[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Issue
Volume 9, June
Previous Issue
Volume 8, December
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 

Informatics, Volume 9, Issue 1 (March 2022) – 29 articles

Cover Story (view full-size image): In this paper, we present a novel implementation of an ecosystem simulation. In the past, we implemented a 3D environment based on a predator–prey model, but we found that in most cases, regardless of the choice of starting parameters, the simulation quickly led to extinctions. We wanted to achieve system stabilization, long-term operation, and better simulation of reality by incorporating genetic evolution. Therefore, we applied the predator–prey model with an evolutional approach. Using the Unity game engine, we created and managed a closed 3D ecosystem environment defined by an artificial or real uploaded map. View this paper.
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
18 pages, 1556 KiB  
Article
Benchmarking Deep Learning Methods for Behaviour-Based Network Intrusion Detection
by Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado and Tiago Murteira
Informatics 2022, 9(1), 29; https://doi.org/10.3390/informatics9010029 - 20 Mar 2022
Cited by 17 | Viewed by 4581
Abstract
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilities exploits. Behaviour-based network IDSs have been seen as a way [...] Read more.
Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilities exploits. Behaviour-based network IDSs have been seen as a way to overcome signature-based IDS flaws, namely through the implementation of machine-learning-based methods, to tolerate new forms of normal network behaviour, and to identify yet unknown malicious activities. A wide set of machine learning methods has been applied to implement behaviour-based IDSs with promising results on detecting new forms of intrusions and attacks. Innovative machine learning techniques have emerged, namely deep-learning-based techniques, to process unstructured data, speed up the classification process, and improve the overall performance obtained by behaviour-based network intrusion detection systems. The use of realistic datasets of normal and malicious networking activities is crucial to benchmark machine learning models, as they should represent real-world networking scenarios and be based on realistic computers network activity. This paper aims to evaluate CSE-CIC-IDS2018 dataset and benchmark a set of deep-learning-based methods, namely convolutional neural networks (CNN) and long short-term memory (LSTM). Autoencoder and principal component analysis (PCA) methods were also applied to evaluate features reduction in the original dataset and its implications in the overall detection performance. The results revealed the appropriateness of using the CSE-CIC-IDS2018 dataset to benchmark supervised deep learning models. It was also possible to evaluate the robustness of using CNN and LSTM methods to detect unseen normal activity and variations of previously trained attacks. The results reveal that feature reduction methods decreased the processing time without loss of accuracy in the overall detection performance. Full article
Show Figures

Figure 1

Figure 1
<p>Intrusion detection systems taxonomy.</p>
Full article ">Figure 2
<p>Long short-term memory architecture.</p>
Full article ">Figure 3
<p>Convolutional neural network architecture.</p>
Full article ">Figure 4
<p>Autoencoder architecture.</p>
Full article ">Figure 5
<p>Principal component analysis architecture.</p>
Full article ">Figure 6
<p>Overall processing architecture.</p>
Full article ">
24 pages, 628 KiB  
Article
Factors Affecting Reputational Damage to Organisations Due to Cyberattacks
by Srinath Perera, Xiaohua Jin, Alana Maurushat and De-Graft Joe Opoku
Informatics 2022, 9(1), 28; https://doi.org/10.3390/informatics9010028 - 18 Mar 2022
Cited by 21 | Viewed by 18360
Abstract
The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased cybercrime, reputation displaying a more important role within [...] Read more.
The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased cybercrime, reputation displaying a more important role within risk management frameworks both within public and private institutions is vital. This study identifies key factors in determining reputational damage to public and private sector institutions through cyberattacks. Researchers conducted an extensive review of the literature, which addresses factors relating to risk management of reputation post-cyber breach. The study identified 42 potential factors, which were then classified using the STAR model. This model is an organisational design framework and was suitable due to its alignment with organisations. A qualitative study using semi-structured and structured questions was conducted with purposively selected cybersecurity experts in both public and private sector institutions. Data obtained from the expert forum were analysed using thematic analysis, which revealed that a commonly accepted definition for cyber reputation was lacking despite the growing use of the term “online reputation”. In addition, the structured questions data were analysed using relative importance index rankings. The analysis results revealed significant factors in determining reputational damage due to cyberattacks, as well as highlighting reputation factor discrepancies between private and public institutions. Theoretically, this study contributes to the body of knowledge relating to cybersecurity of organisations. Practically, this research is expected to aid organisations to properly position themselves to meet cyber incidents and become more competitive in the post-COVID-19 era. Full article
(This article belongs to the Special Issue Feature Papers in Informatics in 2022)
Show Figures

Figure 1

Figure 1
<p>An overview of the research process used in the study.</p>
Full article ">
19 pages, 984 KiB  
Article
UTAUT Model for Smart City Concept Implementation: Use of Web Applications by Residents for Everyday Operations
by Yelena Popova and Diana Zagulova
Informatics 2022, 9(1), 27; https://doi.org/10.3390/informatics9010027 - 10 Mar 2022
Cited by 18 | Viewed by 4818
Abstract
The article considers the attitude of smart city residents towards the use of web applications in everyday life. It is very important for many stakeholders since it affects the involvement of people in all processes of urban life and contributes to the implementation [...] Read more.
The article considers the attitude of smart city residents towards the use of web applications in everyday life. It is very important for many stakeholders since it affects the involvement of people in all processes of urban life and contributes to the implementation of the smart city concept. The goal of the research is to study the factors influencing the intention and use of web applications in a smart city. Based on the results of surveying the residents of Riga, the UTA UT model was applied with the employment of partial least squares structural equation modeling in Smart PLS. The traditional constructs of the UTAUT model—Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), Facilitating Conditions (FC), as well as Attitude towards the use of Applications (ATA)—had a direct or indirect positive relationship with the intention to use technologies (Behavioral Intention: BI) and/or with usage of these technologies (Use Behavior: UB). Anxiety indirectly via ATA showed a negative effect on UB. The influence of Age, Gender and Education on BI and UB as moderators was also investigated. Only Age as a moderator negatively affected the relationship between FC and PE and SI. The results showed that in order to involve in full scope of the population of Riga in the use of communication technologies and the implementation of the smart city concept, it is necessary to create the appropriate conditions for residents, in particular by teaching people on a permanent basis. Some of the obtained results were different from similar studies’ results, which emphasizes that city authorities and other stakeholders should make decisions on the involvement of citizens in smart process based on the local peculiarities, which supports the slogan of smart cities—think globally, act locally. Full article
(This article belongs to the Special Issue Building Smart Cities and Infrastructures for a Sustainable Future)
Show Figures

Figure 1

Figure 1
<p>The proposed research conceptual model. Source: Generated by the authors.</p>
Full article ">Figure 2
<p>The Unified Theory of Acceptance and Use of Technology (UTAUT) model. Source: Generated by the authors. N.B.: The adjusted R<sup>2</sup> is indicated inside the circles, path coefficients on the arrows and t-statistics in brackets. a,b—modulating impact of Age on relations of Facilitating Conditions and Performance Expectancy (a) and Effort Expectancy (b).</p>
Full article ">
15 pages, 866 KiB  
Article
Where Is My Mind (Looking at)? A Study of the EEG–Visual Attention Relationship
by Victor Delvigne, Noé Tits, Luca La Fisca, Nathan Hubens, Antoine Maiorca, Hazem Wannous, Thierry Dutoit and Jean-Philippe Vandeborre
Informatics 2022, 9(1), 26; https://doi.org/10.3390/informatics9010026 - 9 Mar 2022
Cited by 1 | Viewed by 4653
Abstract
Visual attention estimation is an active field of research at the crossroads of different disciplines: computer vision, deep learning, and medicine. One of the most common approaches to estimate a saliency map representing attention is based on the observed images. In this paper, [...] Read more.
Visual attention estimation is an active field of research at the crossroads of different disciplines: computer vision, deep learning, and medicine. One of the most common approaches to estimate a saliency map representing attention is based on the observed images. In this paper, we show that visual attention can be retrieved from EEG acquisition. The results are comparable to traditional predictions from observed images, which is of great interest. Image-based saliency estimation being participant independent, the estimation from EEG could take into account the subject specificity. For this purpose, a set of signals has been recorded, and different models have been developed to study the relationship between visual attention and brain activity. The results are encouraging and comparable with other approaches estimating attention with other modalities. Being able to predict a visual saliency map from EEG could help in research studying the relationship between brain activity and visual attention. It could also help in various applications: vigilance assessment during driving, neuromarketing, and also in the help for the diagnosis and treatment of visual attention-related diseases. For the sake of reproducibility, the codes and dataset considered in this paper have been made publicly available to promote research in the field. Full article
(This article belongs to the Special Issue Feature Papers in Medical and Clinical Informatics)
Show Figures

Figure 1

Figure 1
<p>Overview of the proposed framework with the two training procedures. (1). Training of both VAE aiming to encode: EEG signals <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>E</mi> <mi>G</mi> </mrow> </semantics></math> in the corresponding latent space mean <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>e</mi> </msub> </semantics></math> and standard deviation <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>e</mi> </msub> </semantics></math> by reconstructing the original signal <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>E</mi> <msub> <mi>G</mi> <mi>p</mi> </msub> </mrow> </semantics></math> from its original representation <math display="inline"><semantics> <mrow> <mi>E</mi> <mi>E</mi> <msub> <mi>G</mi> <mi>t</mi> </msub> </mrow> </semantics></math>; visual saliency maps <span class="html-italic">y</span> in the corresponding latent space mean <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>h</mi> </msub> </semantics></math> and standard deviation <math display="inline"><semantics> <msub> <mi>σ</mi> <mi>h</mi> </msub> </semantics></math> by reconstructing the original map <math display="inline"><semantics> <msub> <mi>y</mi> <mi>p</mi> </msub> </semantics></math> from its original representation <math display="inline"><semantics> <msub> <mi>y</mi> <mi>t</mi> </msub> </semantics></math>. (2). Training of the translator that aims to connect both latent spaces by combining the two pre-trained parts of the VAE. A discriminator distinguishing real map <math display="inline"><semantics> <msub> <mi>y</mi> <mi>t</mi> </msub> </semantics></math> to that generated by the generator <math display="inline"><semantics> <msub> <mi>y</mi> <mi>p</mi> </msub> </semantics></math> is added to help the generator to create saliency maps similar to the ones in the dataset.</p>
Full article ">Figure 2
<p>Overview of the architecture composed of the generator and discriminator model. As seen in the figure, the different key steps are represented from left to the right: creation of 3D images from raw EEG signals; encoding of EEG Images into latent representation <math display="inline"><semantics> <msub> <mi>z</mi> <mi>e</mi> </msub> </semantics></math>; distribution mapping from EEG latent representation <math display="inline"><semantics> <msub> <mi>z</mi> <mi>e</mi> </msub> </semantics></math> to visual saliency map latent-space representation <math display="inline"><semantics> <msub> <mi>z</mi> <mi>h</mi> </msub> </semantics></math>; decoding to estimate saliency map <math display="inline"><semantics> <msub> <mi>y</mi> <mi>p</mi> </msub> </semantics></math>; discrimination between estimated <math display="inline"><semantics> <msub> <mi>y</mi> <mi>p</mi> </msub> </semantics></math> and ground truth saliency map <math display="inline"><semantics> <msub> <mi>y</mi> <mi>t</mi> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>Example of ground truth <math display="inline"><semantics> <msub> <mi>y</mi> <mi>t</mi> </msub> </semantics></math> and estimated saliency map <math display="inline"><semantics> <msub> <mi>y</mi> <mi>p</mi> </msub> </semantics></math> for the model trained with our dataset with (1) and without (2) considering the adversarial training.</p>
Full article ">
32 pages, 7175 KiB  
Article
“Saving Precious Seconds”—A Novel Approach to Implementing a Low-Cost Earthquake Early Warning System with Node-Level Detection and Alert Generation
by Raj Prasanna, Chanthujan Chandrakumar, Rasika Nandana, Caroline Holden, Amal Punchihewa, Julia S. Becker, Seokho Jeong, Nandika Liyanage, Danuka Ravishan, Rangana Sampath and Marion Lara Tan
Informatics 2022, 9(1), 25; https://doi.org/10.3390/informatics9010025 - 8 Mar 2022
Cited by 30 | Viewed by 9279
Abstract
This paper presents findings from ongoing research that explores the ability to use Micro-Electromechanical Systems (MEMS)-based technologies and various digital communication protocols for earthquake early warning (EEW). The paper proposes a step-by-step guide to developing a unique EEW network architecture driven by a [...] Read more.
This paper presents findings from ongoing research that explores the ability to use Micro-Electromechanical Systems (MEMS)-based technologies and various digital communication protocols for earthquake early warning (EEW). The paper proposes a step-by-step guide to developing a unique EEW network architecture driven by a Software-Defined Wide Area Network (SD-WAN)-based hole-punching technology consisting of MEMS-based, low-cost accelerometers hosted by the general public. In contrast with most centralised cloud-based approaches, a node-level decentralised data-processing is used to generate warnings with the support of a modified Propagation of Local Undamped Motion (PLUM)-based EEW algorithm. With several hypothetical earthquake scenarios, experiments were conducted to evaluate the system latencies of the proposed decentralised EEW architecture and its performance was compared with traditional centralised EEW architecture. The results from sixty simulations show that the SD-WAN-based hole-punching architecture supported by the Transmission Control Protocol (TCP) creates the optimum alerting conditions. Furthermore, the results provide clear evidence to show that the decentralised EEW system architecture can outperform the centralised EEW architecture and can save valuable seconds when generating EEW, leading to a longer warning time for the end-user. This paper contributes to the EEW literature by proposing a novel EEW network architecture. Full article
Show Figures

Figure 1

Figure 1
<p>Illustrating IoT architectures and their layers: (<b>a</b>) centralised architecture, (<b>b</b>) typical decentralised architecture, and (<b>c</b>) proposed decentralised architecture.</p>
Full article ">Figure 2
<p>The proposed decentralised architecture consists of Raspberry Shake sensors installed in different Local Area Networks, which are connected to each other via the internet.</p>
Full article ">Figure 3
<p>Different types of possible security breaches in the proposed network architecture.</p>
Full article ">Figure 4
<p>A scenario illustrating how the prediction process of the PLUM ground motion detection algorithm occurs within a circular region of 30 km radius (The red star represents a prediction point and blue dots are the potential observation data points whereas green dots are observation points outside the 30 km range and not involved in the detection process in this particular scenario).</p>
Full article ">Figure 5
<p>Installed Raspberry Shake sensors in the Wellington region.</p>
Full article ">Figure 6
<p>(<b>a</b>) Hourly distribution of the transmission delay during a 24-h period for TCP (blue dots) and UDP (red dots). (<b>b</b>) Hourly distribution of the transmission delay during a 24-h period for MQTT (orange dots).</p>
Full article ">Figure 7
<p>Centralised processing architecture using the AWS virtual machine.</p>
Full article ">Figure 8
<p>(<b>a</b>) Pseudocode for the decentralised processing algorithm. (<b>b</b>) Pseudocode for the centralised processing algorithm.</p>
Full article ">Figure 9
<p>Sensors installed in different regions of New Zealand.</p>
Full article ">Figure 10
<p>Lost data packets in centralised processing with MQTT as the communication protocol.</p>
Full article ">Figure A1
<p>Scenario 1.</p>
Full article ">Figure A2
<p>Scenario 2.</p>
Full article ">Figure A3
<p>Scenario 3.</p>
Full article ">Figure A4
<p>Scenario 4.</p>
Full article ">Figure A5
<p>Scenario 5.</p>
Full article ">Figure A6
<p>Scenario 6.</p>
Full article ">
22 pages, 388 KiB  
Article
Modeling Subcutaneous Microchip Implant Acceptance in the General Population: A Cross-Sectional Survey about Concerns and Expectations
by Shekufeh Shafeie, Beenish Moalla Chaudhry and Mona Mohamed
Informatics 2022, 9(1), 24; https://doi.org/10.3390/informatics9010024 - 7 Mar 2022
Cited by 12 | Viewed by 11495
Abstract
Despite the numerous advantages of microchip implants, their adoption remains low in the public sector. We conducted a cross-sectional survey to identify concerns and expectations about microchip implants among potential users. A total of 179 United States adults aged 18–83 years responded to [...] Read more.
Despite the numerous advantages of microchip implants, their adoption remains low in the public sector. We conducted a cross-sectional survey to identify concerns and expectations about microchip implants among potential users. A total of 179 United States adults aged 18–83 years responded to two qualitative questions that were then analyzed using the thematic analysis technique. The identified codes were first categorized and then clustered to generate themes for both concerns and expectations. The prevalence of each theme was calculated across various demographic factors. Concerns were related to data protection, health risks, knowledge, negative affect, ease of use, metaphysical dilemmas, monetary issues, and negative social impact. Expectations included medical and non-medical uses, dismissal of microchips, technical advances, human enhancement, regulations, and affordability. The prevalence of concerns and benefits differed by immigration status and medical conditions. Informed by our findings, we present a modification to the Technology Acceptance Model for predicting public’s behavioral intention to use subcutaneous microchips. We discuss the five newly proposed determinants and seven predictor variables of this model by surveying the literature. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed model for behavioral intention to use subcutaneous microchips.</p>
Full article ">
14 pages, 5251 KiB  
Article
Identifying Faked Responses in Questionnaires with Self-Attention-Based Autoencoders
by Alberto Purpura, Giuseppe Sartori, Dora Giorgianni, Graziella Orrú and Gian Antonio Susto
Informatics 2022, 9(1), 23; https://doi.org/10.3390/informatics9010023 - 6 Mar 2022
Cited by 3 | Viewed by 4170
Abstract
Deception, also known as faking, is a critical issue when collecting data using questionnaires. As shown by previous studies, people have the tendency to fake their answers whenever they gain an advantage from doing so, e.g., when taking a test for a job [...] Read more.
Deception, also known as faking, is a critical issue when collecting data using questionnaires. As shown by previous studies, people have the tendency to fake their answers whenever they gain an advantage from doing so, e.g., when taking a test for a job application. Current methods identify the general attitude of faking but fail to identify faking patterns and the exact responses affected. Moreover, these strategies often require extensive data collection of honest responses and faking patterns related to the specific questionnaire use case, e.g., the position that people are applying to. In this work, we propose a self-attention-based autoencoder (SABA) model that can spot faked responses in a questionnaire solely relying on a set of honest answers that are not necessarily related to its final use case. We collect data relative to a popular personality test (the 10-item Big Five test) in three different use cases, i.e., to obtain: (i) child custody in court, (ii) a position as a salesperson, and (iii) a role in a humanitarian organization. The proposed model outperforms by a sizeable margin in terms of F1 score three competitive baselines, i.e., an autoencoder based only on feedforward layers, a distribution model, and a k-nearest-neighbor-based model. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed self-attention-based autoencoder (SABA) architecture.</p>
Full article ">Figure 2
<p>Self-attention layer empolyed in the SABA architecture.</p>
Full article ">Figure 3
<p>Correlation matrices between the honest and/or faked items in the <math display="inline"><semantics> <mi mathvariant="monospace">CC</mi> </semantics></math> dataset. (<b>a</b>) Correlation matrix of faked responses. (<b>b</b>) Correlation matrix of honest responses. (<b>c</b>) Correlation matrix of honest and faked responses.</p>
Full article ">Figure 4
<p>Correlation matrices between the honest and/or faked items in the <math display="inline"><semantics> <mi mathvariant="monospace">JIS</mi> </semantics></math> dataset. (<b>a</b>) Correlation matrix of faked responses. (<b>b</b>) Correlation matrix of honest responses. (<b>c</b>) Correlation matrix of honest and faked responses.</p>
Full article ">Figure 5
<p>Correlation matrices between the honest and/or faked items in the <math display="inline"><semantics> <mi mathvariant="monospace">JIHO</mi> </semantics></math> dataset. (<b>a</b>) Correlation matrix of faked responses. (<b>b</b>) Correlation matrix of honest responses. (<b>c</b>) Correlation matrix of honest and faked responses.</p>
Full article ">Figure 6
<p>Probability density function (PDF) of the number of faked responses per questionnaire and per-item F1 scores for the faking detection task using the SABA model on different datasets. (<b>a</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">CC</mi> </semantics></math>. (<b>b</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIS</mi> </semantics></math>. (<b>c</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIHO</mi> </semantics></math>.</p>
Full article ">Figure 7
<p>Probability density function (PDF) of the number of faked responses per questionnaire and per-item precision for the faking detection task using the SABA model on different datasets. (<b>a</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">CC</mi> </semantics></math>. (<b>b</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIS</mi> </semantics></math>. (<b>c</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIHO</mi> </semantics></math>.</p>
Full article ">Figure 8
<p>Probability density function (PDF) of the number of faked responses per questionnaire and per-item recall for the faking detection task using the SABA model on different datasets. (<b>a</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">CC</mi> </semantics></math>. (<b>b</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIS</mi> </semantics></math>. (<b>c</b>) dataset <math display="inline"><semantics> <mi mathvariant="monospace">JIHO</mi> </semantics></math>.</p>
Full article ">
14 pages, 564 KiB  
Article
Social Media and Social Support: A Framework for Patient Satisfaction in Healthcare
by Md Irfanuzzaman Khan, Zoeb Ur Rahman, M. Abu Saleh and Saeed Uz Zaman Khan
Informatics 2022, 9(1), 22; https://doi.org/10.3390/informatics9010022 - 4 Mar 2022
Cited by 6 | Viewed by 7837
Abstract
Social media has been a powerful source of social support for health consumers. In the healthcare sector, social media has thrived, building on various dynamic platforms supporting the connection between social relationships, health, and wellbeing. While prior research has shown that social support [...] Read more.
Social media has been a powerful source of social support for health consumers. In the healthcare sector, social media has thrived, building on various dynamic platforms supporting the connection between social relationships, health, and wellbeing. While prior research has shown that social support exerts a positive impact on health outcomes, there is scant literature examining the implications of social support for patient satisfaction, which suggests that there is a profound gap in the extant literature. The objective of this study is to develop and test a theoretical model for understanding the relationship between different dimensions of social support and patient empowerment. The study further investigates the debated relationship between patient empowerment and patient satisfaction. The measurement model indicated an acceptable fit (χ2 = 260.226; df, 107, χ2/df = 2.432, RMSEA = 0.07, GFI = 0.90, IFI = 0.95, TLI = 0.94, and CFI = 0.95). Findings indicate that emotional support (p < 0.001), information support (p < 0.05), and network support (p < 0.001) positively influence the notion of patient empowerment. In turn, patient empowerment positively influences patient satisfaction (p < 0.001). The proposed framework contributes to the health communication literature by introducing a novel framework for patient satisfaction in the social media context, which provides important inputs for healthcare service providers in developing patient empowerment strategies. Full article
(This article belongs to the Special Issue Feature Papers: Health Informatics)
Show Figures

Figure 1

Figure 1
<p>Research Model.</p>
Full article ">
14 pages, 1554 KiB  
Article
Identification of Bots and Cyborgs in the #FeesMustFall Campaign
by Yaseen Khan, Surendra Thakur, Obiseye Obiyemi and Emmanuel Adetiba
Informatics 2022, 9(1), 21; https://doi.org/10.3390/informatics9010021 - 4 Mar 2022
Cited by 3 | Viewed by 3228
Abstract
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of social robots in the #FeesMustFall movement by [...] Read more.
Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of social robots in the #FeesMustFall movement by conducting a scientific investigation into whether social bots were present in the form of Twitter bots and cyborgs. A total of 576,823 tweets posted between 15 October 2015 and 10 April 2017 were cleaned, with 490,449 tweets analyzed for 90,783 unique persons. Three separate approaches were used to screen out suspicious bot and cyborg activity, supplemented by the DeBot team’s methodology. User 1 and User 2, two of the 90,783 individuals, were recognized as bots or cyborgs in the study and contributed 22,413 (4.57 percent) of the 490,449 tweets. This confirms the existence of bots throughout the campaign, which aided in the #FeesMustFall’s amplification on Twitter, complicating sentiment analysis and invariably making it the most popular and lengthiest hashtag campaign in Africa, particularly at the time of data collection. Full article
(This article belongs to the Section Human-Computer Interaction)
Show Figures

Figure 1

Figure 1
<p>The data-driven detection process for the social bots.</p>
Full article ">Figure 2
<p>Monthly tweets between October 2015 and September 2016: (<b>a</b>) lognormal distribution curve and (<b>b</b>) lognormal P-P plot.</p>
Full article ">Figure 3
<p>Total tweet distribution according to days of the week.</p>
Full article ">Figure 4
<p>The top ten Twitter users with the highest number of twitter posts, as well as the number of hashtags, URLs, and retweets.</p>
Full article ">Figure 5
<p>User 1’s frequency, with total tweets per minute over a one-hour period.</p>
Full article ">Figure 6
<p>Volume of User 2’s Twitter posts in a ten-second period.</p>
Full article ">
14 pages, 1091 KiB  
Article
Adoption of Large-Scale Scrum Practices through the Use of Management 3.0
by Fernando Almeida and Eduardo Espinheira
Informatics 2022, 9(1), 20; https://doi.org/10.3390/informatics9010020 - 4 Mar 2022
Cited by 13 | Viewed by 5674
Abstract
Software engineering companies have progressively incorporated agile project management methodologies. Initially, this migration occurred mostly in the context of startups, but in recent years it has also sparked interest from other companies with larger and more geographically dispersed teams. One of the frameworks [...] Read more.
Software engineering companies have progressively incorporated agile project management methodologies. Initially, this migration occurred mostly in the context of startups, but in recent years it has also sparked interest from other companies with larger and more geographically dispersed teams. One of the frameworks used for large-scale agile implementation is the LeSS framework. This study seeks to explore how Management 3.0 principles can be applied in the context of the ten practices proposed in the LeSS framework. To this end, a qualitative research methodology based on four case studies is used to identify and explore the role of Management 3.0 in software management and development processes that adopt this agile paradigm. The findings show that the principles of Management 3.0 are relevant to the implementation of the LeSS framework practices, especially in fostering team values and personal values; however, distinct principles between the two paradigms are also identified, namely the greater rigidity of processes advocated in the LeSS framework and a greater focus on process automation. Full article
Show Figures

Figure 1

Figure 1
<p>Cloud of themes associated with Management 3.0.</p>
Full article ">Figure 2
<p>Adoption of the thematic analysis methodological process.</p>
Full article ">
17 pages, 306 KiB  
Article
The Future of Accounting: How Will Digital Transformation Impact the Sector?
by Maria José Angélico Gonçalves, Amélia Cristina Ferreira da Silva and Carina Gonçalves Ferreira
Informatics 2022, 9(1), 19; https://doi.org/10.3390/informatics9010019 - 27 Feb 2022
Cited by 51 | Viewed by 40547
Abstract
The growing dissemination of digital technologies has had an incomparable impact on many dimensions of today’s civilisation. Digital transformation (DT) redefined the industrial structures and reinvented business models. Hence, in the face of Industry 4.0, financial and accounting services face new threats, challenges, [...] Read more.
The growing dissemination of digital technologies has had an incomparable impact on many dimensions of today’s civilisation. Digital transformation (DT) redefined the industrial structures and reinvented business models. Hence, in the face of Industry 4.0, financial and accounting services face new threats, challenges, and opportunities. How do the business players in the accounting sector perceive this phenomenon? This paper aims to answer this question by following a qualitative and exploratory approach, applied to three case studies, using semi-structured interviews. The study shows that although digital transformation in Portuguese small and medium-sized accounting service enterprises is just starting, Industry 4.0 technologies, optical character recognition (OCR), artificial intelligence (AI), robotics and enterprise resource planning (ERP) in the cloud were the technologies singled out by respondents. Resistance to change, organisational culture and price seem to be the main barriers to DT in accounting. This paper contributes to a better understanding of the role of accounting and accountants in organisations and society in the context of the digital era. Moreover, it provides practical insights into the potential relationship between technological (specifically digital) development and labour market dynamics for accounting professionals. Full article
(This article belongs to the Special Issue Digitalisation, Green Deal and Sustainability)
25 pages, 2810 KiB  
Article
Automatic Ethnicity Classification from Middle Part of the Face Using Convolutional Neural Networks
by David Belcar, Petra Grd and Igor Tomičić
Informatics 2022, 9(1), 18; https://doi.org/10.3390/informatics9010018 - 25 Feb 2022
Cited by 14 | Viewed by 5132
Abstract
In the field of face biometrics, finding the identity of a person in an image is most researched, but there are other, soft biometric information that are equally as important, such as age, gender, ethnicity or emotion. Nowadays, ethnicity classification has a wide [...] Read more.
In the field of face biometrics, finding the identity of a person in an image is most researched, but there are other, soft biometric information that are equally as important, such as age, gender, ethnicity or emotion. Nowadays, ethnicity classification has a wide application area and is a prolific area of research. This paper gives an overview of recent advances in ethnicity classification with focus on convolutional neural networks (CNNs) and proposes a new ethnicity classification method using only the middle part of the face and CNN. The paper also compares the differences in results of CNN with and without plotted landmarks. The proposed model was tested using holdout testing method on UTKFace dataset and FairFace dataset. The accuracy of the model was 80.34% for classification into five classes and 61.74% for classification into seven classes, which is slightly better than state-of-the-art, but it is also important to note that results in this paper are obtained by using only the middle part of the face which reduces the time and resources necessary. Full article
(This article belongs to the Section Machine Learning)
Show Figures

Figure 1

Figure 1
<p>Architecture of the ethnicity classification approach. Purple dotted lines mark the steps which are omitted in the approach without plotted landmarks.</p>
Full article ">Figure 2
<p>Preprocessing block diagram.</p>
Full article ">Figure 3
<p>Architecture of the final CNN network used for ethnicity classification.</p>
Full article ">Figure 4
<p>Ratio of represented ethnicities in datasets [<a href="#B39-informatics-09-00018" class="html-bibr">39</a>].</p>
Full article ">Figure 5
<p>Representation of ethnicities in UTKFace (<b>left</b>) and UTKFace filtered (<b>right</b>).</p>
Full article ">Figure 6
<p>Representation of ethnicities in FairFace (<b>left</b>) and FairFace filtered (<b>right</b>).</p>
Full article ">Figure 7
<p>CNN Model_F1 training results on UTKFace filtered dataset without plotted landmarks.</p>
Full article ">Figure 8
<p>CNN Model_F2 training results on FairFace filtered dataset without plotted landmarks.</p>
Full article ">Figure 9
<p>CNN Model_F3 training results on UTKFace filtered dataset with plotted landmarks.</p>
Full article ">Figure 10
<p>CNN Model_F4 training results on FairFace filtered dataset with plotted landmarks.</p>
Full article ">
28 pages, 3344 KiB  
Article
Visual Analytics for Predicting Disease Outcomes Using Laboratory Test Results
by Neda Rostamzadeh, Sheikh S. Abdullah, Kamran Sedig, Amit X. Garg and Eric McArthur
Informatics 2022, 9(1), 17; https://doi.org/10.3390/informatics9010017 - 25 Feb 2022
Viewed by 3731
Abstract
Laboratory tests play an essential role in the early and accurate diagnosis of diseases. In this paper, we propose SUNRISE, a visual analytics system that allows the user to interactively explore the relationships between laboratory test results and a disease outcome. SUNRISE integrates [...] Read more.
Laboratory tests play an essential role in the early and accurate diagnosis of diseases. In this paper, we propose SUNRISE, a visual analytics system that allows the user to interactively explore the relationships between laboratory test results and a disease outcome. SUNRISE integrates frequent itemset mining (i.e., Eclat algorithm) with extreme gradient boosting (XGBoost) to develop more specialized and accurate prediction models. It also includes interactive visualizations to allow the user to interact with the model and track the decision process. SUNRISE helps the user probe the prediction model by generating input examples and observing how the model responds. Furthermore, it improves the user’s confidence in the generated predictions and provides them the means to validate the model’s response by illustrating the underlying working mechanism of the prediction models through visualization representations. SUNRISE offers a balanced distribution of processing load through the seamless integration of analytical methods with interactive visual representations to support the user’s cognitive tasks. We demonstrate the usefulness of SUNRISE through a usage scenario of exploring the association between laboratory test results and acute kidney injury, using large provincial healthcare databases from Ontario, Canada. Full article
(This article belongs to the Special Issue Feature Papers: Health Informatics)
Show Figures

Figure 1

Figure 1
<p>The workflow diagram of SUNRISE.</p>
Full article ">Figure 2
<p>SUNRISE includes four main sub-visualizations: Selection Panel (<b>A</b>), Control Panel (<b>B</b>), Probability meter (<b>C</b>), and Decision Path Panel (<b>D</b>).</p>
Full article ">Figure 3
<p>Shows how the probability meter and the decision path panel, updated upon submission, with the user input of SCr value of 70 umol/L, SK of 4 mmol/L, and SCl of 102 mmol/L.</p>
Full article ">Figure 4
<p>Shows how the decision path panel can help the user to ensure the reliability of the results.</p>
Full article ">Figure 5
<p>Shows how the system gets updated when the user increases the value of SCr from 70 to 140 (umol/L).</p>
Full article ">Figure 6
<p>Shows how the system gets updated when the user removes SCr from the control panel and increases the value of SK to 6 (mmol/L).</p>
Full article ">Figure 7
<p>Shows the association between serum potassium, serum sodium, and AKI.</p>
Full article ">Figure 8
<p>(<b>A</b>) Shows how a low serum bicarbonate level is associated with the development of AKI while (<b>B</b>) demonstrates how a normal serum bicarbonate value is less likely to progress to AKI.</p>
Full article ">Figure 9
<p>(<b>A</b>,<b>B</b>) Demonstrate the incidence of AKI is higher for patients with high and low values of serum chloride respectively while (<b>C</b>) shows patients with normal chloride values are less likely to progress to AKI.</p>
Full article ">Figure 10
<p>(<b>A</b>) Shows how a low hemoglobin level is associated with the development of AKI while (<b>B</b>) demonstrates how a normal hemoglobin value is less likely to progress to AKI.</p>
Full article ">
21 pages, 2229 KiB  
Article
BYOD Security: A Study of Human Dimensions
by Kathleen Downer and Maumita Bhattacharya
Informatics 2022, 9(1), 16; https://doi.org/10.3390/informatics9010016 - 23 Feb 2022
Cited by 8 | Viewed by 8138
Abstract
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace [...] Read more.
The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses which can help guide the development of future BYOD security frameworks. Three research questions are answered by this study: What levels of awareness do Australian businesses have for BYOD security aspects? How are employees currently responding to the security mechanisms applied by their organisations for mobile devices? What are the potential weaknesses in businesses’ IT networks that have a direct effect on BYOD security? Overall, the aim of this research is to illuminate the findings of these research objectives so that they can be used as a basis for building new and strengthening existing BYOD security frameworks in order to enhance their effectiveness against an ever-growing list of attacks and threats targeting mobile devices in a virtually driven work force. Full article
(This article belongs to the Section Social Informatics and Digital Humanities)
Show Figures

Figure 1

Figure 1
<p>Active BYOD security mechanisms in Australian organisations.</p>
Full article ">Figure 2
<p>Organisational support for BYOD security compared to emphasis towards reducing attacks and threats in IT networks.</p>
Full article ">Figure 3
<p>Data access from cloud storage and other online sharing services.</p>
Full article ">Figure 4
<p>Network policies enforced by Businesses for BYOD security.</p>
Full article ">Figure 5
<p>Applications regularly accessed via mobile devices for work purposes.</p>
Full article ">Figure 6
<p>Employee suggestions for improving BYOD security at work.</p>
Full article ">
15 pages, 2268 KiB  
Article
Raising Awareness of Smartphone Overuse among University Students: A Persuasive Systems Approach
by Carlos Abreu and Pedro F. Campos
Informatics 2022, 9(1), 15; https://doi.org/10.3390/informatics9010015 - 23 Feb 2022
Cited by 5 | Viewed by 5819
Abstract
Smartphone overuse can lead to a series of physical, mental and social disturbances. This problem is more prevalent among young adults as compared to other demographic groups. Additionally, university students are already undergoing high cognitive loads and stress conditions; therefore, they are more [...] Read more.
Smartphone overuse can lead to a series of physical, mental and social disturbances. This problem is more prevalent among young adults as compared to other demographic groups. Additionally, university students are already undergoing high cognitive loads and stress conditions; therefore, they are more susceptible to smartphone addiction and its derived problems. In this paper, we present a novel approach where a conversational mobile agent uses persuasive messages exploring the reflective mind to raise users’ awareness of their usage and consequently induce reduction behaviors. We conducted a four-week study with 16 university students undergoing stressful conditions—a global lockdown during their semester—and evaluated the impact of the agent on smartphone usage reduction and the perceived usefulness of such an approach. Results show the efficacy of self-tracking in the behavior change process: 81% of the users reduced their usage time, and all of them mentioned that having a conversational agent alerting them about their usage was useful. Before this experiment, only 68% of them considered such an approach could be useful. In conclusion, users deemed it essential to have an engaging conversational agent on their smartphones, in terms of helping them become more aware of usage times. Full article
(This article belongs to the Special Issue Feature Papers in Human-Computer Interaction)
Show Figures

Figure 1

Figure 1
<p>Step-by-step operation of the proposed application, which uses a conversational agent to mitigate the smartphone overuse problem.</p>
Full article ">Figure 2
<p>A floating widget that shows the user (<b>a</b>) the total time on screen (less than 50% of the defined goal), (<b>b</b>) the total time on screen (more than 50% of the defined goal) and with a pending message from the conversational agent, and (<b>c</b>) the prototype with answerable messages, triggered by the chatbot.</p>
Full article ">Figure 3
<p>Floating widget’s colors when the user surpasses 50% (dark yellow), 75% (orange) and 100% (red-maroon) of the defined maximum total usage time, respectively. Before achieving 50% of the defined usage time, the widget is predefined to appear as green. For this example, a two-hour goal by the user was considered.</p>
Full article ">Figure 4
<p>The developed app’s system architecture.</p>
Full article ">Figure 5
<p>Average usage data, for each user, filtered by day. It is possible to observe that the linear trendline decreases, which indicates a reduction of smartphone use over the time. Filled blue areas as standard deviation.</p>
Full article ">Figure 6
<p>Average usage data, for each user, filtered by day, compared with their perception after filling the pre-questionnaire.</p>
Full article ">Figure 7
<p>Average usage data, for each user, filtered by day, compared with perception after filling the post-questionnaire.</p>
Full article ">
18 pages, 378 KiB  
Review
Human-Computer Interaction in Digital Mental Health
by Luke Balcombe and Diego De Leo
Informatics 2022, 9(1), 14; https://doi.org/10.3390/informatics9010014 - 22 Feb 2022
Cited by 35 | Viewed by 32786
Abstract
Human-computer interaction (HCI) has contributed to the design and development of some efficient, user-friendly, cost-effective, and adaptable digital mental health solutions. But HCI has not been well-combined into technological developments resulting in quality and safety concerns. Digital platforms and artificial intelligence (AI) have [...] Read more.
Human-computer interaction (HCI) has contributed to the design and development of some efficient, user-friendly, cost-effective, and adaptable digital mental health solutions. But HCI has not been well-combined into technological developments resulting in quality and safety concerns. Digital platforms and artificial intelligence (AI) have a good potential to improve prediction, identification, coordination, and treatment by mental health care and suicide prevention services. AI is driving web-based and smartphone apps; mostly it is used for self-help and guided cognitive behavioral therapy (CBT) for anxiety and depression. Interactive AI may help real-time screening and treatment in outdated, strained or lacking mental healthcare systems. The barriers for using AI in mental healthcare include accessibility, efficacy, reliability, usability, safety, security, ethics, suitable education and training, and socio-cultural adaptability. Apps, real-time machine learning algorithms, immersive technologies, and digital phenotyping are notable prospects. Generally, there is a need for faster and better human factors in combination with machine interaction and automation, higher levels of effectiveness evaluation and the application of blended, hybrid or stepped care in an adjunct approach. HCI modeling may assist in the design and development of usable applications, and to effectively recognize, acknowledge, and address the inequities of mental health care and suicide prevention and assist in the digital therapeutic alliance. Full article
(This article belongs to the Special Issue Feature Papers in Human-Computer Interaction)
32 pages, 1930 KiB  
Systematic Review
Systematic Review of Multimodal Human–Computer Interaction
by Jose Daniel Azofeifa, Julieta Noguez, Sergio Ruiz, José Martín Molina-Espinosa, Alejandra J. Magana and Bedrich Benes
Informatics 2022, 9(1), 13; https://doi.org/10.3390/informatics9010013 - 15 Feb 2022
Cited by 20 | Viewed by 13591
Abstract
This document presents a systematic review of Multimodal Human–Computer Interaction. It shows how different types of interaction technologies (virtual reality (VR) and augmented reality, force and vibration feedback devices (haptics), and tracking) are used in different domains (concepts, medicine, physics, human factors/user experience [...] Read more.
This document presents a systematic review of Multimodal Human–Computer Interaction. It shows how different types of interaction technologies (virtual reality (VR) and augmented reality, force and vibration feedback devices (haptics), and tracking) are used in different domains (concepts, medicine, physics, human factors/user experience design, transportation, cultural heritage, and industry). A systematic literature search was conducted identifying 406 articles initially. From these articles, we selected 112 research works that we consider most relevant for the content of this article. The articles were analyzed in-depth from the viewpoint of temporal patterns, frequency of usage in types of technology in different domains, and cluster analysis. The analysis allowed us to answer relevant questions in searching for the next steps in work related to multimodal HCI. We looked at the typical technology type, how the technology type and frequency have changed in time over each domain, and how papers are grouped across metrics given their similarities. This analysis determined that VR and haptics are the most widely used in all domains. While VR is the most used, haptic interaction is presented in an increasing number of applications, suggesting future work on applications that configure VR and haptic together. Full article
(This article belongs to the Section Human-Computer Interaction)
Show Figures

Figure 1

Figure 1
<p>Paper selection steps.</p>
Full article ">Figure 2
<p>Temporal analysis charts. (<b>a</b>) Number of papers of domain per year. (<b>b</b>) Number of papers of different technologies per year.</p>
Full article ">Figure 3
<p>Frequency of types of interaction per specific domain.</p>
Full article ">Figure 4
<p>Elbow method applied.</p>
Full article ">Figure 5
<p>T-distributed Stochastic Neighbor Embedding (t-SNE) has been used for visualization of the relationship among papers. The image shows three cluster identified by dendrogram and the distribution of papers from each domain.</p>
Full article ">Figure 6
<p>Dendrogram of the cluster subdivision.</p>
Full article ">
21 pages, 979 KiB  
Article
E-MDAV: A Framework for Developing Data-Intensive Web Applications
by Paolo Bocciarelli, Andrea D’Ambrogio, Tommaso Panetti and Andrea Giglio
Informatics 2022, 9(1), 12; https://doi.org/10.3390/informatics9010012 - 12 Feb 2022
Cited by 3 | Viewed by 3120
Abstract
The ever-increasing adoption of innovative technologies, such as big data and cloud computing, provides significant opportunities for organizations operating in the IT domain, but also introduces considerable challenges. Such innovations call for development processes that better align with stakeholders needs and expectations. In [...] Read more.
The ever-increasing adoption of innovative technologies, such as big data and cloud computing, provides significant opportunities for organizations operating in the IT domain, but also introduces considerable challenges. Such innovations call for development processes that better align with stakeholders needs and expectations. In this respect, this paper introduces a development framework based on the OMG’s Model Driven Architecture (MDA) that aims to support the development lifecycle of data-intensive web applications. The proposed framework, named E-MDAV (Extended MDA-VIEW), defines a methodology that exploits a chain of model transformations to effectively cope with both forward- and reverse-engineering aspects. In addition, E-MDAV includes the specification of a reference architecture for driving the implementation of a tool that supports the various professional roles involved in the development and maintenance of data-intensive web applications. In order to evaluate the effectiveness of the proposed E-MDAV framework, a tool prototype has been developed. E-MDAV has then been applied to two different application scenarios and the obtained results have been compared with historical data related to the implementation of similar development projects, in order to measure and discuss the benefits of the proposed approach. Full article
Show Figures

Figure 1

Figure 1
<p>Dumb-code vs. smart-code generation [<a href="#B13-informatics-09-00012" class="html-bibr">13</a>].</p>
Full article ">Figure 2
<p>Overview of MDA standards.</p>
Full article ">Figure 3
<p>DevOps with Continuous Integration, Continuous Deployment and Pipeline.</p>
Full article ">Figure 4
<p>Data and computational complexity in Software Development.</p>
Full article ">Figure 5
<p>MDA-VIEW Development Process.</p>
Full article ">Figure 6
<p>E-MDAV Development Process.</p>
Full article ">Figure 7
<p>Development of a web application.</p>
Full article ">Figure 8
<p>Change Request of an existing web application.</p>
Full article ">Figure 9
<p>E-MDAV Tool Abstract Architecture.</p>
Full article ">Figure 10
<p>Architecture of the generated web application.</p>
Full article ">Figure 11
<p>E-MDAV in a DevOps CI pipeline.</p>
Full article ">Figure 12
<p>Effort distribution for different roles (E-MDAV case).</p>
Full article ">Figure 13
<p>Effort distribution for different roles (Traditional MVC approach).</p>
Full article ">Figure 14
<p>MVC and E-MDAV project effort comparison.</p>
Full article ">
12 pages, 1935 KiB  
Article
Modelling Service Quality of Internet Service Providers during COVID-19: The Customer Perspective Based on Twitter Dataset
by Bagus Setya Rintyarna, Heri Kuswanto, Riyanarto Sarno, Emy Kholifah Rachmaningsih, Fika Hastarita Rachman, Wiwik Suharso and Triawan Adi Cahyanto
Informatics 2022, 9(1), 11; https://doi.org/10.3390/informatics9010011 - 29 Jan 2022
Cited by 3 | Viewed by 5186
Abstract
Internet service providers (ISPs) conduct their business by providing Internet access features to their customers. The COVID-19 pandemic has shifted most activity being performed remotely using an Internet connection. As a result, the demand for Internet services increased by 50%. This significant rise [...] Read more.
Internet service providers (ISPs) conduct their business by providing Internet access features to their customers. The COVID-19 pandemic has shifted most activity being performed remotely using an Internet connection. As a result, the demand for Internet services increased by 50%. This significant rise in the appeal of Internet services needs to be overtaken by a notable increase in the service quality provided by ISPs. Service quality plays a great role for enterprises, including ISPs, in retaining consumer loyalty. Thus, modelling ISPs’ service quality is of great importance. Since a common technique to reveal service quality is a timely and costly pencil survey-based method, this work proposes a framework based on the Sentiment Analysis (SA) of the Twitter dataset to model service quality. The SA involves the majority voting of three machine learning algorithms namely Naïve Bayes, Multinomial Naïve Bayes and Bernoulli Naïve Bayes. Making use of Thaicon’s service quality metrics, this work proposes a formula to generate a rating of service quality accordingly. For the case studies, we examined two ISPs in Indonesia, i.e., By.U and MPWR. The framework successfully extracted the service quality rate of both ISPs, revealing that By.U is better in terms of service quality, as indicated by a service quality rate of 0.71. Meanwhile, MPWR outperforms By.U in terms of customer service. Full article
Show Figures

Figure 1

Figure 1
<p>The framework of the service quality calculation.</p>
Full article ">Figure 2
<p>Determining SO using the majority voting of ML algorithms.</p>
Full article ">Figure 3
<p>Performance of NB vs. MV.</p>
Full article ">Figure 4
<p>Performance of MNB vs. MV.</p>
Full article ">Figure 5
<p>Performance of BNB vs. MV.</p>
Full article ">Figure 6
<p>Initial keywords extension.</p>
Full article ">Figure 7
<p>Comparison of service quality rate between By.U and MPWR.</p>
Full article ">
24 pages, 23419 KiB  
Article
Using the Unity Game Engine to Develop a 3D Simulated Ecological System Based on a Predator–Prey Model Extended by Gene Evolution
by Attila Kiss and Gábor Pusztai
Informatics 2022, 9(1), 9; https://doi.org/10.3390/informatics9010009 - 26 Jan 2022
Viewed by 7189
Abstract
In this paper, we present a novel implementation of an ecosystem simulation. In our previous work, we implemented a 3D environment based on a predator–prey model, but we found that in most cases, regardless of the choice of starting parameters, the simulation quickly [...] Read more.
In this paper, we present a novel implementation of an ecosystem simulation. In our previous work, we implemented a 3D environment based on a predator–prey model, but we found that in most cases, regardless of the choice of starting parameters, the simulation quickly led to extinctions. We wanted to achieve system stabilization, long-term operation, and better simulation of reality by incorporating genetic evolution. Therefore we applied the predator–prey model with an evolutional approach. Using the Unity game engine we created and managed a closed 3D ecosystem environment defined by an artificial or real uploaded map. We present some demonstrative runs while gathering data, observing interesting events (such as extinction, sustainability, and behavior of swarms), and analyzing possible effects on the initial parameters of the system. We found that incorporating genetic evolution into the simulation slightly stabilized the system, thus reducing the likelihood of extinction of different types of objects. The simulation of ecosystems and the analysis of the data generated during the simulations can also be a starting point for further research, especially in relation to sustainability. Our system is publicly available, so anyone can customize and upload their own parameters, maps, objects, and biological species, as well as inheritance and behavioral habits, so they can test their own hypotheses from the data generated during its operation. The goal of this article was not to create and validate a model but to create an IT tool for evolutionary researchers who want to test their own models and to present them, for example, as animated conference presentations. The use of 3D simulation is primarily useful for educational purposes, such as to engage students and to increase their interest in biology. Students can learn in a playful way while observing in the graphical scenery how the ecosystem behaves, how natural selection helps the adaptability and survival of species, and what effects overpopulation and competition can have. Full article
Show Figures

Figure 1

Figure 1
<p>The framework is divided into four main components with multiple controllers which control the different parts of the program.</p>
Full article ">Figure 2
<p>One of the sample environments to run the simulations on a medium-sized isolated island with a high land ratio, but plenty of water sources.</p>
Full article ">Figure 3
<p>A sample food-chain relation with different types of species which was used in our previous article. The living entities are organized into chain-levels.</p>
Full article ">Figure 4
<p>A simplified representation of the animal’s logic. The top (Start) and bottom (End) ellipses represent the boundaries of the algorithm logic. Rectangles represent the different processes, and diamond shapes represent the requirements of the different phase processes.</p>
Full article ">Figure 5
<p>Constant exploration is necessary to fulfill the daily requirements, such as thirst and hunger.</p>
Full article ">Figure 6
<p>The circle of life in a predator–prey habitat with usual and everyday metabolism process (eating and drinking) alongside with extreme hunting and fleeing scenarios.</p>
Full article ">Figure 7
<p>According to the aging mechanics, animals change over time. The animal’s attributes can be changed in each age stage. We provided a sample setup, where “Newborn” and “Elder” animals have the worst attributes, and “Juvenile” and “Aged” stages also change the sexually active status.</p>
Full article ">Figure 8
<p>A simplified representation of the animal’s mating system. The Start and End ellipses represent the boundaries of the algorithm logic. Rectangles represent the different processes, and diamond shapes represent the requirements and decision-making.</p>
Full article ">Figure 9
<p>The most important event in any organism’s life is the reproduction biological (mating) process for population preservation, in which an organism gives life to young ones (offspring) similar to itself. (<b>a</b>) All species rely on the selection and attraction of a compatible partner to survive. (<b>b</b>) Reproduction ensures the species’ survival from generation to generation.</p>
Full article ">Figure 10
<p>The animals can establish packs with other members of their own species. For each race, multiple packs can be formed during the simulation.</p>
Full article ">Figure 11
<p>Animals with a higher <b>speed</b> can outrun any dangerous situations.</p>
Full article ">Figure 12
<p>With a better <b>metabolism</b> animals burn energy slower and consume less food from the environment.</p>
Full article ">Figure 13
<p>Animals with a faster reproduction rate create much more offspring than a usually bigger animal with longer <b>pregnancy</b> duration.</p>
Full article ">Figure 14
<p>The picture illustrates a simple dominant–recessive inheritance pattern with one of the default animal models in the simulation.</p>
Full article ">Figure 15
<p>Population fluctuation during the simulation with the new system.</p>
Full article ">Figure 16
<p>The diagram shows the cause of deaths for the Chicken population with the new system.</p>
Full article ">Figure 17
<p>Population fluctuation during the simulation without evolution.</p>
Full article ">Figure 18
<p>The diagram shows the cause of deaths for the Chicken population without evolution.</p>
Full article ">Figure 19
<p>The diagram shows the cause of deaths for the Dog population with the new system.</p>
Full article ">Figure 20
<p>The diagram shows the cause of deaths for the Dog population without evolution.</p>
Full article ">Figure 21
<p>The diagram shows the cause of deaths for the Lion population with the new system.</p>
Full article ">Figure 22
<p>The diagram shows the cause of deaths for the Lion population without evolution.</p>
Full article ">Figure 23
<p>The diagram shows the average mutation values during 23 Chicken generations. Because the mutation values are randomly generated within the specified range, they are evenly dispersed as positive and negative mutation effects for every individual, but every generation has a different ratio of mutations.</p>
Full article ">Figure 24
<p>The diagram shows the gene types used in the generations. Because of the natural selection effect, all gene types are constantly upgrading in the rate of their mutation range (reproduction had the biggest range).</p>
Full article ">Figure 25
<p>The diagram shows a comparison between the new and the old generations. On the vertical axis the parent’s best values were subtracted from the children values. Except for two cases, the new generations had better attributes than their parents.</p>
Full article ">
11 pages, 1651 KiB  
Article
Predictive Model for ICU Readmission Based on Discharge Summaries Using Machine Learning and Natural Language Processing
by Negar Orangi-Fard, Alireza Akhbardeh and Hersh Sagreiya
Informatics 2022, 9(1), 10; https://doi.org/10.3390/informatics9010010 - 26 Jan 2022
Cited by 6 | Viewed by 5056
Abstract
Predicting ICU readmission risk will help physicians make decisions regarding discharge. We used discharge summaries to predict ICU 30-day readmission risk using text mining and machine learning (ML) with data from the Medical Information Mart for Intensive Care III (MIMIC-III). We used Natural [...] Read more.
Predicting ICU readmission risk will help physicians make decisions regarding discharge. We used discharge summaries to predict ICU 30-day readmission risk using text mining and machine learning (ML) with data from the Medical Information Mart for Intensive Care III (MIMIC-III). We used Natural Language Processing (NLP) and the Bag-of-Words approach on discharge summaries to build a Document-Term-Matrix with 3000 features. We compared the performance of support vector machines with the radial basis function kernel (SVM-RBF), adaptive boosting (AdaBoost), quadratic discriminant analysis (QDA), least absolute shrinkage and selection operator (LASSO), and Ridge Regression. A total of 4000 patients were used for model training and 6000 were used for validation. Using the bag-of-words determined by NLP, the area under the receiver operating characteristic (AUROC) curve was 0.71, 0.68, 0.65, 0.69, and 0.65 correspondingly for SVM-RBF, AdaBoost, QDA, LASSO, and Ridge Regression. We then used the SVM-RBF model for feature selection by incrementally adding features to the model from 1 to 3000 bag-of-words. Through this exhaustive search approach, only 825 features (words) were dominant. Using those selected features, we trained and validated all ML models. The AUROC curve was 0.74, 0.69, 0.67, 0.70, and 0.71 respectively for SVM-RBF, AdaBoost, QDA, LASSO, and Ridge Regression. Overall, this technique could predict ICU readmission relatively well. Full article
(This article belongs to the Section Medical and Clinical Informatics)
Show Figures

Figure 1

Figure 1
<p>The pipeline for data preprocessing.</p>
Full article ">Figure 2
<p>Preprocessing notes using NLP techniques for machine learning models.</p>
Full article ">Figure 3
<p>Word cloud for the discharge summary notes for all patients.</p>
Full article ">Figure 4
<p>Histogram for days between admission and readmission. The histogram bin size was 30 days.</p>
Full article ">Figure 5
<p>Receiver operating characteristic (ROC) curves compare the performance of each machine learning algorithm to predict readmission either (<b>A</b>) using all 3000 features or (<b>B</b>) using only features determined by ML (825 features). Support vector machines had the highest performance of all machine-learning algorithms.</p>
Full article ">Figure 5 Cont.
<p>Receiver operating characteristic (ROC) curves compare the performance of each machine learning algorithm to predict readmission either (<b>A</b>) using all 3000 features or (<b>B</b>) using only features determined by ML (825 features). Support vector machines had the highest performance of all machine-learning algorithms.</p>
Full article ">
17 pages, 4802 KiB  
Article
What Features of Ligands Are Relevant to the Opening of Cryptic Pockets in Drug Targets?
by Zhonghua Xia, Pavel Karpov, Grzegorz Popowicz, Michael Sattler and Igor V. Tetko
Informatics 2022, 9(1), 8; https://doi.org/10.3390/informatics9010008 - 25 Jan 2022
Cited by 2 | Viewed by 3656
Abstract
Small-molecule drug design aims to identify inhibitors that can specifically bind to a functionally important region on the target, i.e., an active site of an enzyme. Identification of potential binding pockets is typically based on static three-dimensional structures. However, small molecules may induce [...] Read more.
Small-molecule drug design aims to identify inhibitors that can specifically bind to a functionally important region on the target, i.e., an active site of an enzyme. Identification of potential binding pockets is typically based on static three-dimensional structures. However, small molecules may induce and select a dynamic binding pocket that is not visible in the apo protein, which presents a well-recognized challenge for structure-based drug discovery. Here, we assessed whether it is possible to identify features in molecules, which we refer to as inducers, that can induce the opening of cryptic pockets. The volume change between apo and bound protein conformations was used as a metric to differentiate chemical features in inducers vs. non-inducers. Based on the dataset of holo–apo pairs, classification models were built to determine an optimum threshold. The model analysis suggested that inducers preferred to be more hydrophobic and aromatic. The impact of sulfur was ambiguous, while phosphorus and halogen atoms were overrepresented in inducers. The fragment analysis showed that small changes in the structures of molecules can strongly affect the potential to induce a cryptic pocket. This analysis and developed model can be used to design inducers that can potentially open cryptic pockets for undruggable proteins. Full article
Show Figures

Figure 1

Figure 1
<p>The structure of imatinib is given as an example of an inducer (<span class="html-italic">left</span>). Two crystal structures of Abelson (Abl) tyrosine kinase bound with small-molecule ligands were aligned (PDB ID: 1iep, imatinib, <span class="html-italic">green</span>; PDB ID: 2v7a, PHA-739358, <span class="html-italic">red</span>). In the binding site, the major structural displacement was present in the rotation of the activation loop (residues 381–402 in Abl kinase). Imatinib (<span class="html-italic">green</span>) binds to the preformed pocket and the adjacent subpocket, which is caused by the rotation of the loop.</p>
Full article ">Figure 2
<p>The distribution of two classes of ligands in the PDBbind set (based on optimal threshold = 60 Å<sup>3</sup>). When the threshold was 0 Å<sup>3</sup>, the number of pairs that had <span class="html-italic">V<sub>holo</sub> − V<sub>apo</sub></span> &gt; 0 Å<sup>3</sup> was more than twice those that had a negative change in the volume. This is inconsistent with the common knowledge that the minority of ligands have the ability to induce the opening of the pocket. The optimum threshold, which was determined in this work based on classification model performance, provided a more intuitive separation of both classes of ligands.</p>
Full article ">Figure 3
<p>Similar structures that are identified as inducers and non-inducers in the PDBbind set. Red: inducer; blue: non-inducer. Δ<span class="html-italic">V</span> represents the volume difference between the apo and holo pockets. The unit of △<span class="html-italic">V</span> is Å<sup>3</sup>.</p>
Full article ">Figure 4
<p>MD simulations and structural features of Mdmx inhibitors. WK23 (non-inducer) and WK298 (inducer) are known Mdmx inhibitors, while the others are computationally predicted structures. The open conformation of Mdmx corresponds to Tyr99 χ<sub>1</sub> of around 180°, while the closed one has χ<sub>1</sub> of around 300°. Dynamic changes in χ<sub>1</sub> in Mdmx complexes with the analyzed ligands show differences in binding properties of inducers (NC4 and WK298) as compared to the other analyzed ligands. NC4 and WK298 have more data points of χ<sub>1</sub> around 180°, i.e., more open states; the others have more data points of χ<sub>1</sub> around 300°, i.e., more closed states.</p>
Full article ">
3 pages, 311 KiB  
Editorial
Acknowledgment to Reviewers of Informatics in 2021
by Informatics Editorial Office
Informatics 2022, 9(1), 7; https://doi.org/10.3390/informatics9010007 - 24 Jan 2022
Viewed by 2032
Abstract
Rigorous peer-reviews are the basis of high-quality academic publishing [...] Full article
29 pages, 5718 KiB  
Article
Transferrable Framework Based on Knowledge Graphs for Generating Explainable Results in Domain-Specific, Intelligent Information Retrieval
by Hasan Abu-Rasheed, Christian Weber, Johannes Zenkert, Mareike Dornhöfer and Madjid Fathi
Informatics 2022, 9(1), 6; https://doi.org/10.3390/informatics9010006 - 19 Jan 2022
Cited by 4 | Viewed by 5097
Abstract
In modern industrial systems, collected textual data accumulates over time, offering an important source of information for enhancing present and future industrial practices. Although many AI-based solutions have been developed in the literature for a domain-specific information retrieval (IR) from this data, the [...] Read more.
In modern industrial systems, collected textual data accumulates over time, offering an important source of information for enhancing present and future industrial practices. Although many AI-based solutions have been developed in the literature for a domain-specific information retrieval (IR) from this data, the explainability of these systems was rarely investigated in such domain-specific environments. In addition to considering the domain requirements within an explainable intelligent IR, transferring the explainable IR algorithm to other domains remains an open-ended challenge. This is due to the high costs, which are associated with intensive customization and required knowledge modelling, when developing new explainable solutions for each industrial domain. In this article, we present a transferable framework for generating domain-specific explanations for intelligent IR systems. The aim of our work is to provide a comprehensive approach for constructing explainable IR and recommendation algorithms, which are capable of adopting to domain requirements and are usable in multiple domains at the same time. Our method utilizes knowledge graphs (KG) for modeling the domain knowledge. The KG provides a solid foundation for developing intelligent IR solutions. Utilizing the same KG, we develop graph-based components for generating textual and visual explanations of the retrieved information, taking into account the domain requirements and supporting the transferability to other domain-specific environments, through the structured approach. The use of the KG resulted in minimum-to-zero adjustments when creating explanations for multiple intelligent IR algorithms in multiple domains. We test our method within two different use cases, a semiconductor manufacturing centered use case and a job-to-applicant matching one. Our quantitative results show a high capability of our approach to generate high-level explanations for the end users. In addition, the developed explanation components were highly adaptable to both industrial domains without sacrificing the overall accuracy of the intelligent IR algorithm. Furthermore, a qualitative user-study was conducted. We recorded a high level of acceptance from the users, who reported an enhanced overall experience with the explainable IR system. Full article
(This article belongs to the Special Issue Feature Paper in Informatics)
Show Figures

Figure 1

Figure 1
<p>Proposed framework for transferrable, domain oriented, explainable IR, based on knowledge graphs. Domain-specific elements are shown in white, while domain-agnostic algorithms are shown in blue.</p>
Full article ">Figure 2
<p>Example of integrating expert defined rules and domain requirements in the creation of graph nodes and relations. In the proposed framework, expert knowledge is used for defining the nodes and relations of the graph. Domain requirements are here presented as a list, which is used by the relation extraction algorithm to define graph relations.</p>
Full article ">Figure 3
<p>Visual and textual explanations based on the knowledge graph. Results that are retrieved by the IR algorithm are extracted from the graph and shown visually as a sub-graph, which shows the interlinks between different results. Textual explanations are generated from the reasoning behind linking two or more nodes in the graph to each other.</p>
Full article ">Figure 4
<p>The construction of the multidimensional knowledge graph from chip-design documents. Four types of nodes are defined, along with their relations. Relations exist amongst nodes of the same type and among those of different types.</p>
Full article ">Figure 5
<p>Verbal explanation template used in the implementation of Use Case 1. The template is designed based on expert requirements for explaining the semantic search results.</p>
Full article ">Figure 6
<p>BLEU and Rouge-L scores for the search results. The figure represents the scores for the short search queries. The average BLEU score for the short search queries (on the horizontal axis) reached 37.2%, and the average Rouge-L score was 25.1%.</p>
Full article ">Figure 7
<p>BLEU and Rouge-L scores for the search results. The figure shows the scores of the long search queries. The average BLEU score for the long search queries (on the horizontal axis) reached 38.3%, and the average Rouge-L score was 27.4%.</p>
Full article ">Figure 8
<p>Direct relations between user profiles and relevant job postings. Each relation is defined based on the similarity score between the two nodes.</p>
Full article ">Figure 9
<p>The use of direct and transitive relations in the knowledge graph. Here, jobPosting 63 is recommended to the userProfile_15, since it is relevant to the directly connected jobPosting_45.</p>
Full article ">Figure 10
<p>A sample of the overall calculated similarity scores between user profiles and job postings. Similarities above a predefined threshold are used to create corresponding relations in the knowledge graph. Negative similarity scores are caused by the angle value between document vectors, which results in a negative cosine value of that angle when calculating the cosine similarity.</p>
Full article ">Figure 11
<p>Two templates are used to generate the textual explanations. The first template is designed for direct recommendations, where only the link between the user profile and the job posting is explained. The second template includes information about the intermediate link between the user profile and the job posting, within the transitive relation.</p>
Full article ">Figure 12
<p>BLEU and Rouge-L scores for a sample of recommended job postings to two user profiles.</p>
Full article ">
18 pages, 860 KiB  
Article
Optimization of Food Industry Production Using the Monte Carlo Simulation Method: A Case Study of a Meat Processing Plant
by Mikhail Koroteev, Ekaterina Romanova, Dmitriy Korovin, Vasiliy Shevtsov, Vadim Feklin, Petr Nikitin, Sergey Makrushin and Konstantin V. Bublikov
Informatics 2022, 9(1), 5; https://doi.org/10.3390/informatics9010005 - 18 Jan 2022
Cited by 7 | Viewed by 5824
Abstract
The problem evaluated in this study is related to the optimization of a budget of an industrial enterprise using simulation methods of the production process. Our goal is to offer a universal and straightforward methodology for simulating a production budget at any level [...] Read more.
The problem evaluated in this study is related to the optimization of a budget of an industrial enterprise using simulation methods of the production process. Our goal is to offer a universal and straightforward methodology for simulating a production budget at any level of complexity by presenting it in a specific form. The calculation of such production schemes, in most enterprises, is currently done manually, which significantly limits the possibilities for optimization. This article proposes a model based on the Monte Carlo method to automate the budgeting process. The application of this model is described using an example of a typical meat processing enterprise. Approbation of the model showed its high applicability and the ability to transform the process of making management decisions and the potential to increase the profits of the enterprise, which is unattainable using other methods. As a result of the study, we present a methodology for modeling industrial production that can significantly speed up the formation and optimization of an enterprise’s budget. In our demonstration case, the profit increased by over 30 percentage points. Full article
Show Figures

Figure 1

Figure 1
<p>Information system relational database schema (fragment).</p>
Full article ">Figure 2
<p>Profit distribution of simulation solutions.</p>
Full article ">
14 pages, 1747 KiB  
Article
Automated Intracranial Hematoma Classification in Traumatic Brain Injury (TBI) Patients Using Meta-Heuristic Optimization Techniques
by Vidhya V, U. Raghavendra, Anjan Gudigar, Praneet Kasula, Yashas Chakole, Ajay Hegde, Girish Menon R, Chui Ping Ooi, Edward J. Ciaccio and U. Rajendra Acharya
Informatics 2022, 9(1), 4; https://doi.org/10.3390/informatics9010004 - 10 Jan 2022
Cited by 4 | Viewed by 4101
Abstract
Traumatic Brain Injury (TBI) is a devastating and life-threatening medical condition that can result in long-term physical and mental disabilities and even death. Early and accurate detection of Intracranial Hemorrhage (ICH) in TBI is crucial for analysis and treatment, as the condition can [...] Read more.
Traumatic Brain Injury (TBI) is a devastating and life-threatening medical condition that can result in long-term physical and mental disabilities and even death. Early and accurate detection of Intracranial Hemorrhage (ICH) in TBI is crucial for analysis and treatment, as the condition can deteriorate significantly with time. Hence, a rapid, reliable, and cost-effective computer-aided approach that can initially capture the hematoma features is highly relevant for real-time clinical diagnostics. In this study, the Gray Level Occurrence Matrix (GLCM), the Gray Level Run Length Matrix (GLRLM), and Hu moments are used to generate the texture features. The best set of discriminating features are obtained using various meta-heuristic algorithms, and these optimal features are subjected to different classifiers. The synthetic samples are generated using ADASYN to compensate for the data imbalance. The proposed CAD system attained 95.74% accuracy, 96.93% sensitivity, and 94.67% specificity using statistical and GLRLM features along with KNN classifier. Thus, the developed automated system can enhance the accuracy of hematoma detection, aid clinicians in the fast interpretation of CT images, and streamline triage workflow. Full article
(This article belongs to the Special Issue Feature Papers in Medical and Clinical Informatics)
Show Figures

Figure 1

Figure 1
<p>Sample CT images used to conduct the study.</p>
Full article ">Figure 2
<p>Outline of the proposed technique.</p>
Full article ">Figure 3
<p>Sample CT images after pre-processing.</p>
Full article ">Figure 4
<p>Boxplots obtained using first ranked feature before and after applying Grey Wolf Optimization: (<b>a</b>,<b>b</b>): GLCM and Hu’s invariant moments, (<b>c</b>,<b>d</b>): GLRLM and statistical features.</p>
Full article ">Figure 5
<p>AUC for the various classifiers used in the proposed approach. (<b>a</b>) Weighted KNN, (<b>b</b>) fine KNN, (<b>c</b>) optimizable KNN, (<b>d</b>) wide NN, (<b>e</b>) cubic SVM.</p>
Full article ">Figure 6
<p>Proposed IoT-based architecture for ICH classification.</p>
Full article ">
12 pages, 784 KiB  
Article
The Triadic Relationship of Sense-Making, Analytics, and Institutional Influences
by Imad Bani-Hani, Soumitra Chowdhury and Arianit Kurti
Informatics 2022, 9(1), 3; https://doi.org/10.3390/informatics9010003 - 28 Dec 2021
Cited by 1 | Viewed by 3372
Abstract
The current business environment demands the enablement of organization-wide use of analytics to support a fact-based decision making. Such movement within the organization require employees to take advantage of the self-service business analytics tools to independently fulfil their needs. However, assuming independence in [...] Read more.
The current business environment demands the enablement of organization-wide use of analytics to support a fact-based decision making. Such movement within the organization require employees to take advantage of the self-service business analytics tools to independently fulfil their needs. However, assuming independence in data analytics requires employees to make sense of several elements which collectively contribute to the generation of required insights. Building on sense-making, self-service business analytics, and institutions literature, this paper explores the relationship between sense-making and self-service business analytics and how institutions influence and shape such relationship. By adopting a qualitative perspective and using 22 interviews, we have empirically investigated a model developed through our literature review and provided more understanding of the sense-making concept in a self-service business analytics context. Full article
(This article belongs to the Special Issue Big Data Analytics, AI and Machine Learning in Marketing)
Show Figures

Figure 1

Figure 1
<p>Conceptual framework for understanding sense-making and SSBA using institutional theory.</p>
Full article ">Figure 2
<p>Data analysis process.</p>
Full article ">Figure 3
<p>Analytical sense-making and organizational institutions.</p>
Full article ">
14 pages, 2900 KiB  
Article
A Smart Integrated Vest for the Canine Companion of the K9 Units
by Georgios Vosinakis, Maria Krommyda, Angelos Stamou, Nikos Mitro, Marios Palazis-Aslanidis, Katerina Voulgary, Spyros Athanasiadis and Angelos Amditis
Informatics 2022, 9(1), 2; https://doi.org/10.3390/informatics9010002 - 21 Dec 2021
Cited by 2 | Viewed by 3479
Abstract
Search and rescue operations can range from small, confined spaces, such as collapsed buildings, to large area searches during missing person operations. K9 units are tasked with intervening in such emergencies and assist in the optimal way to ensure a successful outcome for [...] Read more.
Search and rescue operations can range from small, confined spaces, such as collapsed buildings, to large area searches during missing person operations. K9 units are tasked with intervening in such emergencies and assist in the optimal way to ensure a successful outcome for the mission. They are required to operate in unknown situations were the lives of the K9 handler and the canine companion are threatened as they operate with limited situational awareness. Within the context of the INGENIOUS project, we developed a K9 vest for the canine companion of the unit, aiming to increase the unit’s safety while operating in the field, assist the K9 handler in better monitoring the location and the environment of the K9 and increase the information provided to the Command and Control Center during the operation. Full article
(This article belongs to the Section Human-Computer Interaction)
Show Figures

Figure 1

Figure 1
<p>The K9 Vest block diagram.</p>
Full article ">Figure 2
<p>Both modules attached on the vest during the second round of testing.</p>
Full article ">Figure 3
<p>The K9 Vest Camera and Localisation/Audio modules.</p>
Full article ">Figure 4
<p>Camera module stress test results.</p>
Full article ">Figure 5
<p>Localization module stress test results.</p>
Full article ">Figure 6
<p>The K9 Vest components.</p>
Full article ">Figure 7
<p>The K9 Vest inner architecture.</p>
Full article ">Figure 8
<p>The K9 Vest user interface showing the localization on map along with the HD and thermal camera stream.</p>
Full article ">
17 pages, 4732 KiB  
Article
Design Thinking: Methodological Strategy for the Creation of a Playful Application for Children with Dyslexia
by Rubén Jerónimo Yedra and María Alejandrina Almeida Aguilar
Informatics 2022, 9(1), 1; https://doi.org/10.3390/informatics9010001 - 21 Dec 2021
Cited by 6 | Viewed by 4256
Abstract
The use of a methodology to address a problem facilitates work in an efficient, effective, and highly productive way. The design thinking methodology (also known as design thinking) is user-centric and oriented towards offering solutions by breaking down a problem into small parts [...] Read more.
The use of a methodology to address a problem facilitates work in an efficient, effective, and highly productive way. The design thinking methodology (also known as design thinking) is user-centric and oriented towards offering solutions by breaking down a problem into small parts to analyze it, to explore it, to test the results, and to create solutions that benefit the end-user. Many children have problems related to learning disorders, such as dyslexia, which occur due to the way that their brain incorporates and processes information. This can lead to them showing difficulty in some learning areas, even when their intelligence or motivation does not appear to be affected. In this research, through a mixed approach, a playful application is developed using new information and communication technologies (ICT), following a design thinking methodology, with the aim of supporting the learning of children with dyslexia through content designed with respect to their needs in order to help improve their academic performance. Data collection was carried out through observation, an interview, and record reviews. Analysis of the didactic materials allowed for the observation that content designed for the specific needs of children can work as a reinforcement for incorporating the information in an entertaining, dynamic, and friendly way, ultimately contributing to improved academic performance. Full article
(This article belongs to the Section Social Informatics and Digital Humanities)
Show Figures

Figure 1

Figure 1
<p>Stages of the design thinking methodology.</p>
Full article ">Figure 2
<p>Example use-case diagram noting detected needs.</p>
Full article ">Figure 3
<p>Prototype Model [<a href="#B36-informatics-09-00001" class="html-bibr">36</a>].</p>
Full article ">Figure 4
<p>Example of prototype development in Adobe Animate Creative Cloud.</p>
Full article ">Figure 5
<p>Initial screen of the playful application.</p>
Full article ">Figure 6
<p>Options for each guided reading.</p>
Full article ">Figure 7
<p>Play activities of the application.</p>
Full article ">Figure 8
<p>Example of a usability test design.</p>
Full article ">Figure 9
<p>Average of activities solved by the children.</p>
Full article ">Figure 10
<p>Decrease in mistakes in activities carried out by children.</p>
Full article ">
Previous Issue
Next Issue
Back to TopTop