LEADER 12779nam 22006615 450 001 9910734862803321 005 20230710145132.0 010 $a3-031-33258-X 024 7 $a10.1007/978-3-031-33258-6 035 $a(MiAaPQ)EBC30625773 035 $a(Au-PeEL)EBL30625773 035 $a(DE-He213)978-3-031-33258-6 035 $a(PPN)272253375 035 $a(CKB)27557978700041 035 $a(EXLCZ)9927557978700041 100 $a20230710d2023 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Technology and Systems $eICITS 2023, Volume 1 /$fedited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra 205 $a1st ed. 2023. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2023. 215 $a1 online resource (633 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v691 311 08$aPrint version: Rocha, Álvaro Information Technology and Systems Cham : Springer International Publishing AG,c2023 9783031332579 327 $aIntro -- Preface -- Contents -- Big Data Analytics and Applications -- On the Use of Parallel Architectures in DNA Methylation Analysis -- 1 Introduction -- 2 Sample Alignment and Methylation Status Inference -- 3 Detection of Differentially Methylated Regions (DMRs) -- 4 Artificial Intelligence for Methylation Analysis -- 5 Conclusions -- References -- Automation for IBNR Provision Using Power BI and Excel -- 1 Introduction -- 1.1 Generalities -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Visualizing the Risks of De-anonymization in High-Dimensional Data -- 1 Introduction -- 2 Related Work and Contribution -- 3 Methods -- 3.1 k-Anonymity -- 3.2 l-Diversity -- 3.3 Spatiotemporal Data Anonymity -- 3.4 Textual Data Anonymity -- 3.5 Financial Transactions Data Anonymity -- 3.6 Aggregation-Based Data Anonymity -- 4 Application -- 5 Conclusion and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Wireless Mesh for Schools in the Emberá Comarca -- 1 Introduction -- 2 Methodology -- 3 Internet Connections -- 4 Why Mesh Networks? -- 5 Model -- 6 Conclusions -- 7 Future Work -- References -- Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory -- 1 Introduction -- 2 Development -- 3 Results -- 4 Conclusions -- References -- TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society -- 1 Introduction -- 2 Connectivity Challenges in Indigenous Communities -- 2.1 The Ella Puru Community, a Case Study -- 2.2 Potential Project Risks -- 2.3 Potential Benefits -- 3 Design Requirements of a Versatile Access Network for Indigenous Communities -- 3.1 Requirements -- 3.2 Design Considerations -- 4 TaguaSpot High-Level Design -- 5 Conclusions -- References -- Ethics, Computers and Security. 327 $aVulnerability Analysis in the Business Organization -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis Process -- 2.3 Environment Description -- 3 Results -- 3.1 Lifetime of Vulnerability in the Information System -- 4 Conclusions -- References -- Information Security: Identification of Risk Factors Through Social Engineering -- 1 Introduction -- 2 Risk Factors for Social Engineering Attacks -- 2.1 Computational Techniques for Social Engineering -- 2.2 Non-computational Techniques for Social Engineering -- 3 Methodology -- 3.1 Social Engineering Attack Vectors -- 4 Results -- 5 Techniques to Prevent Social Engineering Attacks -- 6 Conclusion -- References -- The Information Security Function and the CISO in Colombia: 2010-2020 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Research Instrument -- 3.2 Sample -- 4 Results -- 4.1 Function of the Information Security Area and Role of the Professional -- 4.2 Evolution of the Information Security Professional Profile -- 5 Discussion -- 5.1 Security Function, Steadily Growing -- 5.2 Cybersecurity Professional Profile, a Path of Experience and Expansion -- 6 Conclusions -- References -- Privacy and Cyber-Security Using Information Systems: A Proposal for Knowledge, Skills, and Attitudes -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results and Discussions -- 5 Future Work -- 6 Conclusions -- References -- A Case Study of a Privacy-Invading Browser Extension -- 1 Introduction -- 2 The Attack Scenario -- 3 Implementation -- 4 Discussion -- 5 Conclusion -- References -- Human-Computer Interaction -- An Animatronic Robot to Provide Therapeutic Support to Preschool Children Attending Medical Consultations -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Movement Control System -- 5 Experimentation and Results. 327 $a5.1 Structural Analysis -- 6 Conclusions -- References -- Evaluating the Engagement by Design Methodology in Crowdsourcing Initiatives -- 1 Introduction -- 2 Related Works -- 3 Engagement by Design Cards -- 4 Application of the Engagement by Design Methodology -- 5 Analysis of Cards Choice -- 6 Evaluation of Ideas Generated by the Engagement by Design Methodology -- 6.1 Results -- 7 Lessons Learned -- 8 Conclusion -- References -- Applying Semiotic Engineering in Game Pre-production to Promote Reflection on Player Privacy -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Semiotic Engineering -- 2.2 Game Development -- 2.3 Privacy in Games -- 3 Rationale for Using Semiotic Engineering -- 4 Proposed Approach -- 4.1 Guiding Questions to Reflect on Privacy -- 4.2 Example of How to Answer the Questions -- 5 Final Remarks and Future Work -- References -- The Consumer Influence of Digital Coupon Distribution Through a Referral Program -- 1 Introduction -- 2 Literature Review -- 2.1 Sales Promotion and Digital Coupon -- 2.2 Referral Program -- 2.3 Consumer Perception: Principles of Influence and Decision-Making -- 3 Methodology -- 3.1 Research Question and Hypotheses -- 3.2 Methodology, Variables, Data and Sample -- 3.3 Study Context and Procedures -- 3.4 Data, Factor, Reliability Analysis and Anova -- 3.5 Results -- 4 Conclusions -- 4.1 Final Considerations, Scientific and Managerial Contributions -- 4.2 Limitations and Future Research -- References -- Digital Travel - A Study of Travellers' Views of a Digital Visit to Mexico -- 1 Introduction -- 2 Methods and Focus: A Digital Visit to Mexico -- 2.1 Characteristics of the Participants and the Survey -- 2.2 Visiting Mexico in Forza Horizon 5 -- 3 Data Analysis and Results -- 4 Discussion -- References -- Health Informatics -- Medical Entities Extraction with Metamap and cTAKES from Spanish Texts. 327 $a1 Introduction -- 1.1 UMLS -- 1.2 Metamap -- 1.3 cTAKES -- 2 Methodology -- 3 Results -- 4 Comparison of Metamap and cTAKES -- 5 Conclusion -- References -- Health Records Management in Trust Model Blockchain-Based -- 1 Introduction -- 2 State of the Art -- 2.1 Blockchain Technology -- 2.2 Health Records Concepts -- 3 Related Work -- 4 Methodology -- 5 Proposed Trust Model -- 6 Conclusion -- References -- Digital Transformation and Adoption of Electronic Health Records: Critical Success Factors -- 1 Introduction -- 2 Background -- 2.1 Digital Transformation and Electronic Health Records -- 2.2 Latin America and the Caribbean, and Barriers to EHR Adoption -- 3 Proposal -- 3.1 Critical Success Factors (CSFs) for Evaluating the Conditions for Health Services -- 3.2 Configuration of CSF to EHR Adoption -- 3.3 Operationalization of the CSFs -- 4 Towards the Evaluation and Application of the CSFs -- 4.1 Case Study -- 5 Conclusions -- References -- Comorbidity Analysis in the Mexican Population Affected by SARS-CoV2 -- 1 Introduction -- 1.1 Data Acquisition -- 1.2 Data Processing -- 2 Affectation Index -- 3 Comorbidity Statistics -- 4 Conclusions -- References -- Practical Guidelines for Developing Secure FHIR Applications -- 1 Introduction -- 1.1 Motivation -- 1.2 FHIR Standard and Security -- 1.3 The Security Challenge of FHIR API Based Applications -- 2 Methods and Materials -- 2.1 Guidelines -- 2.2 Testing -- 3 Results -- 3.1 Guidelines -- 3.2 Testing -- 4 Discussion -- References -- Intelligent System to Provide Support in the Analysis of Colposcopy Images Based on Artificial Vision and Deep Learning: A First Approach for Rural Environments in Ecuador -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Pilot Experiment and Preliminary Results -- 4.1 Training the Neural Network. 327 $a4.2 Measurement of Perception of the Mobile Application and the Web Application -- 5 Conclusions -- References -- Comparison of Transfer Learning vs. Hyperparameter Tuning to Improve Neural Networks Precision in the Early Detection of Pneumonia in Chest X-Rays -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 CNN Architecture -- 3.2 VGGNet -- 3.3 ResNet -- 3.4 MobileNet -- 3.5 Hyperparameter Tuning -- 4 Experiment and Preliminary Results -- 5 Conclusion -- References -- A Smart Mirror Based on Computer Vision and Deep Learning to Support the Learning of Sexual Violence Prevention and Self-care Health in Youth with Intellectual Disabilities -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Experimentation and Results -- 5 Conclusions -- References -- Intelligent and Decision Support Systems -- Weight Prediction of a Beehive Using Bi-LSTM Network -- 1 Introduction -- 2 Database -- 2.1 LSTM Network -- 2.2 Bi-LSTM Network -- 2.3 Performance Measures -- 2.4 Bi-LSTM Configuration -- 3 Results and Discussion -- 4 Conclusions -- References -- Criteria Selection and Decision-Making Support in IT Governance: A Study via Fuzzy AHP Applied to a Multi-institutional Consortium -- 1 Introduction -- 2 Theoretical Reference -- 3 Methodology -- 3.1 Business Analysis -- 3.2 Preparation -- 3.3 Application of the Questionnaire for Data Collection -- 3.4 Fuzzy AHP Application-Results -- 4 Application of the Methodology -- 4.1 Selection of Criteria and Alternative -- 4.2 Application of Fuzzy AHP -- 5 Conclusions -- References -- Machine Learning Model Optimization for Energy Efficiency Prediction in Buildings Using XGBoost -- 1 Introduction -- 2 Methodology -- 2.1 Data Ingestion -- 2.2 Data Pre-processing -- 2.3 Building the Model -- 2.4 Model Tuning -- 3 Results -- 4 Discussion -- 5 Conclusion -- References. 327 $aAnalysis of the Azores Accommodation Offer in Booking.Com Using an Unsupervised Learning Approach. 330 $aThis book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24th and the 26th of April 2023. ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges of modern information technology and systems research, together with their technological development and applications. The main topics covered are: information and knowledge management; organizational models and information systems; software and systems modelling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; human?computer interaction; ethics, computers & security; health informatics; information technologies in education, and Media, Applied Technology and Communication. . 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v691 606 $aComputational intelligence 606 $aEngineering?Data processing 606 $aApplication software 606 $aComputational Intelligence 606 $aData Engineering 606 $aComputer and Information Systems Applications 615 0$aComputational intelligence. 615 0$aEngineering?Data processing. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aData Engineering. 615 24$aComputer and Information Systems Applications. 676 $a006.3 700 $aRocha$b Álvaro$01077024 701 $aFerrás$b Carlos$01372744 701 $aIbarra$b Waldo$01372745 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910734862803321 996 $aInformation Technology and Systems$93403603 997 $aUNINA