Vai al contenuto principale della pagina

Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Rocha Álvaro Visualizza persona
Titolo: Good Practices and New Perspectives in Information Systems and Technologies : WorldCIST 2024, Volume 3 Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing AG, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (507 pages)
Altri autori: AdeliHojjat  
DzemydaGintautas  
MoreiraFernando  
Poniszewska-MarańdaAneta  
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Information and Knowledge Management -- Improving Change Management in Large Engineering Projects: A Case Study -- 1 Introduction -- 2 Literature Review -- 2.1 Engineering Change Process -- 2.2 Impacts of Change Management -- 2.3 Tools and Techniques -- 3 Research Methodology -- 4 Case Study Analysis -- 5 Proposals for Improvement -- 5.1 Review of Standard Activities in Each ECR Phase -- 5.2 Development of ECR Status Tracking -- 6 Discussion -- 7 Conclusions -- References -- MITEC Model for Talent Management to Small and Medium Enterprises Develop with  Design Science Research -- 1 Introduction -- 2 Methodology: Design Science Research -- 3 Application Design Science Research for MITEC -- 4 Design Science Research Conclusion -- 5 Conclusion and Future Work -- References -- Proposal to Improve Risk Management in New Product Development Projects in an Automotive Company -- 1 Introduction -- 2 Theoretical Background -- 2.1 Project Management -- 2.2 Risk Management -- 3 Research Methodology -- 4 Case Study -- 4.1 Current Risk Management Plan -- 4.2 Team Maturity in Risk Management -- 5 Proposal of Improvements -- 6 Conclusions and Future Research -- References -- Limitations that Hinder the Successful Application of a Knowledge Management Model in Research Centers in a Higher Education Institution -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 4 Results -- 5 Discussion and Analysis of Results -- 6 Conclusions -- References -- Cyber Security Information Sharing During a Large Scale Real Life Cyber Security Exercise -- 1 Introduction -- 2 Research Approach -- 3 Cyber Security Information Sharing -- 4 Cyber Security Exercise -- 5 Technical Implementation -- 5.1 Implemented Construction -- 5.2 Modeled Cyber Security Exercise a Real Life Test Event -- 6 Results.
6.1 Free-Form Feedback -- 6.2 Feedback Survey -- 7 Conclusion -- References -- Companies Amidst Evolving Digital Media Challenges in CSR Communication. Systematic Literature Review -- 1 Introduction -- 2 Theoretical Background -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Ga-starfish: A Gamified Retrospective -- 1 Introduction -- 2 Background -- 2.1 Retrospective -- 2.2 Starfish Technique -- 2.3 Gamification -- 2.4 Social and Human Factors -- 3 Related Work -- 4 Method -- 5 Results -- 5.1 Phase A: Planning -- 5.2 Phase B: Design -- 5.3 Phase C: Pilot Test -- 5.4 Phase D: Scheduling -- 5.5 Phase E: Evaluation -- 6 Discussion -- 7 Conclusions and Future Work -- References -- The Strategy Implementation of Account-Based Marketing (ABM)-The Stratio Case -- 1 Introduction -- 2 Literature Review -- 2.1 Marketing in the Business-to-Business Marketplace -- 2.2 Relationship Marketing -- 2.3 Account-Based Marketing -- 2.4 The Sales Funnel of Traditional Marketing and Account-Based Marketing -- 2.5 Types of Account-Based Marketing -- 2.6 Benefits of the Account-Based Marketing Strategy -- 2.7 Implementation of the Account-Based Marketing Strategy -- 2.8 Measuring the Returns of the Account-Based Marketing Strategy -- 3 Methodology -- 4 Case Study-Stratio Automotive -- 4.1 Stratio Automotive in a Glance -- 4.2 Implementing the Account-Based Marketing Strategy at Stratio Automotive -- 5 Results and Discussion -- 6 Conclusion -- References -- Approach to the Consumption of Fake News. The Case of Ecuador -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Syntax in Emoji Sequences on Social Media Posts -- 1 Introduction -- 2 Research Methodology -- 2.1 Inclusion and Exclusion Criteria -- 2.2 Databases -- 3 Results Analysis -- 4 Conclusions and Future Work -- References.
Trends and Collaborations in Information Systems and Technologies: A Bibliometric Analysis of WorldCIST Proceedings -- 1 Introduction -- 2 Related Work -- 3 Data Collection and Processing -- 4 Findings -- 4.1 Authorship Trends -- 4.2 Thematic Analysis -- 4.3 Collaboration Patterns -- 5 Discussion and Future Work -- 6 Conclusion -- References -- A Comparative Assessment of Wrappers and Filters for Detecting Cyber Intrusions -- 1 Introduction -- 2 Background -- 3 Related Work -- 4 Experimental Design -- 4.1 Intrusion Detection Datasets -- 4.2 Proposed Method -- 5 Empirical Results and Discussion -- 5.1 Cleaning and Transforming Data -- 5.2 Comparison of Filters and Wrappers FS Techniques and the Best Combinations of FS-Classifier -- 6 Conclusion and Future Work -- References -- Multiclass Intrusion Detection in IoT Using Boosting and Feature Selection -- 1 Introduction -- 2 Related Works -- 3 Experimental Design -- 3.1 Datasets Description -- 3.2 Performance Measure -- 3.3 Methodology -- 4 Results and Discussions -- 4.1 Determining the Optimal Number of Estimators for Each Boosting Technique -- 4.2 Optimal Combinations of FS and Boosting Methods Across Varied Feature Percentages -- 5 Conclusion and Future Work -- References -- Is ChatGPT Able to Generate Texts that Are Easy to Understand and Read? -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Design of the study -- 4.1 Text Comprehensibility Indicators -- 4.2 Corpus -- 5 Results -- 5.1 Word Count Analysis -- 5.2 Readability Index -- 5.3 Simple Linguistic Structures -- 6 Conclusion and Discussion -- Appendix I. Linguistic Elements Analyzed -- References -- Does a Lack of Transparency Lead to the Dark Side of Social Media? a Study in South Western Europe According to Gender and Age -- 1 Introduction -- 2 Literature Review -- 2.1 Beauty Standards -- 2.2 Beauty Standards Over Time.
2.3 Globalization of Beauty Standards -- 3 Social Media and Young People's Body Image -- 3.1 Negative Strategies Adopted by Social Media to Exploit Personal Insecurities -- 4 Methodology -- 5 Results and Discussion -- 6 Chi-Square Tests -- 6.1 Conclusions Regarding Fisher's Exact Test and the Chi-Square Test -- 7 Conclusion and Future Research -- References -- Analysis of the Impact of Orthogonality in the Readability of the OBO Foundry Ontologies -- 1 Introduction -- 2 Materials and Methods -- 2.1 Human Readability Properties in OWL Ontologies -- 2.2 The Orthogonal View of the OBO Foundry Repository -- 2.3 The Reuse-Based Readability Metrics -- 3 Results and Discussion -- 3.1 Experimental Setup -- 3.2 Comparison by Number of Entities -- 3.3 Analysis of Human Readability -- 4 Conclusions -- References -- Do Habit and Privacy Matter in a Post Pandemic-Era? Mobile Apps Acceptance of the Private Healthcare Sector in Portugal -- 1 Introduction -- 2 Conceptual Model -- 3 Methodology -- 4 Results -- 4.1 Measurement Model Evaluation -- 4.2 Structural Model -- 5 Conclusion -- References -- The Role of Online Product Information in Enabling Electronic Retail/E-tailing -- 1 Introduction -- 2 Literature Review -- 2.1 Product Information and Information Availability -- 2.2 Information Search -- 2.3 Conceptual Framework -- 3 Methodology -- 4 Data and Analysis -- 4.1 Results -- 4.2 Discussion -- 4.3 Main Contributions -- 5 Conclusion -- References -- Habitat Suitability Assessment of Three Passerine Birds Using Ensemble Learning with Diverse Models -- 1 Introduction -- 2 Material and Methods -- 2.1 Birds' Dataset -- 2.2 Environmental Data -- 2.3 Experiment Workflow -- 3 Results and Discussions -- 3.1 Evaluation of the Eight Single Machine Learning Techniques -- 3.2 Evaluation of the Heterogeneous Ensembles Compared to Their Single Models.
4 Conclusion and Future Works -- References -- Budgeted Recommendation with Delayed Feedback -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Algorithm Design -- 4.1 Search for Top Responsive Arms -- 4.2 Resource Allocation with Delays -- 5 Experiments -- 6 Conclusion -- References -- AI in Higher Education: Assessing Acceptance, Learning Enhancement, and Ethical Considerations Among University Students -- 1 Introduction -- 2 Literature Review -- 2.1 Acceptance of AI in Higher Education -- 2.2 Learning Enhancement -- 2.3 Ethical Considerations -- 3 Methodology -- 4 Results and Discussion -- 4.1 Acceptance -- 4.2 Learning Enhancement -- 4.3 Ethical Considerations -- 5 Conclusion -- References -- Intellectual Capital and Information Technologies in Education: Some Insights -- 1 Introduction -- 2 Literature Review -- 3 Conclusions -- References -- Integrating an Advanced Evolutionary Intelligence System into the Internal Contracting Operations at Centro Hospitalar Universitário Lisboa Central -- 1 Introduction -- 1.1 Internal Contracting Process -- 1.2 Evolutionary Intelligence -- 2 General and Specific Objectives -- 3 Methods -- 4 Conclusion -- References -- Language Policy in the Social Media - Efforts to Revitalize Indigenous Languages in Peru -- 1 Introduction -- 2 Theoretical Foundations: Language Policy, Multilingual Ability and Language Revitalization -- 3 Language Policy in the (Social) Media -- 4 Language Revitalization -- 5 The Revitalization of Quechua in the Music and the Social Media -- 6 The Revitalization of Quechua in Academic Contexts -- 7 Aspirations to the Revitalization of Mochica -- 8 Discussion -- 9 Conclusions -- References -- A Graph-Based Approach for Searching and Visualizing of Resources and Concepts in Data Science -- 1 Introduction -- 2 Background -- 2.1 An Introduction to Knowledge Graphs.
2.2 Related Work.
Titolo autorizzato: Good Practices and New Perspectives in Information Systems and Technologies  Visualizza cluster
ISBN: 3-031-60221-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910857796603321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series