ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, Proceedings (Lecture Notes in Business Information Processing, 446)

دانلود کتاب چالش های پژوهشی در علم اطلاعات: شانزدهمین کنفرانس بین المللی، RCIS 2022، بارسلونا، اسپانیا، 17 تا 20 مه، 2022، مجموعه مقالات (یادداشت های سخنرانی در پردازش اطلاعات تجاری، 446)

Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, Proceedings (Lecture Notes in Business Information Processing, 446)

مشخصات کتاب

Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, Proceedings (Lecture Notes in Business Information Processing, 446)

ویرایش: [1st ed. 2022] 
نویسندگان: , ,   
سری:  
ISBN (شابک) : 3031057597, 9783031057595 
ناشر: Springer 
سال نشر: 2022 
تعداد صفحات: 852
[836] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 54 Mb 

قیمت کتاب (تومان) : 48,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Research Challenges in Information Science: 16th International Conference, RCIS 2022, Barcelona, Spain, May 17–20, 2022, Proceedings (Lecture Notes in Business Information Processing, 446) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب چالش های پژوهشی در علم اطلاعات: شانزدهمین کنفرانس بین المللی، RCIS 2022، بارسلونا، اسپانیا، 17 تا 20 مه، 2022، مجموعه مقالات (یادداشت های سخنرانی در پردازش اطلاعات تجاری، 446) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب چالش های پژوهشی در علم اطلاعات: شانزدهمین کنفرانس بین المللی، RCIS 2022، بارسلونا، اسپانیا، 17 تا 20 مه، 2022، مجموعه مقالات (یادداشت های سخنرانی در پردازش اطلاعات تجاری، 446)



این کتاب مجموعه مقالات شانزدهمین کنفرانس بین المللی چالش های پژوهشی در علوم اطلاعات، RCIS 2022 است که در بارسلونا، اسپانیا، طی 17 تا 20 می 2022 برگزار شد. اخلاق و اعتماد در علم اطلاعات\".

حوزه RCIS با حوزه های موضوعی سیستم های اطلاعاتی و مهندسی آنها خلاصه می شود. رویکردهای کاربر محور؛ مدیریت داده و اطلاعات؛ مدیریت فرآیند کسب و کار؛ مهندسی سیستم های اطلاعاتی دامنه خاص؛ علم داده; زیرساخت های اطلاعاتی، و تحقیق و تمرین تأملی.

35 مقاله کامل ارائه شده در این جلد به دقت بررسی و از بین 100 مورد ارسالی انتخاب شدند. 18 مقاله انجمن بر اساس 11 مقاله ارسالی انجمن است که از بین آنها 5 مورد انتخاب شدند و 13 مقاله باقی مانده از ارسال های معمولی منتقل شدند. 6 مقاله کنسرسیوم دکتری از 10 مقاله ارسالی به کنسرسیوم انتخاب شدند. مشارکت‌ها در بخش‌های موضوعی به نام‌های: علم داده و مدیریت داده سازمان‌دهی شدند. جستجو و تجزیه و تحلیل اطلاعات؛ مدیریت فرآیند کسب و کار؛ استخراج فرآیند کسب و کار؛ تحول دیجیتال و زندگی هوشمند؛ مدل‌سازی مفهومی و هستی‌شناسی؛ مهندسی نیازمندیها; مهندسی مدل محور; برنامه های کاربردی یادگیری ماشین علاوه بر این، خلاصه‌های دو صفحه‌ای از آموزش‌ها را می‌توانید در قسمت عقب پیدا کنید.



توضیحاتی درمورد کتاب به خارجی

This book constitutes the proceedings of the 16th International Conference on Research Challenges in Information Sciences, RCIS 2022, which took place in Barcelona, Spain, during May 17–20, 2022. It focused on the special theme "Ethics and Trustworthiness in Information Science".

The scope of RCIS is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice.

The 35 full papers presented in this volume were carefully reviewed and selected from a total 100 submissions. The 18 Forum papers are based on 11 Forum submissions, from which 5 were selected, and the remaining 13 were transferred from the regular submissions. The 6 Doctoral Consortium papers were selected from 10 submissions to the consortium. The contributions were organized in topical sections named: Data Science and Data Management; Information Search and Analysis; Business Process Management; Business Process Mining; Digital Transformation and Smart Life; Conceptual Modelling and Ontologies; Requirements Engineering; Model-Driven Engineering; Machine Learning Applications. In addition, two-page summaries of the tutorials can be found in the back matter.




فهرست مطالب

Preface
Organization
Engineering the New Fabric of the Information Infrastructure - IoT, Edge, and Cloud
“We Are Open. The Door is Just Very Heavy”: New Challenges in Information Science or How can IS Help with Fairness, Diversity, Non-Discrimination?
Contents
Data Science and Data Management
Personal Data Markets: A Narrative Review on Influence Factors of the Price of Personal Data
	1 Introduction
	2 Research Approach and Sample
		2.1 Research Approach
		2.2 Sample Description
	3 Results
		3.1 General Results
		3.2 Influence Factors on Pricing Personal Data
	4 Synthesis of Findings
	5 Conclusion and Limitations
	Appendix - Overview of Included Papers
	References
What's in a (Data) Type? Meaningful Type Safety for Data Science
	1 Introduction
	2 Datatypes Fail to Typify Data
		2.1 Time
		2.2 Mereology
		2.3 Provenance
	3 Current Approaches
		3.1 Documentation Standards
		3.2 Provenance Tracking
		3.3 Knowledge Representation
	4 Case Study: StatCAN Census Data
		4.1 Example Operations
	5 Meaningful Type Safety Framework (MeTS)
		5.1 Interface Component
		5.2 Typing Component
	6 Type System
		6.1 Syntax
		6.2 Expression Trees
		6.3 Preconditions
		6.4 Implementation
	7 Application and Evaluation on StatCAN Data
		7.1 Disjointedness
		7.2 Provenance
	8 Research Program
		8.1 Correspondence Theorem
		8.2 Tractability
	9 Conclusion
	References
Research Data Management in the Image Lifecycle: A Study of Current Behaviors
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Results
		4.1 Planning
		4.2 Creation/Compilation
		4.3 Quality Assurance
		4.4 Processing/Analysis
		4.5 Description
		4.6 Storage
		4.7 Sharing
	5 Discussion
	6 Conclusion and Future Work
	References
Information Search and Analysis
Towards an Arabic Text Summaries Evaluation Based on AraBERT Model
	1 Introduction
	2 Related Works
	3 Challenges of Arabic Language Processing
	4 Proposed Method
		4.1 Features
		4.2 Model Construction
	5 Dataset
	6 Results and Discussion
		6.1 Summary Evaluation Level
		6.2 System Evaluation Level
	7 Conclusion
	References
A Recommender System for EOSC. Challenges and Possible Solutions
	1 Introduction
	2 Overview of Recommender Systems
		2.1 Goals of a Recommender System
		2.2 Academic Recommender Systems
		2.3 Novel Approaches for Building Recommender Systems
	3 A Recommender System for EOSC
		3.1 About EOSC
		3.2 EOSC Users
		3.3 Motivation for Improved Recommendations in EOSC
		3.4 User Demands for Recommendations in EOSC
	4 Challenges for the EOSC Recommender System
	5 EOSC Recommender System – Architecture and Data Processing
		5.1 Online Modules
		5.2 Nearline Modules
		5.3 Offline Modules
		5.4 A Data Flow Example
	6 Discussion
	7 Summary
	References
ERIS: An Approach Based on Community Boundaries to Assess Polarization in Online Social Networks
	1 Introduction
	2 Related Work
	3 The ERIS Method
		3.1 Formal Definitions
		3.2 Algorithm
	4 Experimentations
		4.1 Execution on Large Graphs
		4.2 Case Study on Real Data
	5 Discussions
	6 Conclusion
	References
Business Process Management
Progress Determination of a BPM Tool with Ad-Hoc Changes: An Empirical Study
	1 Introduction
	2 Backgrounds
	3 Research Methodology and Study Design
		3.1 Research Questions
		3.2 Data Collection Method
		3.3 Study Design
		3.4 Data Analysis Method
	4 Evaluation
	5 Related Work
	6 Summary and Outlook
	References
Enabling Conformance Checking for Object Lifecycle Processes
	1 Introduction
	2 Fundamentals
	3 Problem Statement
	4 Granularity and Flexibility of Lifecycle Processes
		4.1 Granularity of Object Lifecycle Processes
		4.2 Flexibility in Object Lifecycle Processes
		4.3 Flexibility on State Level
		4.4 Flexibility on Step Level
	5 Conformance Checking of Lifecycle Processes
		5.1 Conformance Categories
		5.2 Leveraging Conformance Categories for Process Analysis
	6 Experimental Evaluation
	7 Related Work
	8 Summary and Outlook
	References
A Framework to Improve the Accuracy of Process Simulation Models
	1 Introduction
	2 Overall Idea and Motivation
	3 Preliminary
	4 Our Framework
		4.1 Basic Features
		4.2 Extended Features for Declare Rules
		4.3 Temporal Features
		4.4 Application of the Framework Using Different Features
		4.5 Feature Selection and Normalization
	5 Discussion
	6 Implementation and Experiments
	7 Related Works
	8 Conclusion
	References
Analyzing Process-Aware Information System Updates Using Digital Twins of Organizations
	1 Introduction
	2 Related Work
	3 Background and Preliminaries
		3.1 Process-Aware Information Systems (PAISs)
		3.2 Object-Centric Petri Nets (OCPNs)
	4 Modeling PAISs: Digital Twin Interface Model
		4.1 Modeling PAIS Entities
		4.2 Modeling PAIS Updates
	5 Impact Analysis
		5.1 Structural Impact Analysis
		5.2 Operational Impact Analysis
		5.3 Performance Impact Analysis
	6 Evaluation
		6.1 Implementation
		6.2 Case Study
	7 Conclusions
	References
Hybrid Business Process Simulation: Updating Detailed Process Simulation Models Using High-Level Simulations
	1 Introduction
	2 Related Work
	3 Preliminaries
		3.1 Process Mining
		3.2 System Dynamics
	4 Approach
		4.1 DES Simulation
		4.2 SD Simulation
		4.3 Designing and Updating the Interface Variables
	5 Proof of Concept
		5.1 Implementation
		5.2 Designed Process and Scenario
		5.3 Hybrid Simulation of the Sample Process
	6 Discussion
	7 Conclusion
	References
Business Process Mining
Towards Event Log Management for Process Mining - Vision and Research Challenges
	1 Introduction
	2 Preliminaries
		2.1 Process Mining
		2.2 Event Logs
	3 Method
		3.1 Narrative
		3.2 Artifact Network
	4 Event Log Management Framework
		4.1 Event Log Lifecycle
		4.2 Event Log Foundation
		4.3 Event Log Governance
	5 Discussion and Limitations
	6 Conclusion and Future Research
	References
Process Mining for Process Improvement - An Evaluation of Analysis Practices
	1 Introduction
	2 Background and Related Work
	3 Empirical Method
		3.1 Study Setup
		3.2 Data Collection and Analysis
	4 Findings
		4.1 Identifying Improvement Opportunities
		4.2 Selecting Improvement Opportunities
		4.3 Communicating Results
	5 Discussion
		5.1 Implications
		5.2 Limitations
	6 Conclusion
	References
Data-Driven Analysis of Batch Processing Inefficiencies in Business Processes
	1 Introduction
	2 Background and Related Work
	3 Identification of Batch Processing Inefficiencies
		3.1 Batch Processing Discovery
		3.2 Batch Processing Behavior Analysis
		3.3 Waiting Time Analysis of Batch Processing Activities
	4 Evaluation
		4.1 Experiments with Synthetic Data
		4.2 Experiments with a Real-Life Log
	5 Conclusion
	References
The Analysis of Online Event Streams: Predicting the Next Activity for Anomaly Detection
	1 Introduction
	2 Related Work
	3 Preliminaries
		3.1 Event Log
		3.2 Next Activity Prediction
		3.3 Unsupervised Anomaly Detection
	4 Approach
		4.1 Predictive Anomaly Detection (PAD)
		4.2 Online PAD Using Sliding Window and Retraining Interval
	5 Empirical Evaluation
		5.1 Setup of Evaluation
		5.2 Baseline - Unsupervised Anomalous Event Detection
	6 Result and Discussion
	7 Conclusion and Challenges
	References
Process Mining: A Guide for Practitioners
	1 Introduction
	2 Related Work
	3 Systematic Literature Review
	4 Results
		4.1 Process Mining Use Cases
		4.2 Business-Oriented Questions
	5 Framework
		5.1 Framework Instantiation
		5.2 Limitations
	6 Conclusion
	References
Digital Transformation and Smart Life
How Do Startups and Corporations Engage in Open Innovation? An Exploratory Study
	1 Introduction
	2 Background
		2.1 Digital Transformation
		2.2 Open Innovation
	3 Research Method
	4 Results
		4.1 Overview of Studied Startups and Corporations 
		4.2 Engagement Models Adopted by Startups with Corporations
		4.3 Drivers Involved in Startup-Corporation Relationships
		4.4 Challenges for Startups and Corporations
		4.5 Benefits for Startups and Corporations
	5 Lessons Learned and Recommendations
		5.1 Recommendations for Startups
		5.2 Recommendations for Corporations 
	6 Related Work
	7 Conclusions, Limitations and Future Work
	References
Smart Life: Review of the Contemporary Smart Applications
	1 Introduction
	2 Research Approach
	3 Analysis of Smart Application Research
		3.1 Taxonomy and Evolution of Smart Applications
		3.2 Sources of Papers Publishing on Smart Applications
		3.3 Smart Applications Underlying Terminology
		3.4 Smart Life Driving Factors
	4 Conclusion and Future Research
	References
Conceptual Modelling and Ontologies
Conceptual Integration for Social-Ecological Systems
	1 Introduction
	2 Social-Ecological Systems
		2.1 Social-Ecological System Framework
		2.2 Ecosystem Services
	3 Ontological Foundations for Social-Ecological Systems
		3.1 Ontological Clarification of SESs Components
		3.2 Integrated Social-Ecological Perspectives Framework
	4 Conclusions and Future Works
	References
Contratto – A Method for Transforming Legal Contracts into Formal Specifications
	1 Introduction
	2 Research Baseline
	3 The Transformation Process
	4 The Contratto Environment
	5 Related Work
	6 Conclusions
	References
Ontological Foundations for Trust Dynamics: The Case of Central Bank Digital Currency Ecosystems
	1 Introduction
	2 The Reference Ontology of Trust (ROT)
	3 Modeling Trust Dynamics
		3.1 Trust Influencing Trust
		3.2 Mental Biases
		3.3 Trust Calibration Signals
		3.4 Trustworthiness Evidence
	4 Case Study: Citizens' Trust in CBDC Ecosystems
		4.1 Research Method
		4.2 Research Context: CBDC Ecosystems
		4.3 Modeling Citizen's Trust in CBDC Ecosystems
		4.4 Discussion
	5 Related Work
	6 Conclusions
	References
Abstracting Ontology-Driven Conceptual Models: Objects, Aspects, Events, and Their Parts
	1 Introduction
	2 Background
		2.1 A Brief Introduction to UFO and OntoUML
		2.2 Ontology-Based Model Abstraction
	3 Abstracting Objects, Aspects, Events, and Their Parts
		3.1 Abstracting Objects
		3.2 Abstracting Aspects
		3.3 Abstracting Events
		3.4 Combining Abstraction Rules
	4 Towards Ontology-Based Model Abstraction 2.0
	5 Final Considerations
	References
Understanding and Modeling Prevention
	1 Introduction
	2 Background
		2.1 The Unified Foundational Ontology (UFO)
		2.2 The Simple Conditional Analysis and Its Insufficiency
	3 Unpacking the Notion of Prevention
		3.1 Lifting the Discussion to the Level of Types
		3.2 A Model for Prevention and Related Notions
	4 Prevention Applied to Risk Management
	5 Related Work
	6 Final Considerations
	References
Requirements Engineering
Requirements Engineering for Collaborative Artificial Intelligence Systems: A Literature Survey
	1 Introduction
	2 Related Work
	3 Methodology
	4 Results
		4.1 RQ1: Existing RE Challenges in CAIS
		4.2 RQ2: Relevant Requirements Types for CAIS
	5 Discussion
		5.1 Challenges
		5.2 Requirements
		5.3 Limitations of the Study
	6 Conclusion
	References
On the Current Practices for Specifying Sustainability Requirements
	1 Introduction
	2 Background
	3 Survey Design
	4 A Survey on Sustainability at IT Companies
		4.1 Participants
		4.2 Survey Questions and Results
		4.3 Threats to Validity
	5 Major Insights
	6 Related Work
	7 Conclusions
	References
Defining Key Concepts in Information Science Research: The Adoption of the Definition of Feature
	1 Introduction
	2 Research Method and Data Collection
		2.1 Concept Definition Review
		2.2 Data Collection
		2.3 Popularity of the Definitions
	3 Analysis and Categorization of the Concept Definitions
		3.1 Definition Types
		3.2 Research Topics
		3.3 Abstraction Level
		3.4 Viewpoint
	4 Concept Definition Guidelines and Conclusion
	References
Assisted-Modeling Requirements for Model-Driven Development Tools
	1 Introduction
	2 Background and Motivation
	3 Focus Groups Protocol
		3.1 Selecting Subjects
		3.2 Segmentation
		3.3 Conducting the Focus Group Sessions
	4 Results and Discussion
		4.1 RQ1: What are the Challenges Perceived by MDD Users During Modeling for Later Code Generation?
		4.2 RQ2: What are the Features of the Current Modeling Assistants that Users Like/Dislike?
		4.3 RQ3: What are the User’s Needs that are not yet Satisfied by the Current Modeling Assistants?
	5 Gathered Requirements and an Emerging Framework
	6 Threats to Validity and Limitations
	7 Conclusions and Further Work
	References
Model-Driven Engineering
Model-Driven Production of Data-Centric Infographics: An Application to the Impact Measurement Domain
	1 Introduction
	2 Research Method
	3 Conceptual Background on Infographics and on Ethical, Social and Environmental Accounting
	4 Analyses of Infographic Component Types and Tools
	5 Domain-Specific Language for Infographics
		5.1 Requirements Specification
		5.2 Xtext Grammar
		5.3 Model Interpreter and Infographic Generator in OpenESEA
	6 Validation
		6.1 Test Cases
		6.2 Comparative Experiment
		6.3 Expert Assessment
	7 Discussion of the Results
		7.1 Reflection on the Results
		7.2 Validity of the Results
	8 Conclusions and Future Research
	References
The B Method Meets MDE: Review, Progress and Future
	1 Introduction
	2 Executable DSLs: Correctness and Challenges
		2.1 Observations
		2.2 Discussion
	3 The Meeduse LWB
		3.1 Overall View
		3.2 Towards a Viable Formal Abstract Syntax
		3.3 ProB as an Execution Engine of xDSLs
	4 Applications
		4.1 FMDE for Railway Systems
		4.2 FMDE for Model Transformations
		4.3 FMDE for XML Standards
	5 Discussion and Future
	References
Enabling Content Management Systems as an Information Source in Model-Driven Projects
	1 Introduction
	2 Framework Overview
	3 The Core CMS Model
	4 The Reverse Engineering Process
		4.1 The CMSs API
		4.2 Discovery Process
		4.3 Extraction Example
	5 Model Integration and Refinement
	6 Code Generation Infrastructure
		6.1 Middleware Structure
		6.2 The Middleware API
		6.3 Middleware Usage Example
	7 Tool Support
	8 Related Work
	9 Conclusions and Future Work
	References
A Global Model-Driven Denormalization Approach for Schema Migration
	1 Introduction
	2 Related Works
	3 ModelDrivenGuide Approach
		3.1 Logical Model Refinement Rules
		3.2 Inverse Functions
		3.3 Completeness of Our Approach
	4 Smart Data Model Search Optimizer
		4.1 Complexity of the Naïve Denormalization Process
		4.2 Application of the Refinement Rules
		4.3 Heuristic of Model Generation
		4.4 Complexity of the Heuristic
	5 Experiments
		5.1 Implementation
		5.2 TPC-C
		5.3 Data Models Generation
	6 Conclusion and Future Work
	References
State Model Inference Through the GUI Using Run-Time Test Generation
	1 Introduction
	2 Related Work
	3 State Model Inference for TESTAR
	4 Using the Inferred Models for Action Selection
	5 Defining a Suitable Level of Abstraction
		5.1 Including the Predecessor State
	6 Findings, Challenges and Future Research Directions
		6.1 State Abstraction
		6.2 Applying the Inferred Models in Testing
	7 Conclusions
	References
Machine Learning Applications
Autonomous Object Detection Using a UAV Platform in the Maritime Environment
	1 Introduction
		1.1 Contribution
	2 System Design
		2.1 User Requirements
		2.2 Hardware Components
	3 System Architecture
		3.1 Object Detection - YOLOv5
		3.2 Object Tracking - Deep SORT
		3.3 CISE Compatibility
		3.4 Initial Testing
	4 Conclusions
	References
Bosch’s Industry 4.0 Advanced Data Analytics: Historical and Predictive Data Integration for Decision Support
	1 Introduction
	2 Related Work
	3 Proposed Architecture and Data Modelling Method
		3.1 Components and Supporting Technologies
		3.2 Data Modelling Method
	4 Industrial Demonstration Case: The Screwing Case
		4.1 Motivation and Goal
		4.2 Supporting Data and Machine Learning Models
		4.3 Data Model
		4.4 Integration and Flows
		4.5 Decision Support Dashboards
	5 Conclusions
	References
Benchmarking Conventional Outlier Detection Methods
	1 Introduction
	2 Overview of Traditional Outlier Detection Methods
		2.1 Isolation Forest
		2.2 Density-Based Algorithm for Discovering Clusters
		2.3 Local Outlier Factor
		2.4 Related Work
	3 Methodology
		3.1 Datasets
		3.2 Data Preprocessing and Model Implementation
		3.3 Hyperparameters Setting
		3.4 Model Comparison
	4 Results
	5 Discussion
	6 Limitations and Validity Threats
	7 Conclusion
	A Appendices
	References
Forum
Handling Temporal Data Imperfections in OWL 2 - Application to Collective Memory Data Entries
	1 Introduction
	2 Preliminaries and Related Work: Handling Temporal Data in Semantic Web
		2.1 Temporal Data Representation and Reasoning About
		2.2 Temporal Data Reasoning: Allen's Interval Algebra
	3 Representing Temporal Data Imperfection in OWL 2
	4 Reasoning About Uncertain Temporal Data: Extending Allen's Interval Algebra
	5 ``TimeOntoImperfection'': The Proposed Ontology
	6 Validation
		6.1 Prototype Implemented Based on ``TimeOntoImperfection''
		6.2 Application to Collective Memory Data
	7 Conclusion
	References
Integrated Approach to Assessing the Progress of Digital Transformation by Using Multiple Objective and Subjective Indicators
	1 Introduction
	2 Role and Hierarchy of CIOs, CISOs, CTOs and CDOs
	3 Indicators and Model to Assess the Digital Transformation
	4 Numerical Application
	5 Conclusions
	References
Towards Integrated Model-Driven Engineering Approach to Business Intelligence
	1 Introduction
	2 Business Intelligence Generator
	3 Data-Driven Module in BIG
	4 Demand-Driven Module in BIG
	5 Data Flow Module in BIG
	6 Design Process in BIG
	7 Discussion and Future Works
	References
Method for Evaluating Information Security Level in Organisations
	1 Introduction
	2 Related Work
	3 Creation of Security Evaluation Framework
	4 Evaluation
	References
ChouBERT: Pre-training French Language Model for Crowdsensing with Tweets in Phytosanitary Context
	1 Introduction
	2 Related Work
	3 Approach
	4 Experiments
		4.1 Data Preparation
		4.2 Experimental Setup
		4.3 Results and Evaluation
	5 Threats to Validity
	6 Conclusion and Future Work
	References
A Conceptual Characterization of Fake News: A Positioning Paper
	1 Introduction
	2 Related Work
	3 Fake News into the Information Ecosystem
	4 Characterization of the Fake News Concept
		4.1 Fake News are Not Created for Fun
		4.2 Fake News Create a Distortion Between Real and False Facts
		4.3 Fake News Credibility: The Authority Notion
		4.4 Fake News Target a Precise Category of People and Use a Cognitive Process Based on Emotions
		4.5 Our Fake News Definition
	5 Conclusions: Toward a Fake News Conceptual Model
	References
Combinations of Content Representation Models for Event Detection on Social Media
	1 Introduction
	2 Related Work
	3 Clustering for Event Detection
		3.1 Description of the Framework
		3.2 Documents Representation
		3.3 Clustering
	4 Combination Method
		4.1 General Description of the Method
		4.2 Aggregation Methods
		4.3 Configurations
		4.4 Phases of the Experiments
	5 Experiments, Results and Analysis
		5.1 Experimental Setup
		5.2 Results and Analysis
	6 Conclusion
	References
Increasing Awareness and Usefulness of Open Government Data: An Empirical Analysis of Communication Methods
	1 Introduction
	2 Methodology
	3 Results
		3.1 Communication Methods Identified
		3.2 Survey Results
	4 Discussion
	5 Conclusion and Future Work
	References
Toward Digital ERP: A Literature Review
	1 Introduction
	2 Background and Conceptual Development
	3 Methods
	4 Findings
		4.1 Digital Capabilities
		4.2 Need for Digital Capabilities in ERP
		4.3 Digital Technologies in ERP
		4.4 ERP as Digital Platform
		4.5 ERP Processes Enabled by Digital
	5 Discussion
	6 Conclusion
	References
Trust Model Recommendation Driven by Application Requirements
	1 Introduction
	2 State of the Art
	3 An Approach to the Trust Computational Model Selection
		3.1 Application Requirements Modelling
		3.2 Model for Trust Requirements
		3.3 Trust Computational Model Recommendation
	4 Case Study
		4.1 Model Requirements for Carpooling
		4.2 Trust Requirements Model for Carpooling
		4.3 Trust Computational Model Recommendation
	5 Conclusion and Perspectives
	References
Predicting the State of a House Using Google Street View
	1 Introduction
	2 Related Work
	3 Methodology
	4 Experimental Results
		4.1 Prediction Accuracy
		4.2 Model Explainability
	5 Discussion and Conclusions
	References
Towards a Comprehensive BPMN Extension for Modeling IoT-Aware Processes in Business Process Models
	1 Introduction
	2 Problem Statement
	3 Existing Approaches
	4 Solution Proposal
		4.1 Case Study 1: Healthcare Process
		4.2 Case Study 2: Production Process
	5 Conclusions
	References
Team Selection Using Statistical and Graphical Approaches for Cricket Fantasy Leagues
	1 Introduction
	2 Related Work
	3 Data and Dream11
		3.1 Dataset
		3.2 Dream 11
	4 Proposed Model
		4.1 Weighted Graph
		4.2 Base Performance
		4.3 Optimization
	5 Results
	6 Conclusion and Future Work
	References
PM4Py-GPU: A High-Performance General-Purpose Library for Process Mining
	1 Introduction
	2 Preliminaries
		2.1 NVIDIA RAPIDS
		2.2 Dataframes and File Formats for the Storage of Event Logs
	3 Implementation and Tool
	4 Assessment
	5 Related Work
	6 Conclusion
	References
Interactive Business Process Comparison Using Conformance and Performance Insights - A Tool
	1 Introduction
	2 Motivation
	3 Approach
		3.1 Conformance Comparison
		3.2 Performance Comparison
	4 Tool
		4.1 Availability
		4.2 Components
		4.3 Maturity
	5 Conclusion
	References
Research Incentives in Academia Leading to Unethical Behavior
	1 Introduction
	2 Background
		2.1 Researcher Performance Evaluation
		2.2 Perverse Incentives
	3 Unethical Outcomes
		3.1 Publication Misconducts
		3.2 Individual Misconduct
		3.3 Group Misconducts
	4 Reflections and Recommendations
	5 Conclusions
	References
Assessing the Ethical, Social and Environmental Performance of Conferences
	1 Introduction
	2 Research Method
	3 Background Information
		3.1 The Overarching Improvement Cycle
		3.2 The Need for Stakeholder Management and Engagement
	4 ESEA Method Overview
	5 Material Topics for Conferences
	6 This Is Just the Start
	References
ANGLEr: A Next-Generation Natural Language Exploratory Framework
	1 Introduction
	2 Existing Frameworks Review
	3 ANGLEr: A Next-Generation Natural Language Exploratory Framework
		3.1 Data Model
		3.2 High-Level Architecture
		3.3 REST Interface
		3.4 Graphical User Interface
	4 Conclusion
	References
Doctoral Consortium
Towards a Roadmap for Developing Digital Work Practices: A Maturity Model Approach
	1 Research Problem and State of the Art
	2 Research Methodology
		2.1 Project 1. Systematic Literature Review and Data-Driven Analysis for Level Identification
		2.2 Project 2. Validation Study with Expert Panel and Illustrative Case Study
		2.3 Project 3. Generalization Study with a Quantitative Approach (Survey)
	3 Intermediate Results
	4 Conclusion and Future Steps
	References
Evolutionary Scriptless Testing
	1 Introduction
	2 Related Work
	3 TESTAR
	4 Towards Evolutionary Scriptless Testing
		4.1 Representation: ASRs as Individuals
		4.2 Fitness Function
		4.3 Manipulation Operators: Crossover and Mutation
	5 Expected Contributions
	6 Plan for Validation and Evaluation
	References
Scriptless Testing for Extended Reality Systems
	1 Introduction
	2 Related Work
	3 TESTAR Tool
	4 XR Research Challenges
	5 Completion Plan
		5.1 Smart Interaction Movements
		5.2 XR State Abstraction
		5.3 Navigable State Model Layer
		5.4 XR Test Oracles
		5.5 Validation Plan
	6 Conclusion
	References
Artificial Intelligence: Impacts of Explainability on Value Creation and Decision Making
	1 Introduction
	2 The Problem
	3 State of the Art
	4 Research Objectives and Methodology
	5 Theoretical Background
	6 Expected Tangible Results
	7 Conclusion
	References
Towards Empirically Validated Process Modelling Education Using a BPMN Formalism
	1 Context and Motivation
	2 State of the Art
	3 Research Objectives and Methodology
	4 Conclusions and Future Work
	References
Multi-task Learning for Automatic Event-Centric Temporal Knowledge Graph Construction
	1 Introduction
	2 Proposed End-to-End Architecture
	3 Research Questions
	4 Related Work
	5 Data Construction
	6 Scientific Contributions
	7 Conclusion
	References
Tutorials
Information Security and Risk Management: Trustworthiness and Human Interaction
	1 Tutorial Abstract
	Acknowledgements
	References
The Challenge of Collecting and Analyzing Information from Citizens and Social Media in Emergencies: The Crowd4SDG Experience and Tools
	References
Information Science Research with Machine Learning: Best Practices and Pitfalls
	1 Tutorial Abstract
	References
Author Index




نظرات کاربران