Vai al contenuto principale della pagina

Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Rocha Álvaro Visualizza persona
Titolo: Information Technology and Systems : ICITS 2023, Volume 1 / / edited by Álvaro Rocha, Carlos Ferrás, Waldo Ibarra Visualizza cluster
Pubblicazione: Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023
Edizione: 1st ed. 2023.
Descrizione fisica: 1 online resource (633 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Engineering—Data processing
Application software
Computational Intelligence
Data Engineering
Computer and Information Systems Applications
Altri autori: FerrásCarlos  
IbarraWaldo  
Nota di contenuto: Intro -- Preface -- Contents -- Big Data Analytics and Applications -- On the Use of Parallel Architectures in DNA Methylation Analysis -- 1 Introduction -- 2 Sample Alignment and Methylation Status Inference -- 3 Detection of Differentially Methylated Regions (DMRs) -- 4 Artificial Intelligence for Methylation Analysis -- 5 Conclusions -- References -- Automation for IBNR Provision Using Power BI and Excel -- 1 Introduction -- 1.1 Generalities -- 2 Methodology -- 3 Results -- 4 Conclusions -- References -- Visualizing the Risks of De-anonymization in High-Dimensional Data -- 1 Introduction -- 2 Related Work and Contribution -- 3 Methods -- 3.1 k-Anonymity -- 3.2 l-Diversity -- 3.3 Spatiotemporal Data Anonymity -- 3.4 Textual Data Anonymity -- 3.5 Financial Transactions Data Anonymity -- 3.6 Aggregation-Based Data Anonymity -- 4 Application -- 5 Conclusion and Future Work -- References -- Computer Networks, Mobility and Pervasive Systems -- Wireless Mesh for Schools in the Emberá Comarca -- 1 Introduction -- 2 Methodology -- 3 Internet Connections -- 4 Why Mesh Networks? -- 5 Model -- 6 Conclusions -- 7 Future Work -- References -- Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory -- 1 Introduction -- 2 Development -- 3 Results -- 4 Conclusions -- References -- TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society -- 1 Introduction -- 2 Connectivity Challenges in Indigenous Communities -- 2.1 The Ella Puru Community, a Case Study -- 2.2 Potential Project Risks -- 2.3 Potential Benefits -- 3 Design Requirements of a Versatile Access Network for Indigenous Communities -- 3.1 Requirements -- 3.2 Design Considerations -- 4 TaguaSpot High-Level Design -- 5 Conclusions -- References -- Ethics, Computers and Security.
Vulnerability Analysis in the Business Organization -- 1 Introduction -- 2 Methodology -- 2.1 Vulnerability Analysis Tools -- 2.2 Vulnerability Analysis Process -- 2.3 Environment Description -- 3 Results -- 3.1 Lifetime of Vulnerability in the Information System -- 4 Conclusions -- References -- Information Security: Identification of Risk Factors Through Social Engineering -- 1 Introduction -- 2 Risk Factors for Social Engineering Attacks -- 2.1 Computational Techniques for Social Engineering -- 2.2 Non-computational Techniques for Social Engineering -- 3 Methodology -- 3.1 Social Engineering Attack Vectors -- 4 Results -- 5 Techniques to Prevent Social Engineering Attacks -- 6 Conclusion -- References -- The Information Security Function and the CISO in Colombia: 2010-2020 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Research Instrument -- 3.2 Sample -- 4 Results -- 4.1 Function of the Information Security Area and Role of the Professional -- 4.2 Evolution of the Information Security Professional Profile -- 5 Discussion -- 5.1 Security Function, Steadily Growing -- 5.2 Cybersecurity Professional Profile, a Path of Experience and Expansion -- 6 Conclusions -- References -- Privacy and Cyber-Security Using Information Systems: A Proposal for Knowledge, Skills, and Attitudes -- 1 Introduction -- 2 Background -- 3 Methodology -- 4 Results and Discussions -- 5 Future Work -- 6 Conclusions -- References -- A Case Study of a Privacy-Invading Browser Extension -- 1 Introduction -- 2 The Attack Scenario -- 3 Implementation -- 4 Discussion -- 5 Conclusion -- References -- Human-Computer Interaction -- An Animatronic Robot to Provide Therapeutic Support to Preschool Children Attending Medical Consultations -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Movement Control System -- 5 Experimentation and Results.
5.1 Structural Analysis -- 6 Conclusions -- References -- Evaluating the Engagement by Design Methodology in Crowdsourcing Initiatives -- 1 Introduction -- 2 Related Works -- 3 Engagement by Design Cards -- 4 Application of the Engagement by Design Methodology -- 5 Analysis of Cards Choice -- 6 Evaluation of Ideas Generated by the Engagement by Design Methodology -- 6.1 Results -- 7 Lessons Learned -- 8 Conclusion -- References -- Applying Semiotic Engineering in Game Pre-production to Promote Reflection on Player Privacy -- 1 Introduction -- 2 Theoretical Foundation -- 2.1 Semiotic Engineering -- 2.2 Game Development -- 2.3 Privacy in Games -- 3 Rationale for Using Semiotic Engineering -- 4 Proposed Approach -- 4.1 Guiding Questions to Reflect on Privacy -- 4.2 Example of How to Answer the Questions -- 5 Final Remarks and Future Work -- References -- The Consumer Influence of Digital Coupon Distribution Through a Referral Program -- 1 Introduction -- 2 Literature Review -- 2.1 Sales Promotion and Digital Coupon -- 2.2 Referral Program -- 2.3 Consumer Perception: Principles of Influence and Decision-Making -- 3 Methodology -- 3.1 Research Question and Hypotheses -- 3.2 Methodology, Variables, Data and Sample -- 3.3 Study Context and Procedures -- 3.4 Data, Factor, Reliability Analysis and Anova -- 3.5 Results -- 4 Conclusions -- 4.1 Final Considerations, Scientific and Managerial Contributions -- 4.2 Limitations and Future Research -- References -- Digital Travel - A Study of Travellers' Views of a Digital Visit to Mexico -- 1 Introduction -- 2 Methods and Focus: A Digital Visit to Mexico -- 2.1 Characteristics of the Participants and the Survey -- 2.2 Visiting Mexico in Forza Horizon 5 -- 3 Data Analysis and Results -- 4 Discussion -- References -- Health Informatics -- Medical Entities Extraction with Metamap and cTAKES from Spanish Texts.
1 Introduction -- 1.1 UMLS -- 1.2 Metamap -- 1.3 cTAKES -- 2 Methodology -- 3 Results -- 4 Comparison of Metamap and cTAKES -- 5 Conclusion -- References -- Health Records Management in Trust Model Blockchain-Based -- 1 Introduction -- 2 State of the Art -- 2.1 Blockchain Technology -- 2.2 Health Records Concepts -- 3 Related Work -- 4 Methodology -- 5 Proposed Trust Model -- 6 Conclusion -- References -- Digital Transformation and Adoption of Electronic Health Records: Critical Success Factors -- 1 Introduction -- 2 Background -- 2.1 Digital Transformation and Electronic Health Records -- 2.2 Latin America and the Caribbean, and Barriers to EHR Adoption -- 3 Proposal -- 3.1 Critical Success Factors (CSFs) for Evaluating the Conditions for Health Services -- 3.2 Configuration of CSF to EHR Adoption -- 3.3 Operationalization of the CSFs -- 4 Towards the Evaluation and Application of the CSFs -- 4.1 Case Study -- 5 Conclusions -- References -- Comorbidity Analysis in the Mexican Population Affected by SARS-CoV2 -- 1 Introduction -- 1.1 Data Acquisition -- 1.2 Data Processing -- 2 Affectation Index -- 3 Comorbidity Statistics -- 4 Conclusions -- References -- Practical Guidelines for Developing Secure FHIR Applications -- 1 Introduction -- 1.1 Motivation -- 1.2 FHIR Standard and Security -- 1.3 The Security Challenge of FHIR API Based Applications -- 2 Methods and Materials -- 2.1 Guidelines -- 2.2 Testing -- 3 Results -- 3.1 Guidelines -- 3.2 Testing -- 4 Discussion -- References -- Intelligent System to Provide Support in the Analysis of Colposcopy Images Based on Artificial Vision and Deep Learning: A First Approach for Rural Environments in Ecuador -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Pilot Experiment and Preliminary Results -- 4.1 Training the Neural Network.
4.2 Measurement of Perception of the Mobile Application and the Web Application -- 5 Conclusions -- References -- Comparison of Transfer Learning vs. Hyperparameter Tuning to Improve Neural Networks Precision in the Early Detection of Pneumonia in Chest X-Rays -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 CNN Architecture -- 3.2 VGGNet -- 3.3 ResNet -- 3.4 MobileNet -- 3.5 Hyperparameter Tuning -- 4 Experiment and Preliminary Results -- 5 Conclusion -- References -- A Smart Mirror Based on Computer Vision and Deep Learning to Support the Learning of Sexual Violence Prevention and Self-care Health in Youth with Intellectual Disabilities -- 1 Introduction -- 2 Related Work -- 3 System Architecture -- 4 Experimentation and Results -- 5 Conclusions -- References -- Intelligent and Decision Support Systems -- Weight Prediction of a Beehive Using Bi-LSTM Network -- 1 Introduction -- 2 Database -- 2.1 LSTM Network -- 2.2 Bi-LSTM Network -- 2.3 Performance Measures -- 2.4 Bi-LSTM Configuration -- 3 Results and Discussion -- 4 Conclusions -- References -- Criteria Selection and Decision-Making Support in IT Governance: A Study via Fuzzy AHP Applied to a Multi-institutional Consortium -- 1 Introduction -- 2 Theoretical Reference -- 3 Methodology -- 3.1 Business Analysis -- 3.2 Preparation -- 3.3 Application of the Questionnaire for Data Collection -- 3.4 Fuzzy AHP Application-Results -- 4 Application of the Methodology -- 4.1 Selection of Criteria and Alternative -- 4.2 Application of Fuzzy AHP -- 5 Conclusions -- References -- Machine Learning Model Optimization for Energy Efficiency Prediction in Buildings Using XGBoost -- 1 Introduction -- 2 Methodology -- 2.1 Data Ingestion -- 2.2 Data Pre-processing -- 2.3 Building the Model -- 2.4 Model Tuning -- 3 Results -- 4 Discussion -- 5 Conclusion -- References.
Analysis of the Azores Accommodation Offer in Booking.Com Using an Unsupervised Learning Approach.
Sommario/riassunto: This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24th and the 26th of April 2023. ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges of modern information technology and systems research, together with their technological development and applications. The main topics covered are: information and knowledge management; organizational models and information systems; software and systems modelling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; human–computer interaction; ethics, computers & security; health informatics; information technologies in education, and Media, Applied Technology and Communication. .
Titolo autorizzato: Information Technology and Systems  Visualizza cluster
ISBN: 3-031-33258-X
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910734862803321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 691