smart Applications 3.2 Sources of Papers Publishing on Smart Applications 3.3 Smart Applications Underlying Terminology 3.4 Smart Life Driving Factors 4 Conclusion and Future Research References Conceptual Modelling and Ontologies Conceptual Integration for Social-Ecological Systems 1 Introduction 2 Social-Ecological Systems 2.1 Social-Ecological System Framework 2.2 Ecosystem Services 3 Ontological Foundations for Social-Ecological Systems 3.1 Ontological Clarification of SESs Components 3.2 Integrated Social-Ecological Perspectives Framework 4 Conclusions and Future Works References Contratto – A Method for Transforming Legal Contracts into Formal Specifications 1 Introduction 2 Research Baseline 3 The Transformation Process 4 The Contratto Environment 5 Related Work 6 Conclusions References Ontological Foundations for Trust Dynamics: The Case of Central Bank Digital Currency Ecosystems 1 Introduction 2 The Reference Ontology of Trust (ROT) 3 Modeling Trust Dynamics 3.1 Trust Influencing Trust 3.2 Mental Biases 3.3 Trust Calibration Signals 3.4 Trustworthiness Evidence 4 Case Study: Citizens' Trust in CBDC Ecosystems 4.1 Research Method 4.2 Research Context: CBDC Ecosystems 4.3 Modeling Citizen's Trust in CBDC Ecosystems 4.4 Discussion 5 Related Work 6 Conclusions References Abstracting Ontology-Driven Conceptual Models: Objects, Aspects, Events, and Their Parts 1 Introduction 2 Background 2.1 A Brief Introduction to UFO and OntoUML 2.2 Ontology-Based Model Abstraction 3 Abstracting Objects, Aspects, Events, and Their Parts 3.1 Abstracting Objects 3.2 Abstracting Aspects 3.3 Abstracting Events 3.4 Combining Abstraction Rules 4 Towards Ontology-Based Model Abstraction 2.0 5 Final Considerations References Understanding and Modeling Prevention 1 Introduction 2 Background 2.1 The Unified Foundational Ontology (UFO) 2.2 The Simple Conditional Analysis and Its Insufficiency 3 Unpacking the Notion of Prevention 3.1 Lifting the Discussion to the Level of Types 3.2 A Model for Prevention and Related Notions 4 Prevention Applied to Risk Management 5 Related Work 6 Final Considerations References Requirements Engineering Requirements Engineering for Collaborative Artificial Intelligence Systems: A Literature Survey 1 Introduction 2 Related Work 3 Methodology 4 Results 4.1 RQ1: Existing RE Challenges in CAIS 4.2 RQ2: Relevant Requirements Types for CAIS 5 Discussion 5.1 Challenges 5.2 Requirements 5.3 Limitations of the Study 6 Conclusion References On the Current Practices for Specifying Sustainability Requirements 1 Introduction 2 Background 3 Survey Design 4 A Survey on Sustainability at IT Companies 4.1 Participants 4.2 Survey Questions and Results 4.3 Threats to Validity 5 Major Insights 6 Related Work 7 Conclusions References Defining Key Concepts in Information Science Research: The Adoption of the Definition of Feature 1 Introduction 2 Research Method and Data Collection 2.1 Concept Definition Review 2.2 Data Collection 2.3 Popularity of the Definitions 3 Analysis and Categorization of the Concept Definitions 3.1 Definition Types 3.2 Research Topics 3.3 Abstraction Level 3.4 Viewpoint 4 Concept Definition Guidelines and Conclusion References Assisted-Modeling Requirements for Model-Driven Development Tools 1 Introduction 2 Background and Motivation 3 Focus Groups Protocol 3.1 Selecting Subjects 3.2 Segmentation 3.3 Conducting the Focus Group Sessions 4 Results and Discussion 4.1 RQ1: What are the Challenges Perceived by MDD Users During Modeling for Later Code Generation? 4.2 RQ2: What are the Features of the Current Modeling Assistants that Users Like/Dislike? 4.3 RQ3: What are the User’s Needs that are not yet Satisfied by the Current Modeling Assistants? 5 Gathered Requirements and an Emerging Framework 6 Threats to Validity and Limitations 7 Conclusions and Further Work References Model-Driven Engineering Model-Driven Production of Data-Centric Infographics: An Application to the Impact Measurement Domain 1 Introduction 2 Research Method 3 Conceptual Background on Infographics and on Ethical, Social and Environmental Accounting 4 Analyses of Infographic Component Types and Tools 5 Domain-Specific Language for Infographics 5.1 Requirements Specification 5.2 Xtext Grammar 5.3 Model Interpreter and Infographic Generator in OpenESEA 6 Validation 6.1 Test Cases 6.2 Comparative Experiment 6.3 Expert Assessment 7 Discussion of the Results 7.1 Reflection on the Results 7.2 Validity of the Results 8 Conclusions and Future Research References The B Method Meets MDE: Review, Progress and Future 1 Introduction 2 Executable DSLs: Correctness and Challenges 2.1 Observations 2.2 Discussion 3 The Meeduse LWB 3.1 Overall View 3.2 Towards a Viable Formal Abstract Syntax 3.3 ProB as an Execution Engine of xDSLs 4 Applications 4.1 FMDE for Railway Systems 4.2 FMDE for Model Transformations 4.3 FMDE for XML Standards 5 Discussion and Future References Enabling Content Management Systems as an Information Source in Model-Driven Projects 1 Introduction 2 Framework Overview 3 The Core CMS Model 4 The Reverse Engineering Process 4.1 The CMSs API 4.2 Discovery Process 4.3 Extraction Example 5 Model Integration and Refinement 6 Code Generation Infrastructure 6.1 Middleware Structure 6.2 The Middleware API 6.3 Middleware Usage Example 7 Tool Support 8 Related Work 9 Conclusions and Future Work References A Global Model-Driven Denormalization Approach for Schema Migration 1 Introduction 2 Related Works 3 ModelDrivenGuide Approach 3.1 Logical Model Refinement Rules 3.2 Inverse Functions 3.3 Completeness of Our Approach 4 Smart Data Model Search Optimizer 4.1 Complexity of the Naïve Denormalization Process 4.2 Application of the Refinement Rules 4.3 Heuristic of Model Generation 4.4 Complexity of the Heuristic 5 Experiments 5.1 Implementation 5.2 TPC-C 5.3 Data Models Generation 6 Conclusion and Future Work References State Model Inference Through the GUI Using Run-Time Test Generation 1 Introduction 2 Related Work 3 State Model Inference for TESTAR 4 Using the Inferred Models for Action Selection 5 Defining a Suitable Level of Abstraction 5.1 Including the Predecessor State 6 Findings, Challenges and Future Research Directions 6.1 State Abstraction 6.2 Applying the Inferred Models in Testing 7 Conclusions References Machine Learning Applications Autonomous Object Detection Using a UAV Platform in the Maritime Environment 1 Introduction 1.1 Contribution 2 System Design 2.1 User Requirements 2.2 Hardware Components 3 System Architecture 3.1 Object Detection - YOLOv5 3.2 Object Tracking - Deep SORT 3.3 CISE Compatibility 3.4 Initial Testing 4 Conclusions References Bosch’s Industry 4.0 Advanced Data Analytics: Historical and Predictive Data Integration for Decision Support 1 Introduction 2 Related Work 3 Proposed Architecture and Data Modelling Method 3.1 Components and Supporting Technologies 3.2 Data Modelling Method 4 Industrial Demonstration Case: The Screwing Case 4.1 Motivation and Goal 4.2 Supporting Data and Machine Learning Models 4.3 Data Model 4.4 Integration and Flows 4.5 Decision Support Dashboards 5 Conclusions References Benchmarking Conventional Outlier Detection Methods 1 Introduction 2 Overview of Traditional Outlier Detection Methods 2.1 Isolation Forest 2.2 Density-Based Algorithm for Discovering Clusters 2.3 Local Outlier Factor 2.4 Related Work 3 Methodology 3.1 Datasets 3.2 Data Preprocessing and Model Implementation 3.3 Hyperparameters Setting 3.4 Model Comparison 4 Results 5 Discussion 6 Limitations and Validity Threats 7 Conclusion A Appendices References Forum Handling Temporal Data Imperfections in OWL 2 - Application to Collective Memory Data Entries 1 Introduction 2 Preliminaries and Related Work: Handling Temporal Data in Semantic Web 2.1 Temporal Data Representation and Reasoning About 2.2 Temporal Data Reasoning: Allen's Interval Algebra 3 Representing Temporal Data Imperfection in OWL 2 4 Reasoning About Uncertain Temporal Data: Extending Allen's Interval Algebra 5 ``TimeOntoImperfection'': The Proposed Ontology 6 Validation 6.1 Prototype Implemented Based on ``TimeOntoImperfection'' 6.2 Application to Collective Memory Data 7 Conclusion References Integrated Approach to Assessing the Progress of Digital Transformation by Using Multiple Objective and Subjective Indicators 1 Introduction 2 Role and Hierarchy of CIOs, CISOs, CTOs and CDOs 3 Indicators and Model to Assess the Digital Transformation 4 Numerical Application 5 Conclusions References Towards Integrated Model-Driven Engineering Approach to Business Intelligence 1 Introduction 2 Business Intelligence Generator 3 Data-Driven Module in BIG 4 Demand-Driven Module in BIG 5 Data Flow Module in BIG 6 Design Process in BIG 7 Discussion and Future Works References Method for Evaluating Information Security Level in Organisations 1 Introduction 2 Related Work 3 Creation of Security Evaluation Framework 4 Evaluation References ChouBERT: Pre-training French Language Model for Crowdsensing with Tweets in Phytosanitary Context 1 Introduction 2 Related Work 3 Approach 4 Experiments 4.1 Data Preparation 4.2 Experimental Setup 4.3 Results and Evaluation 5 Threats to Validity 6 Conclusion and Future Work References A Conceptual Characterization of Fake News: A Positioning Paper 1 Introduction 2 Related Work 3 Fake News into the Information Ecosystem 4 Characterization of the Fake News Concept 4.1 Fake News are Not Created for Fun 4.2 Fake News Create a Distortion Between Real and False Facts 4.3 Fake News Credibility: The Authority Notion 4.4 Fake News Target a Precise Category of People and Use a Cognitive Process Based on Emotions 4.5 Our Fake News Definition 5 Conclusions: Toward a Fake News Conceptual Model References Combinations of Content Representation Models for Event Detection on Social Media 1 Introduction 2 Related Work 3 Clustering for Event Detection 3.1 Description of the Framework 3.2 Documents Representation 3.3 Clustering 4 Combination Method 4.1 General Description of the Method 4.2 Aggregation Methods 4.3 Configurations 4.4 Phases of the Experiments 5 Experiments, Results and Analysis 5.1 Experimental Setup 5.2 Results and Analysis 6 Conclusion References Increasing Awareness and Usefulness of Open Government Data: An Empirical Analysis of Communication Methods 1 Introduction 2 Methodology 3 Results 3.1 Communication Methods Identified 3.2 Survey Results 4 Discussion 5 Conclusion and Future Work References Toward Digital ERP: A Literature Review 1 Introduction 2 Background and Conceptual Development 3 Methods 4 Findings 4.1 Digital Capabilities 4.2 Need for Digital Capabilities in ERP 4.3 Digital Technologies in ERP 4.4 ERP as Digital Platform 4.5 ERP Processes Enabled by Digital 5 Discussion 6 Conclusion References Trust Model Recommendation Driven by Application Requirements 1 Introduction 2 State of the Art 3 An Approach to the Trust Computational Model Selection 3.1 Application Requirements Modelling 3.2 Model for Trust Requirements 3.3 Trust Computational Model Recommendation 4 Case Study 4.1 Model Requirements for Carpooling 4.2 Trust Requirements Model for Carpooling 4.3 Trust Computational Model Recommendation 5 Conclusion and Perspectives References Predicting the State of a House Using Google Street View 1 Introduction 2 Related Work 3 Methodology 4 Experimental Results 4.1 Prediction Accuracy 4.2 Model Explainability 5 Discussion and Conclusions References Towards a Comprehensive BPMN Extension for Modeling IoT-Aware Processes in Business Process Models 1 Introduction 2 Problem Statement 3 Existing Approaches 4 Solution Proposal 4.1 Case Study 1: Healthcare Process 4.2 Case Study 2: Production Process 5 Conclusions References Team Selection Using Statistical and Graphical Approaches for Cricket Fantasy Leagues 1 Introduction 2 Related Work 3 Data and Dream11 3.1 Dataset 3.2 Dream 11 4 Proposed Model 4.1 Weighted Graph 4.2 Base Performance 4.3 Optimization 5 Results 6 Conclusion and Future Work References PM4Py-GPU: A High-Performance General-Purpose Library for Process Mining 1 Introduction 2 Preliminaries 2.1 NVIDIA RAPIDS 2.2 Dataframes and File Formats for the Storage of Event Logs 3 Implementation and Tool 4 Assessment 5 Related Work 6 Conclusion References Interactive Business Process Comparison Using Conformance and Performance Insights - A Tool 1 Introduction 2 Motivation 3 Approach 3.1 Conformance Comparison 3.2 Performance Comparison 4 Tool 4.1 Availability 4.2 Components 4.3 Maturity 5 Conclusion References Research Incentives in Academia Leading to Unethical Behavior 1 Introduction 2 Background 2.1 Researcher Performance Evaluation 2.2 Perverse Incentives 3 Unethical Outcomes 3.1 Publication Misconducts 3.2 Individual Misconduct 3.3 Group Misconducts 4 Reflections and Recommendations 5 Conclusions References Assessing the Ethical, Social and Environmental Performance of Conferences 1 Introduction 2 Research Method 3 Background Information 3.1 The Overarching Improvement Cycle 3.2 The Need for Stakeholder Management and Engagement 4 ESEA Method Overview 5 Material Topics for Conferences 6 This Is Just the Start References ANGLEr: A Next-Generation Natural Language Exploratory Framework 1 Introduction 2 Existing Frameworks Review 3 ANGLEr: A Next-Generation Natural Language Exploratory Framework 3.1 Data Model 3.2 High-Level Architecture 3.3 REST Interface 3.4 Graphical User Interface 4 Conclusion References Doctoral Consortium Towards a Roadmap for Developing Digital Work Practices: A Maturity Model Approach 1 Research Problem and State of the Art 2 Research Methodology 2.1 Project 1. Systematic Literature Review and Data-Driven Analysis for Level Identification 2.2 Project 2. Validation Study with Expert Panel and Illustrative Case Study 2.3 Project 3. Generalization Study with a Quantitative Approach (Survey) 3 Intermediate Results 4 Conclusion and Future Steps References Evolutionary Scriptless Testing 1 Introduction 2 Related Work 3 TESTAR 4 Towards Evolutionary Scriptless Testing 4.1 Representation: ASRs as Individuals 4.2 Fitness Function 4.3 Manipulation Operators: Crossover and Mutation 5 Expected Contributions 6 Plan for Validation and Evaluation References Scriptless Testing for Extended Reality Systems 1 Introduction 2 Related Work 3 TESTAR Tool 4 XR Research Challenges 5 Completion Plan 5.1 Smart Interaction Movements 5.2 XR State Abstraction 5.3 Navigable State Model Layer 5.4 XR Test Oracles 5.5 Validation Plan 6 Conclusion References Artificial Intelligence: Impacts of Explainability on Value Creation and Decision Making 1 Introduction 2 The Problem 3 State of the Art 4 Research Objectives and Methodology 5 Theoretical Background 6 Expected Tangible Results 7 Conclusion References Towards Empirically Validated Process Modelling Education Using a BPMN Formalism 1 Context and Motivation 2 State of the Art 3 Research Objectives and Methodology 4 Conclusions and Future Work References Multi-task Learning for Automatic Event-Centric Temporal Knowledge Graph Construction 1 Introduction 2 Proposed End-to-End Architecture 3 Research Questions 4 Related Work 5 Data Construction 6 Scientific Contributions 7 Conclusion References Tutorials Information Security and Risk Management: Trustworthiness and Human Interaction 1 Tutorial Abstract Acknowledgements References The Challenge of Collecting and Analyzing Information from Citizens and Social Media in Emergencies: The Crowd4SDG Experience and Tools References Information Science Research with Machine Learning: Best Practices and Pitfalls 1 Tutorial Abstract References Author Index