Başlık:
Research Challenges in Information Science: Information Science and the Connected World 17th International Conference, RCIS 2023, Corfu, Greece, May 23-26, 2023, Proceedings
Yazar:
Nurcan, Selmin. editor.
ISBN:
9783031330803
Basım Bilgisi:
1st ed. 2023.
Fiziksel Tanımlama:
XXVI, 685 p. 174 illus., 114 illus. in color. online resource.
Seri:
Lecture Notes in Business Information Processing, 476
İçerik:
Requirements -- Goal Modelling: Design and Manufacturing in Cloud Migration High-Level Requirements -- Idea Browsing on Digital Participation Platforms: A Mixed-methods Requirements Study -- Conceptual modeling and ontologies -- What Do Users Think about Abstractions of Ontology-Driven Conceptual Models -- On the Semantics of Risk Propagation -- The omnipresent role of technology in social-ecological systems: ontological discussion and updated integrated framework -- Machine Learning and Analytics -- Detection of fishing activities from vessel trajectories -- Framework for Blockchain Data Analysis -- Reinforcement learning for scriptless testing: An empirical investigation of reward functions -- Conceptual modeling and semantic networks -- DBSpark: A system for natural language to SPARQL translation -- An Automated Patterns-based Model-to-Model Mapping and Transformation System for Labeled Property Graphs -- Improving Conceptual Domain Characterization in Ontology Networks -- Business Process Design and Computing in the Continuum -- Digital Technology-Driven Business Process Redesign: A Classification Framework -- Supporting the Implementation of Digital Twins for IoT-Enhanced BPs -- Context-Aware Digital Twins to Support Software Management at the Edge -- Adoption of Virtual Agents in Healthcare E-commerce: a Perceived Value Perspective -- Requirements and Evaluation -- Addressing Trust Issues in Supply-Chain Management Systems through Blockchain Software Patterns -- Evaluating Process Effciency with Data Envelopment Analysis: a Case in the Automotive Industry -- A Model of Qualitative Factors in Forensic-Ready Software Systems -- Monitoring and recommending -- Monitoring object-centric Business Processes: An Empirical Study -- A Peekinto the Working Day: Comparing Techniques for Recording Employee Behaviour -- Context-aware recommender systems: aggregation-based dimensionality reduction -- Business processes analysis and improvement Discovery of Improvement Opportunities in Knock-out Checks of Business Processes -- Persuasive Visual Presentation of Prescriptive Business Processes -- TraVaG: Differentially Private Trace Variant Generation Using GANs -- User interface and experience -- When Dashboard's Content Becomes a Barrier - Exploring the Effects of Cognitive Overloads on BI Adoption -- The effect of visual information complexity on urban mobility intention and behavior -- Interoperability of Open Science Metadata: what about the reality -- Forum papers. -Online-Notes System: Real-time speech recognition and translation of lectures -- Temporal relation extraction from clinical texts using knowledge graphs -- Domain TILEs: Test Informed Learning with Examples from the Testing Domain -- Using GUI change detection for delta testing -- Enterprise Modeling for Machine Learning: Case-based Analysis and Initial Framework Proposal -- Towards Creating a Secure Framework for Building Mirror World Applications -- Towards a Secure and Privacy compliant Framework for EducationalData Mining -- Internet of Cloud (IoC): The need of raising privacy and security awareness -- Comparative study of unsupervised keyword extraction methods for job recommendation in an industrial environment -- A Meta-model for Digital Business Ecosystem Design -- Students in Team-Based Software Development Projects: An Exploratory Study -- Ontology of Product Provenance for Value Networks -- A Data Value Matrix: Linking FAIR Data with Business Models -- An Information Privacy Competency Model for Online Consumers -- DECENT: A Domain Specific Language to Design Governance Decisions -- Doctoral Consortium papers -- Business User-oriented Recommender System of Data -- Secure infrastructure for cyber-physical ranges -- Guidelines for Developers and Recommendations for Users to Mitigate Phishing Attacks: An Interdisciplinary Research Approach -- Leveraging Exogeneous Data for the Predictive Monitoring of IT Service Management Processes -- Predicting privacy decisions in mobile applications and raising users' privacy awareness -- Information overload: Coping mechanisms and tools impact.
Tüzel Kişi Ek Girişi:
Elektronik Erişim:
https://doi.org/10.1007/978-3-031-33080-3Kopya:
Rafta:*
Kütüphane | Materyal Türü | Demirbaş Numarası | Yer Numarası | Durumu/İade Tarihi | Materyal Ayırtma |
---|---|---|---|---|---|
Arıyor... | E-Kitap | 520580-1001 | XX(520580.1) | Arıyor... | Arıyor... |