Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

COMMUNICATIONS (446 journals)                  1 2 3 | Last

Showing 1 - 200 of 480 Journals sorted alphabetically
3C TIC     Open Access   (Followers: 1)
ACM Transactions on Information Systems (TOIS)     Hybrid Journal   (Followers: 18)
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)     Hybrid Journal   (Followers: 10)
Acta Universitatis Danubius. Communicatio     Open Access  
Acta Universitatis Sapientiae Communicatio     Open Access  
Advances in Image and Video Processing     Open Access   (Followers: 20)
Advances in Journalism and Communication     Open Access   (Followers: 26)
African Journal of Information and Communication     Open Access   (Followers: 6)
African Journal of Information Systems     Open Access   (Followers: 6)
African Journal of Rhetoric     Full-text available via subscription   (Followers: 3)
African Yearbook of Rhetoric     Full-text available via subscription   (Followers: 3)
Ambitos     Open Access   (Followers: 1)
American Journal of Semiotics     Full-text available via subscription   (Followers: 4)
Anagrama     Open Access  
Anagramas : Rumbos y Sentidos de la Comunicación     Open Access   (Followers: 2)
Anàlisi : Quaderns de Comunicació i Cultura     Open Access  
Âncora : Revista Latino-Americana de Jornalismo     Open Access  
Andharupa : Journal of Visual Communication Design & Multimedia     Open Access   (Followers: 3)
Annales Universitatis Paedagogicae Cracoviensis / Studia de Cultura     Open Access  
Annals of Telecommunications     Hybrid Journal   (Followers: 6)
Annals of the International Communication Association     Hybrid Journal   (Followers: 4)
Anuario electrónico de estudios en Comunicación Social "Disertaciones"     Open Access   (Followers: 1)
Apparatus. Film, Media and Digital Cultures of Central and Eastern Europe     Open Access   (Followers: 5)
Área Abierta     Open Access   (Followers: 2)
Art Design & Communication in Higher Education     Hybrid Journal   (Followers: 22)
At-Tabsyir : Jurnal Komunikasi Penyiaran Islam     Open Access  
Atatürk İletişim Dergisi     Open Access  
Aturá : Revista Pan-Amazônica de Comunicação     Open Access  
Auditory Perception & Cognition     Hybrid Journal  
Augmentative and Alternative Communication     Hybrid Journal   (Followers: 46)
Avatares de la Comunicación y la Cultura     Open Access  
Baltic International Yearbook of Cognition, Logic and Communication     Open Access   (Followers: 2)
Baltic Screen Media Review     Open Access   (Followers: 1)
Bioelectromagnetics     Hybrid Journal   (Followers: 1)
Black Camera     Full-text available via subscription   (Followers: 8)
Borderlands Journal : Culture, Politics, Law and Earth     Open Access   (Followers: 1)
C&SC - Communication & Social Change     Open Access   (Followers: 7)
Caderno de Letras     Open Access  
Canadian Journal of Communication     Partially Free   (Followers: 24)
Catalan Journal of Communication & Cultural Studies     Hybrid Journal   (Followers: 2)
Celebrity Studies     Hybrid Journal   (Followers: 13)
Chasqui. Revista Latinoamericana de Comunicación     Open Access   (Followers: 2)
China Communications     Full-text available via subscription   (Followers: 8)
Chinese Journal of Communication     Hybrid Journal   (Followers: 12)
Church, Communication and Culture     Open Access   (Followers: 1)
CIC. Cuadernos de Informacion y Comunicacion     Open Access   (Followers: 5)
Comedy Studies     Hybrid Journal   (Followers: 10)
Commons. Revista de Comunicación y Ciudadanía Digital     Open Access  
Communicatio : South African Journal for Communication Theory and Research     Hybrid Journal   (Followers: 3)
Communication     Open Access   (Followers: 28)
Communication & Language at Work     Open Access   (Followers: 10)
Communication & Society     Open Access   (Followers: 6)
Communication & Sport     Hybrid Journal   (Followers: 7)
communication +1     Open Access   (Followers: 2)
Communication and Culture Online / Komunikacija i kultura     Open Access   (Followers: 1)
Communication and Media in Asia Pacific (CMAP)     Open Access   (Followers: 2)
Communication and the Public     Hybrid Journal   (Followers: 2)
Communication Booknotes Quarterly     Hybrid Journal   (Followers: 15)
Communication Cultures in Africa     Open Access   (Followers: 7)
Communication et organisation     Open Access  
Communication et Professionnalisation     Open Access  
Communication Papers : Media Literacy & Gender Studies     Open Access   (Followers: 20)
Communication Research and Practice     Hybrid Journal  
Communication Theory     Hybrid Journal   (Followers: 29)
Communication, Culture & Critique     Hybrid Journal   (Followers: 28)
Communication, technologies et développement     Open Access  
Communications in Mobile Computing     Open Access   (Followers: 14)
Communications of the Association for Information Systems     Open Access   (Followers: 15)
Communiquer : Revue de communication sociale et publique     Open Access  
Computational Communication Research     Open Access   (Followers: 1)
Comuni@cción     Open Access  
Comunicação & Educação     Open Access  
Comunicação & Sociedade     Open Access   (Followers: 1)
Comunicação e Sociedade     Open Access  
Comunicació. Revista de recerca i d'anàlisi     Open Access  
Comunicación     Open Access  
Comunicación y Ciudadanía     Open Access  
Comunicación y Género     Open Access  
Comunicación y Medios     Open Access   (Followers: 2)
Comunicación y sociedad     Open Access   (Followers: 2)
Comunicar     Open Access   (Followers: 1)
Conexión     Open Access  
Connections     Open Access  
Connections : A Journal of Language, Media and Culture     Open Access   (Followers: 3)
Contratexto     Open Access  
Convergence The International Journal of Research into New Media Technologies     Hybrid Journal   (Followers: 48)
Creative Artist : A Journal of Theatre and Media Studies     Open Access   (Followers: 11)
Cross-cultural Communication     Open Access   (Followers: 8)
Cryptography     Open Access   (Followers: 1)
Cuadernos de H Ideas     Open Access  
Cuadernos de Informacion     Open Access  
Cuadernos.info     Open Access  
De Signos y Sentidos     Open Access  
Democratic Communiqué     Open Access   (Followers: 1)
Design Ecologies     Hybrid Journal   (Followers: 13)
Digithum     Open Access   (Followers: 2)
Discourse, Context & Media     Open Access   (Followers: 23)
Distúrbios da Comunicação     Open Access  
Dixit     Open Access  
Documentación de las Ciencias de la Información     Open Access   (Followers: 1)
Doxa Comunicación : Revista interdisciplinar de estudios de Comunicación y Ciencias Sociales     Open Access  
e-Journal of Linguistics     Open Access   (Followers: 3)
e-learning and education (eleed)     Open Access   (Followers: 40)
Electronic Journal of Knowledge Management     Open Access   (Followers: 25)
Electronics and Communications in Japan     Hybrid Journal   (Followers: 8)
Empedocles : European Journal for the Philosophy of Communication     Hybrid Journal   (Followers: 2)
Entreculturas : Revista de Traducción y Comunicación Intercultural     Open Access  
ESSACHESS : Journal for Communication Studies     Open Access   (Followers: 2)
Etudes de communication     Open Access   (Followers: 3)
Evidence Based Library and Information Practice     Open Access   (Followers: 393)
Explorations in Media Ecology     Hybrid Journal   (Followers: 5)
Fibreculture Journal     Open Access   (Followers: 9)
FLEKS : Scandinavian Journal of Intercultural Theory and Practice     Open Access   (Followers: 1)
Folia Toruniensia     Open Access  
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Framework : The Journal of Cinema and Media     Full-text available via subscription   (Followers: 19)
Fronteiras - estudos midiáticos     Open Access  
Frontiers in Communication     Open Access   (Followers: 1)
Frontiers in Human Dynamics     Open Access  
Genre en séries. Cinéma, télévision, médias     Open Access  
Gesture     Hybrid Journal   (Followers: 4)
Global Advances in Business Communication     Open Access   (Followers: 5)
Global Media and China     Open Access  
Global Media and Communication     Hybrid Journal   (Followers: 17)
Global Media Journal     Open Access   (Followers: 11)
Globe : A Journal of Language, Culture and Communication     Open Access   (Followers: 3)
Green Letters : Studies in Ecocriticism     Hybrid Journal   (Followers: 1)
GSI Journals Serie C : Advancements in Information Sciences and Technologies     Open Access   (Followers: 1)
GSTF Journal on Media & Communications     Open Access   (Followers: 2)
H-ermes. Journal of Communication     Open Access   (Followers: 3)
Health Information Management Journal     Hybrid Journal   (Followers: 24)
HERMES - Journal of Language and Communication in Business     Open Access   (Followers: 3)
Hipertext.net : Anuario Académico sobre Documentación Digital y Comunicación Interactiva     Open Access   (Followers: 1)
Historia y Comunicación Social     Open Access  
Human Communication Research     Hybrid Journal   (Followers: 17)
Ibérica     Open Access   (Followers: 2)
Ícone     Open Access  
ICSES Transactions on Computer Networks and Communications     Full-text available via subscription  
IEEE Communications Standards Magazine     Full-text available via subscription   (Followers: 2)
IEEE Open Journal of the Communications Society     Open Access  
IEEE Transactions on Cognitive Communications and Networking     Hybrid Journal   (Followers: 4)
IEEE Transactions on Smart Grid     Hybrid Journal   (Followers: 18)
IEICE - Transactions on Fundamentals of Electronics, Communications and Computer Sciences     Full-text available via subscription   (Followers: 9)
IET Communications     Open Access   (Followers: 11)
İletişim Kuram ve Araştırma Dergisi     Open Access  
Imaging Decisions MRI     Hybrid Journal   (Followers: 2)
Improntas     Open Access  
index.comunicación     Open Access  
Informacijos mokslai     Open Access  
Informal Logic     Open Access   (Followers: 9)
Informatics     Open Access   (Followers: 4)
Informatio. Revista del Instituto de Información de la Facultad de Información y Comunicación     Open Access  
Information & Communications Technology Law     Hybrid Journal   (Followers: 22)
Information Design Journal     Hybrid Journal   (Followers: 7)
Information Technologies & International Development     Open Access   (Followers: 82)
Information, Communication & Society     Hybrid Journal   (Followers: 71)
Inquiry : Critical Thinking Across the Disciplines     Full-text available via subscription   (Followers: 2)
Intelligent Information Management     Open Access   (Followers: 7)
Interaction Studies     Hybrid Journal   (Followers: 9)
Interactions : Studies in Communication & Culture     Hybrid Journal   (Followers: 3)
International Journal of Ad Hoc and Ubiquitous Computing     Hybrid Journal   (Followers: 8)
International Journal of Advanced Media and Communication     Hybrid Journal   (Followers: 22)
International Journal of Autonomous and Adaptive Communications Systems     Hybrid Journal   (Followers: 3)
International Journal of Broadband Cellular Communication     Full-text available via subscription  
International Journal of Business Communication     Hybrid Journal   (Followers: 10)
International Journal of Communication     Open Access   (Followers: 16)
International Journal of Community Development and Management Studies (IJCDMS)     Open Access  
International Journal of Computer Science and Telecommunications     Open Access   (Followers: 13)
International Journal of Cooperative Information Systems     Hybrid Journal   (Followers: 4)
International Journal of Critical Media Literacy     Hybrid Journal  
International Journal of Electronics and Telecommunications     Open Access   (Followers: 8)
International Journal of Entertainment Technology and Management     Hybrid Journal   (Followers: 1)
International Journal of Information and Communication Technology Education     Full-text available via subscription   (Followers: 13)
International Journal of Information Communication Technologies and Human Development     Full-text available via subscription   (Followers: 4)
International Journal of Information Science and Technology     Open Access   (Followers: 1)
International Journal of Information Technology, Communications and Convergence     Hybrid Journal   (Followers: 14)
International Journal of Intelligence Science     Open Access   (Followers: 3)
International Journal of Interdisciplinary Telecommunications and Networking     Full-text available via subscription   (Followers: 3)
International Journal of Knowledge and Systems Science     Full-text available via subscription   (Followers: 1)
International Journal of Monitoring and Surveillance Technologies Research     Full-text available via subscription   (Followers: 3)
International Journal of Review in Electronics & Communication Engineering     Open Access   (Followers: 2)
International Journal of Society, Culture & Language     Open Access   (Followers: 15)
International Journal of Telecommunications & Emerging Technologies     Full-text available via subscription   (Followers: 1)
International Journal of Telework and Telecommuting Technologies     Full-text available via subscription  
International Journal of Trust Management in Computing and Communications     Hybrid Journal   (Followers: 1)
International Journals Digital Communication and Analog Signals     Full-text available via subscription   (Followers: 6)
International Review of Communication and Marketing Mix : IROCAMM     Open Access   (Followers: 1)
International Review of Pragmatics     Hybrid Journal   (Followers: 4)
Investigative Radiology     Hybrid Journal   (Followers: 7)
IRIS - Revista de Informação, Memória e Tecnologia     Open Access  
Izvestia Ural Federal University Journal. Series 1. Issues in Education, Science and Culture     Open Access  
Javnost - The Public     Hybrid Journal  
Język. Komunikacja. Informacja     Open Access  
Journal for the History of Rhetoric     Hybrid Journal   (Followers: 16)
Journal of Advertising Education     Hybrid Journal  
Journal of African Media Studies     Hybrid Journal   (Followers: 2)
Journal of Applied Communications     Open Access  
Journal of Applied Journalism & Media Studies     Hybrid Journal   (Followers: 14)
Journal of Argumentation in Context     Hybrid Journal   (Followers: 2)
Journal of Arts & Communities     Hybrid Journal   (Followers: 4)

        1 2 3 | Last

Similar Journals
Journal Cover
Informatics
Number of Followers: 4  

  This is an Open Access Journal Open Access journal
ISSN (Print) 2227-9709
Published by MDPI Homepage  [84 journals]
  • Informatics, Vol. 9, Pages 30: Risk Determination versus Risk Perception:
           A New Model of Reality for Human–Machine Autonomy

    • Authors: William Lawless
      First page: 30
      Abstract: We review the progress in developing a science of interdependence applied to the determinations and perceptions of risk for autonomous human–machine systems based on a case study of the Department of Defense’s (DoD) faulty determination of risk in a drone strike in Afghanistan; the DoD’s assessment was rushed, suppressing alternative risk perceptions. We begin by contrasting the lack of success found in a case study from the commercial sphere (Facebook’s use of machine intelligence to find and categorize “hate speech”). Then, after the DoD case study, we draw a comparison with the Department of Energy’s (DOE) mismanagement of its military nuclear wastes that created health risks to the public, DOE employees, and the environment. The DOE recovered by defending its risk determinations and challenging risk perceptions in public. We apply this process to autonomous human–machine systems. The result from this review is a major discovery about the costly suppression of risk perceptions to best determine actual risks, whether for the military, business, or politics. For autonomous systems, we conclude that the determinations of actual risks need to be limited in scope as much as feasible; and that a process of free and open debate needs to be adopted that challenges the risk perceptions arising in situations facing uncertainty as the best, and possibly the only, path forward to a solution.
      Citation: Informatics
      PubDate: 2022-03-24
      DOI: 10.3390/informatics9020030
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 31: Extending the UTAUT2 Model with a Privacy
           Calculus Model to Enhance the Adoption of a Health Information Application
           in Malaysia

    • Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad, Ibrahim El-Shekeil, Jigang Liu
      First page: 31
      Abstract: This study validates and extends the latest unified theory of acceptance and use of technology (UTAUT2) with the privacy calculus model. To evaluate the adoption of healthcare and e-government applications, researchers have recommended—in previous literature—the application of technology adoption models with privacy, trust, and security-related constructs. However, the current UTAUT2 model lacks privacy, trust, and security-related constructs. Therefore, the proposed UTAUT2 with the privacy calculus model is incorporated into four constructs: privacy concern, perceived risk, trust in the smart national identity card (SNIC), and perceived credibility. Results from a survey data of 720 respondents show that habit, effort expectancy, performance expectancy, social influence, hedonic motivation, and price value are direct determinants that influence behavioral intentions to use. Results also revealed that behavioral intentions, facilitating conditions, habits, perceived risks, and privacy concerns are direct predictors of ‘use behavior’. The authors also analyzed the interrelationships among the research constructs. The extended model may lead toward establishing better innovative e-health services to cover the desires of the citizens through the use of health information applications embedded in an all-in-one card.
      Citation: Informatics
      PubDate: 2022-03-28
      DOI: 10.3390/informatics9020031
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 32: The Research Trend of Security and Privacy
           in Digital Payment

    • Authors: Alaa Mahdi Sahi, Haliyana Khalid, Alhamzah F. Abbas, Khaled Zedan, Saleh F. A. Khatib, Hamzeh Al Amosh
      First page: 32
      Abstract: The aim of this study is to synthesize the rapidly increasing literature on privacy and security risk of digital payment. By reviewing 591 studies, the literature on this topic was evaluated using a bibliographical approach to highlight the intellectual development of the field and recommend potential research directions in this still-emerging field. According to our assessment, academics have continued to focus on perceived privacy and security, while more multigroup analyses based on subdimensions of risk are needed. In addition, the vast majority of studies have not considered the inter-relationship between risk attributes. We analyse the potential causes of the lack of research diversity and provide additional suggestions to improve digital payment research in the future. This study will be valuable for academics, analysts, regulators, practitioners, and investors.
      Citation: Informatics
      PubDate: 2022-04-11
      DOI: 10.3390/informatics9020032
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 33: Development of a Simulator for Prototyping
           Reinforcement Learning-Based Autonomous Cars

    • Authors: Martin Holen, Kristian Muri Knausgård, Morten Goodwin
      First page: 33
      Abstract: Autonomous driving is a research field that has received attention in recent years, with increasing applications of reinforcement learning (RL) algorithms. It is impractical to train an autonomous vehicle thoroughly in the physical space, i.e., the so-called ’real world’; therefore, simulators are used in almost all training of autonomous driving algorithms. There are numerous autonomous driving simulators, very few of which are specifically targeted at RL. RL-based cars are challenging due to the variety of reward functions available. There is a lack of simulators addressing many central RL research tasks within autonomous driving, such as scene understanding, localization and mapping, planning and driving policies, and control, which have diverse requirements and goals. It is, therefore, challenging to prototype new RL projects with different simulators, especially when there is a need to examine several reward functions at once. This paper introduces a modified simulator based on the Udacity simulator, made for autonomous cars using RL. It creates reward functions, along with sensors to create a baseline implementation for RL-based vehicles. The modified simulator also resets the vehicle when it gets stuck or is in a non-terminating loop, making it more reliable. Overall, the paper seeks to make the prototyping of new systems simple, with the testing of different RL-based systems.
      Citation: Informatics
      PubDate: 2022-04-15
      DOI: 10.3390/informatics9020033
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 34: Role of Four-Chamber Heart Ultrasound
           

    • Authors: Anjan Gudigar, Raghavendra U., Jyothi Samanth, Akhila Vasudeva, Ashwal A. A. J., Krishnananda Nayak, Ru-San Tan, Edward J. Ciaccio, Chui Ping Ooi, Prabal Datta Barua, Filippo Molinari, U. Rajendra Acharya
      First page: 34
      Abstract: The fetal echocardiogram is useful for monitoring and diagnosing cardiovascular diseases in the fetus in utero. Importantly, it can be used for assessing prenatal congenital heart disease, for which timely intervention can improve the unborn child’s outcomes. In this regard, artificial intelligence (AI) can be used for the automatic analysis of fetal heart ultrasound images. This study reviews nondeep and deep learning approaches for assessing the fetal heart using standard four-chamber ultrasound images. The state-of-the-art techniques in the field are described and discussed. The compendium demonstrates the capability of automatic assessment of the fetal heart using AI technology. This work can serve as a resource for research in the field.
      Citation: Informatics
      PubDate: 2022-04-18
      DOI: 10.3390/informatics9020034
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 35: Lean ICU Layout Re-Design: A
           Simulation-Based Approach

    • Authors: Elpidio Romano, Andrea Falegnami, Anna Corinna Cagliano, Carlo Rafele
      First page: 35
      Abstract: Healthcare facilities require flexible layouts that can adapt quickly in the face of various disruptions. COVID-19 confirmed this need for both healthcare and manufacturing systems. Starting with the transfer of decision support systems from manufacturing, this paper generalizes layout re-design activities for complex systems by presenting a simulation framework. Through a real case study concerning the proliferation of nosocomial cross-infection in an intensive care unit (ICU), the model developed in systems dynamics, based on a zero order immediate logic, allows reproducing the evolution of the different agencies (e.g., physicians, nurses, ancillary workers, patients), as well as of the cyber-technical side of the ICU, in its general but also local aspects. The entire global workflow is theoretically founded on lean principles, with the goal of balancing the need for minimal patient throughput time and maximum efficiency by optimizing the resources used during the process. The proposed framework might be transferred to other wards with minimal adjustments; hence, it has the potential to represent the initial step for a modular depiction of an entire healthcare facility.
      Citation: Informatics
      PubDate: 2022-04-22
      DOI: 10.3390/informatics9020035
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 36: Aspects of E-Scooter Sharing in the Smart
           City

    • Authors: Yelena Popova, Diana Zagulova
      First page: 36
      Abstract: The contemporary urban environment faces such challenges as overloaded traffic, heavy pollution, and social problems, etc. The concept of the “smart city” allows solving some of these issues. One of the opportunities provided by the smart city is the development of micro-mobility and sharing services; contributing to the optimization of transport flows and decreasing carbon footprints. This study investigates the factors affecting the development of e-scooter sharing services and the attitudes of young urban residents towards using these services. The research applied a PLS-SEM (partial least squares structural equation modeling) analysis performed in SmartPLS3.7 software. The data were collected via focus groups and surveying a population aged 18–35. The authors partially based the research on the UTAUT model (the unified theory of acceptance and use of technology), taking such constructs as “intention to use”, “anxiety”, “attitude toward use”, “effort expectancy”, and “social influence”; they also introduced the new unique variables “internal uncertainty”, “e-scooter design”, “experience”, “perceived safety”, “infrastructure quality”, and “motivation to physical activity”. The main finding of the study was determining that the latent variables attitude towards sharing, anxiety, internal uncertainty, JTBD (jobs to be done), and new way of thinking have a direct or indirect effect on the intention to ride e-scooters in the future and/or to use sharing services. The obtained results permit making recommendations to businesses, municipal authorities, and other stakeholders on developing e-scooter sharing services as a contribution to the advancement of the smart city.
      Citation: Informatics
      PubDate: 2022-04-22
      DOI: 10.3390/informatics9020036
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 37: The Development of an Information
           Technology Architecture for Automated, Agile and Versatile Companies with
           Ecological and Ethical Guidelines

    • Authors: Klaus Kuehnel, Manuel Au-Yong-Oliveira
      First page: 37
      Abstract: Based on many years of experience as a management consultant in different industries and corporate structures and cultures, the motivation to use digital transformation in connection with variable corporate goals—such as fluctuating workloads, agile response to customer inquiries, and ecological and economic sustainability—results in a process or a product to be developed that intelligently adapts to market requirements and requires forward-looking leadership. Using an AI-based methodical analysis and synthesis approach, the high consumption of economic and human resources is to be continuously monitored and optimization measures initiated at an early stage. The necessary information technology with its infrastructure and architecture is the starting point to accompany the agility and changeability of corporate goals. Researching the relevant documents begins with writing the panorama or the state of knowledge on the topic. This article is about the IT infrastructure based on the requirements for an architecture and behavior that a versatile, agile company needs to accompany the constantly changing framework conditions of the market. The technology used and the available resources, including the human resources, need to be adapted as early as possible. Data now represent the most valuable asset on Earth and future industrial manufacturing systems must maximize the opportunity of data usage. Low-level data must be transformed to make them useful in supporting intelligent decision-making, for example. Furthermore, future manufacturing systems must be highly productive, adaptable, absent of error, and kind to the environment and to local communities. The all-important design should minimize the waste of material, capital, energy, and media. Herein, we discuss the fulfilling of agile customer requirements involving adaptable and modulated production processes (related to the ‘agile manufacturing’ and ‘digital transformation’ perspectives).
      Citation: Informatics
      PubDate: 2022-04-24
      DOI: 10.3390/informatics9020037
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 38: Metadata Integration Framework for Data
           Integration of Socio-Cultural Anthropology Digital Repositories: A Case
           Study of Princess Maha Chakri Sirindhorn Anthropology Centre

    • Authors: Marut Buranarach, Watchira Buranasing, Sittisak Rungcharoensuksri, Panita Sarawasee, Treepidok Ngootip, Wirapong Chansanam
      First page: 38
      Abstract: Data integration is one of the most challenging tasks for digital collections whose data are stored across various repositories. Data integration across digital repositories has several challenges. First, data heterogeneity in terms of data schema and data values usually occurs across diverse data sources. Second, heterogeneity in data representation and semantic issues are among the problems. The same data may appear in different repositories with varied data representations, i.e., metadata schema. Recent research has focused on matching several related metadata schemas. In this paper, a metadata integration framework is proposed to support digital repositories in socio-cultural anthropology at the Princess Maha Chakri Sirindhorn Anthropology Centre (SAC), Thailand. The proposed framework is defined based on the Metadata Lifecycle Model (MLM). It utilizes non-procedural schema mappings to express data relationships in diverse schemas. A case study of metadata integration over the SAC digital repositories was conducted to validate the framework. The SAC common metadata schema was designed to support data mapping across 13 digital repositories. The SAC “One Search” system was developed to exemplify the system implementation of the framework. Evaluation results showed that the proposed metadata integration framework can support domain experts in socio-cultural anthropology in unified searching across the repositories.
      Citation: Informatics
      PubDate: 2022-04-27
      DOI: 10.3390/informatics9020038
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 39: An Exploratory Study on the Validation of
           THUNDERS: A Process to Achieve Shared Understanding in Problem-Solving
           Activities

    • Authors: Vanessa Agredo-Delgado, Pablo H. Ruiz, Cesar A. Collazos, Fernando Moreira
      First page: 39
      Abstract: The complexity in collaborative work is mainly related to the difficulty in social interaction, which generates low levels of understanding among participants about what they should do and about the problem to be solved, resulting in problems in the motivation to generate true collaboration. Therefore, in the search to improve collaborative work and encourage this collaboration, it is necessary to implement strategies that promote the construction of shared understanding and obtain better group results. However, building it becomes a challenge due to the factors that influence it and how little is known about its construction. In this sense, to improve collaborative work, as a result of a research process, the THUNDERS process is proposed, which provides a set of elements to build shared understanding in problem-solving activities and with heterogeneous group formation. Specifically, this paper presents the results of the statistical validation of THUNDERS through the Student’s t-test, which was used in an exploratory study in the educational field in two Colombian universities, where learning styles were considered for the formation of groups; having groups that used the process and other control groups that did not use it, the collaborative activity consisted of determining the scope of a process line simulating a software development company. According to the results obtained in the context of this study, it can be considered that THUNDERS encourages and improves shared understanding when people in a group work collaboratively to solve a problem. In addition, elements for improvement were identified that should be incorporated in further stages of this research so that the process allows for an easy and guided construction of shared understanding in any application context.
      Citation: Informatics
      PubDate: 2022-04-30
      DOI: 10.3390/informatics9020039
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 40: Evaluation of MyRelief Serious Game for
           Better Self-Management of Health Behaviour Strategies on Chronic Low-Back
           Pain

    • Authors: Rytis Maskeliūnas, Robertas Damaševičius, Audrius Kulikajevas, Joane Marley, Caroline Larsson
      First page: 40
      Abstract: Low back pain is a leading cause of disability worldwide, putting a significant strain on individual sufferers, their families, and the economy as a whole. It has a significant economic impact on the global economy because of the costs associated with healthcare, lost productivity, activity limitation, and work absence. Self-management, education, and adopting healthy lifestyle behaviors, such as increasing physical activity, are all widely recommended treatments. Access to services provided by healthcare professionals who provide these treatments can be limited and costly. This evaluation study focuses on the application of the MyRelief serious game, with the goal of addressing such challenges by providing an accessible, interactive, and fun platform that incorporates self-management, behavior change strategies, and educational information consistent with recommendations for managing low-back pain, based on self-assessment models implemented through ontology-based mechanics. Functional disability measured using the Oswestry Disability Questionnaire showed the statistically significant (p < 0.001) improvement in subjects’ self-evaluation of their health status. System Usability Scale (SUS) test score of 77.6 also suggests that the MyRelief serious game can potentially influence patient enablement.
      Citation: Informatics
      PubDate: 2022-04-30
      DOI: 10.3390/informatics9020040
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 41: The Arc de Triomphe, Wrapped: Measuring
           Public Installation Art Engagement and Popularity through Social Media
           Data Analysis

    • Authors: Sofia Vlachou, Michail Panagopoulos
      First page: 41
      Abstract: Social media is the most popular canvas to engage with art. In this study, we provide a different angle, on how an artistic installation on a world-renowned monument—such as Paris’ Arc de Triomphe—can emotionally affect viewers and potentially increase the popularity of the artwork. We collected N = 7078 Instagram and N = 3776 Twitter posts of the Arc de Triomphe as wrapped (installation) and unwrapped using APIs. As engagement indicators for several supervised machine learning experiments, we chose the total number of likes, comments, shares, text sentiment, and so on. Our findings revealed that people were captivated by the poetic installation. Based on the results, we discovered that the sentiments of triumph and surprise prevailed in datasets of the Arc de Triomphe as unwrapped. The same sentiments of triumph and surprise were most prevalent in datasets as wrapped, as well, but with higher scores. Furthermore, we have provided evidence of public art experience and engagement in the social media era. This research, we believe, will be useful in future studies of social media through the lens of public art and popularity. We hope that our findings will stimulate future research in the fields of art curatorship, cultural heritage management, marketing and communication, aesthetics, and culture analytics.
      Citation: Informatics
      PubDate: 2022-05-09
      DOI: 10.3390/informatics9020041
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 42: The C2G Framework to Convert Infrastructure
           Data from Computer-Aided Design (CAD) to Geographic Information Systems
           (GIS)

    • Authors: Mohamed Badhrudeen, Eric Sergio Boria, Guillemette Fonteix, Michael D. Siciliano, Sybil Derrible
      First page: 42
      Abstract: Making smart and informed decisions often requires the integration and analysis of large amounts of data. However, integrating these data is rarely straightforward, mainly because of heterogeneities in data structure and format. In this study, we focus on two widely used data formats by municipalities to store digital maps of their infrastructure: Computer-Aided Design (CAD) and Geographic Information Systems (GIS). While most municipalities still maintain infrastructure data in CAD format, many have started converting them to GIS since GIS includes geographical coordinates. However, the inherent differences between these two formats pose challenges to accurately converting information from CAD to GIS. The main goal of this study is to develop a procedure to help municipalities to perform CAD-to-GIS conversion. To that end, potential problems in CAD-to-GIS conversion were first identified through interviews with practitioners at different U.S. municipalities and through a literature review. Taken together, we propose the C2G framework to streamline the conversion process while minimizing information loss. The framework consists of five stages, and the execution of this framework and tasks involved in each stage are explained. Moreover, we apply the framework to real-world underground stormwater infrastructure data obtained from the University of Illinois at Chicago (UIC) to illustrate the framework’s applicability. The case study explains details about the technical difficulties we encountered in the process and provides recommendations to circumvent those difficulties. The results from the case study showed that the C2G framework was able to successfully convert CAD data to GIS data. Although the framework is developed specific to the needs of CAD/GIS practitioners in the US municipalities, it can be adopted in most CAD-to-GIS conversion situations. The information learned during the interviews supports the need for a standard CAD-to-GIS conversion process. The contribution of this study is to fill this gap by developing a generalized framework to carry out CAD-to-GIS conversion which only requires basic knowledge of CAD and GIS.
      Citation: Informatics
      PubDate: 2022-05-11
      DOI: 10.3390/informatics9020042
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 43: Advancements in Artificial
           Intelligence-Based Decision Support Systems for Improving Construction
           Project Sustainability: A Systematic Literature Review

    • Authors: Craig John Smith, Andy T. C. Wong
      First page: 43
      Abstract: This paper aims at evaluating the current state of research into artificial intelligence (AI)-based decision support systems (DSS) for improving construction project sustainability. The literature was systematically reviewed to explore the use of AI in the construction project lifecycle together with the consideration of the economic, environmental, and social goals of sustainability. A total of 2688 research papers were reviewed, and 77 papers were further analyzed, and the major tasks of the DSSs were categorized. Our review results suggest that the main research stream is dedicated to early-stage project prediction (50% of all papers), with artificial neural networks (ANNs) and fuzzy logic (FL) being the most popular AI algorithms in use. Hybrid AI models were used in 46% of all studies. The goal for economic sustainability is the most considered in research, with 87% of all papers considering this goal, and there is evidence given of a trend towards the environmental and social goals of sustainability receiving increasing attention throughout the latter half of the decade.
      Citation: Informatics
      PubDate: 2022-05-13
      DOI: 10.3390/informatics9020043
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 44: A Proposal for Formulating a Spectrum Usage
           Fee for 5G Private Networks in Indonesian Industrial Areas

    • Authors: Alfin Hikmaturokhman, Kalamullah Ramli, Muhammad Suryanegara, Anak Agung Putri Ratna, Ibrahim Kholilul Rohman, Moinul Zaber
      First page: 44
      Abstract: The Indonesian spectrum usage fees—the so-called Biaya Hak Pengguna Frekuensi Izin Pita Frekuensi Radio (BHP IPFR)—are currently calculated using a formula determined by the three following main parameters: the frequency band, the country’s economic parameter, and the nationwide population. As spectrum usage fees are proportional to the width of the bandwidth, the current formula would result in an extremely high price when applied to 5G-mmWave private networks, with the cost burden being a direct consequence for the service operator. In this paper, we propose the formulation of a new spectrum usage fee for 5G-mmWave private network implementation in Indonesian industrial areas. To do so, we evaluate the current formula, adopt the framework offered by the ITU-R SM.2012-5 (06/2016), and use an industrial reference index—the Indonesia Industry Readiness Index 4.0 (INDI 4.0) score. We test the proposal by applying the new formula to calculate the 5G-mmWave private network spectrum usage fee for the Jakarta industrial area. The result shows that the new formula gives a lower spectrum usage fee than the current formula, which benefits 5G-mmWave private network service operators. Such savings can be regarded as a government subsidy for the service operators to use in various ways in the industry, providing further economic benefits. Using the input–output model, we prove that despite the proposed new formula brings a lower spectrum usage fee, resulting in a loss in state income, it will lead to a much greater positive impact on the national economic output. Applying the new formula will eventually have a multiplier effect on various sectors and encourage digital economic growth and national digital transformation, especially for vertical industries in Indonesia. This study may serve as a guideline or initial reference for Indonesian policymakers and service operators for applying the CAPEX and OPEX cost of using the new spectrum for 5G-mmWave private network service implementation and estimating the economic multiplier for 5G-mmWave private network service deployment in industrial areas. It can also be used as a benchmark case for other countries to apply spectrum usage fees for private networks in industrial areas.
      Citation: Informatics
      PubDate: 2022-05-26
      DOI: 10.3390/informatics9020044
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 45: Enhanced Marketing Decision Making for
           Consumer Behaviour Classification Using Binary Decision Trees and a
           Genetic Algorithm Wrapper

    • Authors: Dimitris C. Gkikas, Prokopis K. Theodoridis, Grigorios N. Beligiannis
      First page: 45
      Abstract: An excessive amount of data is generated daily. A consumer’s journey has become extremely complicated due to the number of electronic platforms, the number of devices, the information provided, and the number of providers. The need for artificial intelligence (AI) models that combine marketing data and computer science methods is imperative to classify users’ needs. This work bridges the gap between computer and marketing science by introducing the current trends of AI models on marketing data. It examines consumers’ behaviour by using a decision-making model, which analyses the consumer’s choices and helps the decision-makers to understand their potential clients’ needs. This model is able to predict consumer behaviour both in the digital and physical shopping environments. It combines decision trees (DTs) and genetic algorithms (GAs) through one wrapping technique, known as the GA wrapper method. Consumer data from surveys are collected and categorised based on the research objectives. The GA wrapper was found to perform exceptionally well, reaching classification accuracies above 90%. With regard to the Gender, the Household Size, and Household Monthly Income classes, it manages to indicate the best subsets of specific genes that affect decision making. These classes were found to be associated with a specific set of variables, providing a clear roadmap for marketing decision-making.
      Citation: Informatics
      PubDate: 2022-05-31
      DOI: 10.3390/informatics9020045
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 46: Identification of the Consequences of
           COVID-19 through the Analysis of Data Obtained in Surveys of a Specific
           Population

    • Authors: William Villegas-Ch., Joselin García-Ortiz, Ivan Ortiz-Garces, Santiago Sánchez-Viteri
      First page: 46
      Abstract: The pandemic caused by the 2019 coronavirus disease has marked a total change in the development of society. Since then, its effects have been visible in people, both in work, education and psychological areas. There are many jobs and organizations that have set out to identify the reality of people after the pandemic and how the pandemic has affected their daily lives. To do this, countries have organized data and statistics collection campaigns that allow investigating the new needs of people. With this, instruments such as surveys have become more relevant and valid to know what these needs are. However, the analysis processes must guarantee answers that are able to determine the direct impact that each question has on people’s feelings. This work proposes a framework to determine the incidence values of surveys based on their categories and questions and how they capture the reality of people in areas such as education, the impact of work, family and the stress generated by the pandemic. With the results obtained, each element and category that the population considers a consequence of COVID-19 that affects the normal development of life has been identified.
      Citation: Informatics
      PubDate: 2022-06-07
      DOI: 10.3390/informatics9020046
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 47: An Interoperable Electronic Health Record
           System for Clinical Cardiology

    • Authors: Elena Lazarova, Sara Mora, Norbert Maggi, Carmelina Ruggiero, Alessandro Cosolito Vitale, Paolo Rubartelli, Mauro Giacomini
      First page: 47
      Abstract: Currently in hospitals, there are several separate information systems that manage, very often autonomously, the patient’s personal, clinical and diagnostic data. An electronic health record system has been specifically developed for a cardiology ward and it has been designed “ab initio” to be fully integrated into the hospital information system and to exchange data with the regional health information infrastructure. All documents have been given as Health Level 7 (HL7) clinical document architecture and messages are sent as HL7-Version 2 (V2) and/or HL7 Fast Healthcare Interoperability Resources (FHIR). Specific decision support sections for specific aspects have also been included. The system has been used for more than three years with a good level of satisfaction by the users. In the future, the system can be the basis for secondary use for clinical studies, further decision support systems and clinical trials.
      Citation: Informatics
      PubDate: 2022-06-13
      DOI: 10.3390/informatics9020047
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 48: A Methodology to Sequence the Service
           Management Processes in IT Departments: Application to the Tourism
           Industry

    • Authors: Juan Luis Rubio Sánchez, Mercedes Raquel García Revilla, Olga Martínez Moure
      First page: 48
      Abstract: One of the key elements to consider in business management is the management of IT (Information Technology) departments by implementing processes as described in the ITIL (Information Technology Infrastructure Library) standard. This is particularly important in industries that are not directly related to ICT (Information and Communication Technologies), such as the tourism industry. In this paper, we present a methodology to sequence the implementation of the ITIL processes in any company to support its development. The methodology is based on an optimization algorithm and the information extracted from a survey. The optimal sequence is built from this information and from the information of the restrictions imposed by the company that implements the ITIL processes. We applied the methodology to a company in the tourism industry. The sequence obtained shows the need to implement operative processes (initial positions in the sequence), and afterwards strategic processes (final positions in the sequence). A comparison with other authors’ proposals shows differences in the order of processes proposed by this methodology. The main conclusion is that it is possible to use the information of companies to efficiently generate an optimal sequence of ITIL processes which enhances their management; this sequence is unique for every company that wants to implement ITIL in the tourism industry, and it is independent from the proposals of other authors who designed generic/non-optimal sequences.
      Citation: Informatics
      PubDate: 2022-06-14
      DOI: 10.3390/informatics9020048
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 49: The Effectiveness of Robot-Enacted Messages
           to Reduce the Consumption of High-Sugar Energy Drinks

    • Authors: Isha Kharub, Michael Lwin, Aila Khan, Omar Mubin, Suleman Shahid
      First page: 49
      Abstract: This exploratory study examines the effectiveness of social robots’ ability to deliver advertising messages using different “appeals” in a business environment. Specifically, it explores the use of three types of message appeals in a human-robot interaction scenario: guilt, humour and non-emotional. The study extends past research in advertising by exploring whether messages communicated by social robots can impact consumers’ behaviour. Using an experimental research design, the emotional-themed messages focus on the health-related properties of two fictitious energy drink brands. The findings show mixed results for humour and guilt messages. When the robot delivered a promotion message using humour, participants perceived it as being less manipulative. Participants who were exposed to humourous messages also demonstrated a significantly greater intent for future purchase decisions. However, guilt messages were more likely to persuade consumers to change their brand selection. This study contributes to the literature as it provides empirical evidence on the social robots’ ability to deliver different advertising messages. It has practical implications for businesses as a growing number seek to employ humanoids to promote their services.
      Citation: Informatics
      PubDate: 2022-06-20
      DOI: 10.3390/informatics9020049
      Issue No: Vol. 9, No. 2 (2022)
       
  • Informatics, Vol. 9, Pages 4: Automated Intracranial Hematoma
           Classification in Traumatic Brain Injury (TBI) Patients Using
           Meta-Heuristic Optimization Techniques

    • Authors: Vidhya V, U. Raghavendra, Anjan Gudigar, Praneet Kasula, Yashas Chakole, Ajay Hegde, Girish Menon R, Chui Ping Ooi, Edward J. Ciaccio, U. Rajendra Acharya
      First page: 4
      Abstract: Traumatic Brain Injury (TBI) is a devastating and life-threatening medical condition that can result in long-term physical and mental disabilities and even death. Early and accurate detection of Intracranial Hemorrhage (ICH) in TBI is crucial for analysis and treatment, as the condition can deteriorate significantly with time. Hence, a rapid, reliable, and cost-effective computer-aided approach that can initially capture the hematoma features is highly relevant for real-time clinical diagnostics. In this study, the Gray Level Occurrence Matrix (GLCM), the Gray Level Run Length Matrix (GLRLM), and Hu moments are used to generate the texture features. The best set of discriminating features are obtained using various meta-heuristic algorithms, and these optimal features are subjected to different classifiers. The synthetic samples are generated using ADASYN to compensate for the data imbalance. The proposed CAD system attained 95.74% accuracy, 96.93% sensitivity, and 94.67% specificity using statistical and GLRLM features along with KNN classifier. Thus, the developed automated system can enhance the accuracy of hematoma detection, aid clinicians in the fast interpretation of CT images, and streamline triage workflow.
      Citation: Informatics
      PubDate: 2022-01-10
      DOI: 10.3390/informatics9010004
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 5: Optimization of Food Industry Production
           Using the Monte Carlo Simulation Method: A Case Study of a Meat Processing
           Plant

    • Authors: Mikhail Koroteev, Ekaterina Romanova, Dmitriy Korovin, Vasiliy Shevtsov, Vadim Feklin, Petr Nikitin, Sergey Makrushin, Konstantin V. Bublikov
      First page: 5
      Abstract: The problem evaluated in this study is related to the optimization of a budget of an industrial enterprise using simulation methods of the production process. Our goal is to offer a universal and straightforward methodology for simulating a production budget at any level of complexity by presenting it in a specific form. The calculation of such production schemes, in most enterprises, is currently done manually, which significantly limits the possibilities for optimization. This article proposes a model based on the Monte Carlo method to automate the budgeting process. The application of this model is described using an example of a typical meat processing enterprise. Approbation of the model showed its high applicability and the ability to transform the process of making management decisions and the potential to increase the profits of the enterprise, which is unattainable using other methods. As a result of the study, we present a methodology for modeling industrial production that can significantly speed up the formation and optimization of an enterprise’s budget. In our demonstration case, the profit increased by over 30 percentage points.
      Citation: Informatics
      PubDate: 2022-01-18
      DOI: 10.3390/informatics9010005
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 6: Transferrable Framework Based on Knowledge
           Graphs for Generating Explainable Results in Domain-Specific, Intelligent
           Information Retrieval

    • Authors: Hasan Abu-Rasheed, Christian Weber, Johannes Zenkert, Mareike Dornhöfer, Madjid Fathi
      First page: 6
      Abstract: In modern industrial systems, collected textual data accumulates over time, offering an important source of information for enhancing present and future industrial practices. Although many AI-based solutions have been developed in the literature for a domain-specific information retrieval (IR) from this data, the explainability of these systems was rarely investigated in such domain-specific environments. In addition to considering the domain requirements within an explainable intelligent IR, transferring the explainable IR algorithm to other domains remains an open-ended challenge. This is due to the high costs, which are associated with intensive customization and required knowledge modelling, when developing new explainable solutions for each industrial domain. In this article, we present a transferable framework for generating domain-specific explanations for intelligent IR systems. The aim of our work is to provide a comprehensive approach for constructing explainable IR and recommendation algorithms, which are capable of adopting to domain requirements and are usable in multiple domains at the same time. Our method utilizes knowledge graphs (KG) for modeling the domain knowledge. The KG provides a solid foundation for developing intelligent IR solutions. Utilizing the same KG, we develop graph-based components for generating textual and visual explanations of the retrieved information, taking into account the domain requirements and supporting the transferability to other domain-specific environments, through the structured approach. The use of the KG resulted in minimum-to-zero adjustments when creating explanations for multiple intelligent IR algorithms in multiple domains. We test our method within two different use cases, a semiconductor manufacturing centered use case and a job-to-applicant matching one. Our quantitative results show a high capability of our approach to generate high-level explanations for the end users. In addition, the developed explanation components were highly adaptable to both industrial domains without sacrificing the overall accuracy of the intelligent IR algorithm. Furthermore, a qualitative user-study was conducted. We recorded a high level of acceptance from the users, who reported an enhanced overall experience with the explainable IR system.
      Citation: Informatics
      PubDate: 2022-01-19
      DOI: 10.3390/informatics9010006
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 7: Acknowledgment to Reviewers of Informatics
           in 2021

    • Authors: Informatics Editorial Office Informatics Editorial Office
      First page: 7
      Abstract: Rigorous peer-reviews are the basis of high-quality academic publishing [...]
      Citation: Informatics
      PubDate: 2022-01-24
      DOI: 10.3390/informatics9010007
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 8: What Features of Ligands Are Relevant to the
           Opening of Cryptic Pockets in Drug Targets'

    • Authors: Zhonghua Xia, Pavel Karpov, Grzegorz Popowicz, Michael Sattler, Igor V. Tetko
      First page: 8
      Abstract: Small-molecule drug design aims to identify inhibitors that can specifically bind to a functionally important region on the target, i.e., an active site of an enzyme. Identification of potential binding pockets is typically based on static three-dimensional structures. However, small molecules may induce and select a dynamic binding pocket that is not visible in the apo protein, which presents a well-recognized challenge for structure-based drug discovery. Here, we assessed whether it is possible to identify features in molecules, which we refer to as inducers, that can induce the opening of cryptic pockets. The volume change between apo and bound protein conformations was used as a metric to differentiate chemical features in inducers vs. non-inducers. Based on the dataset of holo–apo pairs, classification models were built to determine an optimum threshold. The model analysis suggested that inducers preferred to be more hydrophobic and aromatic. The impact of sulfur was ambiguous, while phosphorus and halogen atoms were overrepresented in inducers. The fragment analysis showed that small changes in the structures of molecules can strongly affect the potential to induce a cryptic pocket. This analysis and developed model can be used to design inducers that can potentially open cryptic pockets for undruggable proteins.
      Citation: Informatics
      PubDate: 2022-01-25
      DOI: 10.3390/informatics9010008
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 9: Using the Unity Game Engine to Develop a 3D
           Simulated Ecological System Based on a Predator–Prey Model Extended
           by Gene Evolution

    • Authors: Attila Kiss, Gábor Pusztai
      First page: 9
      Abstract: In this paper, we present a novel implementation of an ecosystem simulation. In our previous work, we implemented a 3D environment based on a predator–prey model, but we found that in most cases, regardless of the choice of starting parameters, the simulation quickly led to extinctions. We wanted to achieve system stabilization, long-term operation, and better simulation of reality by incorporating genetic evolution. Therefore we applied the predator–prey model with an evolutional approach. Using the Unity game engine we created and managed a closed 3D ecosystem environment defined by an artificial or real uploaded map. We present some demonstrative runs while gathering data, observing interesting events (such as extinction, sustainability, and behavior of swarms), and analyzing possible effects on the initial parameters of the system. We found that incorporating genetic evolution into the simulation slightly stabilized the system, thus reducing the likelihood of extinction of different types of objects. The simulation of ecosystems and the analysis of the data generated during the simulations can also be a starting point for further research, especially in relation to sustainability. Our system is publicly available, so anyone can customize and upload their own parameters, maps, objects, and biological species, as well as inheritance and behavioral habits, so they can test their own hypotheses from the data generated during its operation. The goal of this article was not to create and validate a model but to create an IT tool for evolutionary researchers who want to test their own models and to present them, for example, as animated conference presentations. The use of 3D simulation is primarily useful for educational purposes, such as to engage students and to increase their interest in biology. Students can learn in a playful way while observing in the graphical scenery how the ecosystem behaves, how natural selection helps the adaptability and survival of species, and what effects overpopulation and competition can have.
      Citation: Informatics
      PubDate: 2022-01-26
      DOI: 10.3390/informatics9010009
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 10: Predictive Model for ICU Readmission Based
           on Discharge Summaries Using Machine Learning and Natural Language
           Processing

    • Authors: Negar Orangi-Fard, Alireza Akhbardeh, Hersh Sagreiya
      First page: 10
      Abstract: Predicting ICU readmission risk will help physicians make decisions regarding discharge. We used discharge summaries to predict ICU 30-day readmission risk using text mining and machine learning (ML) with data from the Medical Information Mart for Intensive Care III (MIMIC-III). We used Natural Language Processing (NLP) and the Bag-of-Words approach on discharge summaries to build a Document-Term-Matrix with 3000 features. We compared the performance of support vector machines with the radial basis function kernel (SVM-RBF), adaptive boosting (AdaBoost), quadratic discriminant analysis (QDA), least absolute shrinkage and selection operator (LASSO), and Ridge Regression. A total of 4000 patients were used for model training and 6000 were used for validation. Using the bag-of-words determined by NLP, the area under the receiver operating characteristic (AUROC) curve was 0.71, 0.68, 0.65, 0.69, and 0.65 correspondingly for SVM-RBF, AdaBoost, QDA, LASSO, and Ridge Regression. We then used the SVM-RBF model for feature selection by incrementally adding features to the model from 1 to 3000 bag-of-words. Through this exhaustive search approach, only 825 features (words) were dominant. Using those selected features, we trained and validated all ML models. The AUROC curve was 0.74, 0.69, 0.67, 0.70, and 0.71 respectively for SVM-RBF, AdaBoost, QDA, LASSO, and Ridge Regression. Overall, this technique could predict ICU readmission relatively well.
      Citation: Informatics
      PubDate: 2022-01-26
      DOI: 10.3390/informatics9010010
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 11: Modelling Service Quality of Internet
           Service Providers during COVID-19: The Customer Perspective Based on
           Twitter Dataset

    • Authors: Bagus Setya Rintyarna, Heri Kuswanto, Riyanarto Sarno, Emy Kholifah Rachmaningsih, Fika Hastarita Rachman, Wiwik Suharso, Triawan Adi Cahyanto
      First page: 11
      Abstract: Internet service providers (ISPs) conduct their business by providing Internet access features to their customers. The COVID-19 pandemic has shifted most activity being performed remotely using an Internet connection. As a result, the demand for Internet services increased by 50%. This significant rise in the appeal of Internet services needs to be overtaken by a notable increase in the service quality provided by ISPs. Service quality plays a great role for enterprises, including ISPs, in retaining consumer loyalty. Thus, modelling ISPs’ service quality is of great importance. Since a common technique to reveal service quality is a timely and costly pencil survey-based method, this work proposes a framework based on the Sentiment Analysis (SA) of the Twitter dataset to model service quality. The SA involves the majority voting of three machine learning algorithms namely Naïve Bayes, Multinomial Naïve Bayes and Bernoulli Naïve Bayes. Making use of Thaicon’s service quality metrics, this work proposes a formula to generate a rating of service quality accordingly. For the case studies, we examined two ISPs in Indonesia, i.e., By.U and MPWR. The framework successfully extracted the service quality rate of both ISPs, revealing that By.U is better in terms of service quality, as indicated by a service quality rate of 0.71. Meanwhile, MPWR outperforms By.U in terms of customer service.
      Citation: Informatics
      PubDate: 2022-01-29
      DOI: 10.3390/informatics9010011
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 12: E-MDAV: A Framework for Developing
           Data-Intensive Web Applications

    • Authors: Paolo Bocciarelli, Andrea D’Ambrogio, Tommaso Panetti, Andrea Giglio
      First page: 12
      Abstract: The ever-increasing adoption of innovative technologies, such as big data and cloud computing, provides significant opportunities for organizations operating in the IT domain, but also introduces considerable challenges. Such innovations call for development processes that better align with stakeholders needs and expectations. In this respect, this paper introduces a development framework based on the OMG’s Model Driven Architecture (MDA) that aims to support the development lifecycle of data-intensive web applications. The proposed framework, named E-MDAV (Extended MDA-VIEW), defines a methodology that exploits a chain of model transformations to effectively cope with both forward- and reverse-engineering aspects. In addition, E-MDAV includes the specification of a reference architecture for driving the implementation of a tool that supports the various professional roles involved in the development and maintenance of data-intensive web applications. In order to evaluate the effectiveness of the proposed E-MDAV framework, a tool prototype has been developed. E-MDAV has then been applied to two different application scenarios and the obtained results have been compared with historical data related to the implementation of similar development projects, in order to measure and discuss the benefits of the proposed approach.
      Citation: Informatics
      PubDate: 2022-02-12
      DOI: 10.3390/informatics9010012
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 13: Systematic Review of Multimodal
           Human–Computer Interaction

    • Authors: Jose Daniel Azofeifa, Julieta Noguez, Sergio Ruiz, José Martín Molina-Espinosa, Alejandra J. Magana, Bedrich Benes
      First page: 13
      Abstract: This document presents a systematic review of Multimodal Human–Computer Interaction. It shows how different types of interaction technologies (virtual reality (VR) and augmented reality, force and vibration feedback devices (haptics), and tracking) are used in different domains (concepts, medicine, physics, human factors/user experience design, transportation, cultural heritage, and industry). A systematic literature search was conducted identifying 406 articles initially. From these articles, we selected 112 research works that we consider most relevant for the content of this article. The articles were analyzed in-depth from the viewpoint of temporal patterns, frequency of usage in types of technology in different domains, and cluster analysis. The analysis allowed us to answer relevant questions in searching for the next steps in work related to multimodal HCI. We looked at the typical technology type, how the technology type and frequency have changed in time over each domain, and how papers are grouped across metrics given their similarities. This analysis determined that VR and haptics are the most widely used in all domains. While VR is the most used, haptic interaction is presented in an increasing number of applications, suggesting future work on applications that configure VR and haptic together.
      Citation: Informatics
      PubDate: 2022-02-15
      DOI: 10.3390/informatics9010013
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 14: Human-Computer Interaction in Digital
           Mental Health

    • Authors: Luke Balcombe, Diego De Leo
      First page: 14
      Abstract: Human-computer interaction (HCI) has contributed to the design and development of some efficient, user-friendly, cost-effective, and adaptable digital mental health solutions. But HCI has not been well-combined into technological developments resulting in quality and safety concerns. Digital platforms and artificial intelligence (AI) have a good potential to improve prediction, identification, coordination, and treatment by mental health care and suicide prevention services. AI is driving web-based and smartphone apps; mostly it is used for self-help and guided cognitive behavioral therapy (CBT) for anxiety and depression. Interactive AI may help real-time screening and treatment in outdated, strained or lacking mental healthcare systems. The barriers for using AI in mental healthcare include accessibility, efficacy, reliability, usability, safety, security, ethics, suitable education and training, and socio-cultural adaptability. Apps, real-time machine learning algorithms, immersive technologies, and digital phenotyping are notable prospects. Generally, there is a need for faster and better human factors in combination with machine interaction and automation, higher levels of effectiveness evaluation and the application of blended, hybrid or stepped care in an adjunct approach. HCI modeling may assist in the design and development of usable applications, and to effectively recognize, acknowledge, and address the inequities of mental health care and suicide prevention and assist in the digital therapeutic alliance.
      Citation: Informatics
      PubDate: 2022-02-22
      DOI: 10.3390/informatics9010014
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 15: Raising Awareness of Smartphone Overuse
           among University Students: A Persuasive Systems Approach

    • Authors: Carlos Abreu, Pedro F. Campos
      First page: 15
      Abstract: Smartphone overuse can lead to a series of physical, mental and social disturbances. This problem is more prevalent among young adults as compared to other demographic groups. Additionally, university students are already undergoing high cognitive loads and stress conditions; therefore, they are more susceptible to smartphone addiction and its derived problems. In this paper, we present a novel approach where a conversational mobile agent uses persuasive messages exploring the reflective mind to raise users’ awareness of their usage and consequently induce reduction behaviors. We conducted a four-week study with 16 university students undergoing stressful conditions—a global lockdown during their semester—and evaluated the impact of the agent on smartphone usage reduction and the perceived usefulness of such an approach. Results show the efficacy of self-tracking in the behavior change process: 81% of the users reduced their usage time, and all of them mentioned that having a conversational agent alerting them about their usage was useful. Before this experiment, only 68% of them considered such an approach could be useful. In conclusion, users deemed it essential to have an engaging conversational agent on their smartphones, in terms of helping them become more aware of usage times.
      Citation: Informatics
      PubDate: 2022-02-23
      DOI: 10.3390/informatics9010015
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 16: BYOD Security: A Study of Human Dimensions

    • Authors: Kathleen Downer, Maumita Bhattacharya
      First page: 16
      Abstract: The prevalence and maturity of Bring Your Own Device (BYOD) security along with subsequent frameworks and security mechanisms in Australian organisations is a growing phenomenon somewhat similar to other developed nations. During the COVID-19 pandemic, even organisations that were previously reluctant to embrace BYOD have been forced to accept it to facilitate remote work. The aim of this paper is to discover, through a study conducted using a survey questionnaire instrument, how employees practice and perceive the BYOD security mechanisms deployed by Australian businesses which can help guide the development of future BYOD security frameworks. Three research questions are answered by this study: What levels of awareness do Australian businesses have for BYOD security aspects' How are employees currently responding to the security mechanisms applied by their organisations for mobile devices' What are the potential weaknesses in businesses’ IT networks that have a direct effect on BYOD security' Overall, the aim of this research is to illuminate the findings of these research objectives so that they can be used as a basis for building new and strengthening existing BYOD security frameworks in order to enhance their effectiveness against an ever-growing list of attacks and threats targeting mobile devices in a virtually driven work force.
      Citation: Informatics
      PubDate: 2022-02-23
      DOI: 10.3390/informatics9010016
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 17: Visual Analytics for Predicting Disease
           Outcomes Using Laboratory Test Results

    • Authors: Neda Rostamzadeh, Sheikh S. Abdullah, Kamran Sedig, Amit X. Garg, Eric McArthur
      First page: 17
      Abstract: Laboratory tests play an essential role in the early and accurate diagnosis of diseases. In this paper, we propose SUNRISE, a visual analytics system that allows the user to interactively explore the relationships between laboratory test results and a disease outcome. SUNRISE integrates frequent itemset mining (i.e., Eclat algorithm) with extreme gradient boosting (XGBoost) to develop more specialized and accurate prediction models. It also includes interactive visualizations to allow the user to interact with the model and track the decision process. SUNRISE helps the user probe the prediction model by generating input examples and observing how the model responds. Furthermore, it improves the user’s confidence in the generated predictions and provides them the means to validate the model’s response by illustrating the underlying working mechanism of the prediction models through visualization representations. SUNRISE offers a balanced distribution of processing load through the seamless integration of analytical methods with interactive visual representations to support the user’s cognitive tasks. We demonstrate the usefulness of SUNRISE through a usage scenario of exploring the association between laboratory test results and acute kidney injury, using large provincial healthcare databases from Ontario, Canada.
      Citation: Informatics
      PubDate: 2022-02-25
      DOI: 10.3390/informatics9010017
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 18: Automatic Ethnicity Classification from
           Middle Part of the Face Using Convolutional Neural Networks

    • Authors: David Belcar, Petra Grd, Igor Tomičić
      First page: 18
      Abstract: In the field of face biometrics, finding the identity of a person in an image is most researched, but there are other, soft biometric information that are equally as important, such as age, gender, ethnicity or emotion. Nowadays, ethnicity classification has a wide application area and is a prolific area of research. This paper gives an overview of recent advances in ethnicity classification with focus on convolutional neural networks (CNNs) and proposes a new ethnicity classification method using only the middle part of the face and CNN. The paper also compares the differences in results of CNN with and without plotted landmarks. The proposed model was tested using holdout testing method on UTKFace dataset and FairFace dataset. The accuracy of the model was 80.34% for classification into five classes and 61.74% for classification into seven classes, which is slightly better than state-of-the-art, but it is also important to note that results in this paper are obtained by using only the middle part of the face which reduces the time and resources necessary.
      Citation: Informatics
      PubDate: 2022-02-25
      DOI: 10.3390/informatics9010018
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 19: The Future of Accounting: How Will Digital
           Transformation Impact the Sector'

    • Authors: Maria José Angélico Gonçalves, Amélia Cristina Ferreira da Silva, Carina Gonçalves Ferreira
      First page: 19
      Abstract: The growing dissemination of digital technologies has had an incomparable impact on many dimensions of today’s civilisation. Digital transformation (DT) redefined the industrial structures and reinvented business models. Hence, in the face of Industry 4.0, financial and accounting services face new threats, challenges, and opportunities. How do the business players in the accounting sector perceive this phenomenon' This paper aims to answer this question by following a qualitative and exploratory approach, applied to three case studies, using semi-structured interviews. The study shows that although digital transformation in Portuguese small and medium-sized accounting service enterprises is just starting, Industry 4.0 technologies, optical character recognition (OCR), artificial intelligence (AI), robotics and enterprise resource planning (ERP) in the cloud were the technologies singled out by respondents. Resistance to change, organisational culture and price seem to be the main barriers to DT in accounting. This paper contributes to a better understanding of the role of accounting and accountants in organisations and society in the context of the digital era. Moreover, it provides practical insights into the potential relationship between technological (specifically digital) development and labour market dynamics for accounting professionals.
      Citation: Informatics
      PubDate: 2022-02-27
      DOI: 10.3390/informatics9010019
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 20: Adoption of Large-Scale Scrum Practices
           through the Use of Management 3.0

    • Authors: Fernando Almeida, Eduardo Espinheira
      First page: 20
      Abstract: Software engineering companies have progressively incorporated agile project management methodologies. Initially, this migration occurred mostly in the context of startups, but in recent years it has also sparked interest from other companies with larger and more geographically dispersed teams. One of the frameworks used for large-scale agile implementation is the LeSS framework. This study seeks to explore how Management 3.0 principles can be applied in the context of the ten practices proposed in the LeSS framework. To this end, a qualitative research methodology based on four case studies is used to identify and explore the role of Management 3.0 in software management and development processes that adopt this agile paradigm. The findings show that the principles of Management 3.0 are relevant to the implementation of the LeSS framework practices, especially in fostering team values and personal values; however, distinct principles between the two paradigms are also identified, namely the greater rigidity of processes advocated in the LeSS framework and a greater focus on process automation.
      Citation: Informatics
      PubDate: 2022-03-04
      DOI: 10.3390/informatics9010020
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 21: Identification of Bots and Cyborgs in the
           #FeesMustFall Campaign

    • Authors: Yaseen Khan, Surendra Thakur, Obiseye Obiyemi, Emmanuel Adetiba
      First page: 21
      Abstract: Bots (social robots) are computer programs that replicate human behavior in online social networks. They are either fully automated or semi-automated, and their use makes online activism vulnerable to manipulation. This study examines the existence of social robots in the #FeesMustFall movement by conducting a scientific investigation into whether social bots were present in the form of Twitter bots and cyborgs. A total of 576,823 tweets posted between 15 October 2015 and 10 April 2017 were cleaned, with 490,449 tweets analyzed for 90,783 unique persons. Three separate approaches were used to screen out suspicious bot and cyborg activity, supplemented by the DeBot team’s methodology. User 1 and User 2, two of the 90,783 individuals, were recognized as bots or cyborgs in the study and contributed 22,413 (4.57 percent) of the 490,449 tweets. This confirms the existence of bots throughout the campaign, which aided in the #FeesMustFall’s amplification on Twitter, complicating sentiment analysis and invariably making it the most popular and lengthiest hashtag campaign in Africa, particularly at the time of data collection.
      Citation: Informatics
      PubDate: 2022-03-04
      DOI: 10.3390/informatics9010021
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 22: Social Media and Social Support: A
           Framework for Patient Satisfaction in Healthcare

    • Authors: Md Irfanuzzaman Khan, Zoeb Ur Rahman, M. Abu Saleh, Saeed Uz Zaman Khan
      First page: 22
      Abstract: Social media has been a powerful source of social support for health consumers. In the healthcare sector, social media has thrived, building on various dynamic platforms supporting the connection between social relationships, health, and wellbeing. While prior research has shown that social support exerts a positive impact on health outcomes, there is scant literature examining the implications of social support for patient satisfaction, which suggests that there is a profound gap in the extant literature. The objective of this study is to develop and test a theoretical model for understanding the relationship between different dimensions of social support and patient empowerment. The study further investigates the debated relationship between patient empowerment and patient satisfaction. The measurement model indicated an acceptable fit (χ2 = 260.226; df, 107, χ2/df = 2.432, RMSEA = 0.07, GFI = 0.90, IFI = 0.95, TLI = 0.94, and CFI = 0.95). Findings indicate that emotional support (p < 0.001), information support (p < 0.05), and network support (p < 0.001) positively influence the notion of patient empowerment. In turn, patient empowerment positively influences patient satisfaction (p < 0.001). The proposed framework contributes to the health communication literature by introducing a novel framework for patient satisfaction in the social media context, which provides important inputs for healthcare service providers in developing patient empowerment strategies.
      Citation: Informatics
      PubDate: 2022-03-04
      DOI: 10.3390/informatics9010022
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 23: Identifying Faked Responses in
           Questionnaires with Self-Attention-Based Autoencoders

    • Authors: Alberto Purpura, Giuseppe Sartori, Dora Giorgianni, Graziella Orrú, Gian Antonio Susto
      First page: 23
      Abstract: Deception, also known as faking, is a critical issue when collecting data using questionnaires. As shown by previous studies, people have the tendency to fake their answers whenever they gain an advantage from doing so, e.g., when taking a test for a job application. Current methods identify the general attitude of faking but fail to identify faking patterns and the exact responses affected. Moreover, these strategies often require extensive data collection of honest responses and faking patterns related to the specific questionnaire use case, e.g., the position that people are applying to. In this work, we propose a self-attention-based autoencoder (SABA) model that can spot faked responses in a questionnaire solely relying on a set of honest answers that are not necessarily related to its final use case. We collect data relative to a popular personality test (the 10-item Big Five test) in three different use cases, i.e., to obtain: (i) child custody in court, (ii) a position as a salesperson, and (iii) a role in a humanitarian organization. The proposed model outperforms by a sizeable margin in terms of F1 score three competitive baselines, i.e., an autoencoder based only on feedforward layers, a distribution model, and a k-nearest-neighbor-based model.
      Citation: Informatics
      PubDate: 2022-03-06
      DOI: 10.3390/informatics9010023
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 24: Modeling Subcutaneous Microchip Implant
           Acceptance in the General Population: A Cross-Sectional Survey about
           Concerns and Expectations

    • Authors: Shekufeh Shafeie, Beenish Moalla Chaudhry, Mona Mohamed
      First page: 24
      Abstract: Despite the numerous advantages of microchip implants, their adoption remains low in the public sector. We conducted a cross-sectional survey to identify concerns and expectations about microchip implants among potential users. A total of 179 United States adults aged 18–83 years responded to two qualitative questions that were then analyzed using the thematic analysis technique. The identified codes were first categorized and then clustered to generate themes for both concerns and expectations. The prevalence of each theme was calculated across various demographic factors. Concerns were related to data protection, health risks, knowledge, negative affect, ease of use, metaphysical dilemmas, monetary issues, and negative social impact. Expectations included medical and non-medical uses, dismissal of microchips, technical advances, human enhancement, regulations, and affordability. The prevalence of concerns and benefits differed by immigration status and medical conditions. Informed by our findings, we present a modification to the Technology Acceptance Model for predicting public’s behavioral intention to use subcutaneous microchips. We discuss the five newly proposed determinants and seven predictor variables of this model by surveying the literature.
      Citation: Informatics
      PubDate: 2022-03-07
      DOI: 10.3390/informatics9010024
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 25: “Saving Precious
           Seconds”—A Novel Approach to Implementing a Low-Cost
           Earthquake Early Warning System with Node-Level Detection and Alert
           Generation

    • Authors: Raj Prasanna, Chanthujan Chandrakumar, Rasika Nandana, Caroline Holden, Amal Punchihewa, Julia S. Becker, Seokho Jeong, Nandika Liyanage, Danuka Ravishan, Rangana Sampath, Marion Lara Tan
      First page: 25
      Abstract: This paper presents findings from ongoing research that explores the ability to use Micro-Electromechanical Systems (MEMS)-based technologies and various digital communication protocols for earthquake early warning (EEW). The paper proposes a step-by-step guide to developing a unique EEW network architecture driven by a Software-Defined Wide Area Network (SD-WAN)-based hole-punching technology consisting of MEMS-based, low-cost accelerometers hosted by the general public. In contrast with most centralised cloud-based approaches, a node-level decentralised data-processing is used to generate warnings with the support of a modified Propagation of Local Undamped Motion (PLUM)-based EEW algorithm. With several hypothetical earthquake scenarios, experiments were conducted to evaluate the system latencies of the proposed decentralised EEW architecture and its performance was compared with traditional centralised EEW architecture. The results from sixty simulations show that the SD-WAN-based hole-punching architecture supported by the Transmission Control Protocol (TCP) creates the optimum alerting conditions. Furthermore, the results provide clear evidence to show that the decentralised EEW system architecture can outperform the centralised EEW architecture and can save valuable seconds when generating EEW, leading to a longer warning time for the end-user. This paper contributes to the EEW literature by proposing a novel EEW network architecture.
      Citation: Informatics
      PubDate: 2022-03-08
      DOI: 10.3390/informatics9010025
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 26: Where Is My Mind (Looking at)' A Study
           of the EEG–Visual Attention Relationship

    • Authors: Victor Delvigne, Noé Tits, Luca La Fisca, Nathan Hubens, Antoine Maiorca, Hazem Wannous, Thierry Dutoit, Jean-Philippe Vandeborre
      First page: 26
      Abstract: Visual attention estimation is an active field of research at the crossroads of different disciplines: computer vision, deep learning, and medicine. One of the most common approaches to estimate a saliency map representing attention is based on the observed images. In this paper, we show that visual attention can be retrieved from EEG acquisition. The results are comparable to traditional predictions from observed images, which is of great interest. Image-based saliency estimation being participant independent, the estimation from EEG could take into account the subject specificity. For this purpose, a set of signals has been recorded, and different models have been developed to study the relationship between visual attention and brain activity. The results are encouraging and comparable with other approaches estimating attention with other modalities. Being able to predict a visual saliency map from EEG could help in research studying the relationship between brain activity and visual attention. It could also help in various applications: vigilance assessment during driving, neuromarketing, and also in the help for the diagnosis and treatment of visual attention-related diseases. For the sake of reproducibility, the codes and dataset considered in this paper have been made publicly available to promote research in the field.
      Citation: Informatics
      PubDate: 2022-03-09
      DOI: 10.3390/informatics9010026
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 27: UTAUT Model for Smart City Concept
           Implementation: Use of Web Applications by Residents for Everyday
           Operations

    • Authors: Yelena Popova, Diana Zagulova
      First page: 27
      Abstract: The article considers the attitude of smart city residents towards the use of web applications in everyday life. It is very important for many stakeholders since it affects the involvement of people in all processes of urban life and contributes to the implementation of the smart city concept. The goal of the research is to study the factors influencing the intention and use of web applications in a smart city. Based on the results of surveying the residents of Riga, the UTA UT model was applied with the employment of partial least squares structural equation modeling in Smart PLS. The traditional constructs of the UTAUT model—Performance Expectancy (PE), Effort Expectancy (EE), Social Influence (SI), Facilitating Conditions (FC), as well as Attitude towards the use of Applications (ATA)—had a direct or indirect positive relationship with the intention to use technologies (Behavioral Intention: BI) and/or with usage of these technologies (Use Behavior: UB). Anxiety indirectly via ATA showed a negative effect on UB. The influence of Age, Gender and Education on BI and UB as moderators was also investigated. Only Age as a moderator negatively affected the relationship between FC and PE and SI. The results showed that in order to involve in full scope of the population of Riga in the use of communication technologies and the implementation of the smart city concept, it is necessary to create the appropriate conditions for residents, in particular by teaching people on a permanent basis. Some of the obtained results were different from similar studies’ results, which emphasizes that city authorities and other stakeholders should make decisions on the involvement of citizens in smart process based on the local peculiarities, which supports the slogan of smart cities—think globally, act locally.
      Citation: Informatics
      PubDate: 2022-03-10
      DOI: 10.3390/informatics9010027
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 28: Factors Affecting Reputational Damage to
           Organisations Due to Cyberattacks

    • Authors: Srinath Perera, Xiaohua Jin, Alana Maurushat, De-Graft Joe Opoku
      First page: 28
      Abstract: The COVID-19 pandemic has brought massive online activities and increased cybersecurity incidents and cybercrime. As a result of this, the cyber reputation of organisations has also received increased scrutiny and global attention. Due to increased cybercrime, reputation displaying a more important role within risk management frameworks both within public and private institutions is vital. This study identifies key factors in determining reputational damage to public and private sector institutions through cyberattacks. Researchers conducted an extensive review of the literature, which addresses factors relating to risk management of reputation post-cyber breach. The study identified 42 potential factors, which were then classified using the STAR model. This model is an organisational design framework and was suitable due to its alignment with organisations. A qualitative study using semi-structured and structured questions was conducted with purposively selected cybersecurity experts in both public and private sector institutions. Data obtained from the expert forum were analysed using thematic analysis, which revealed that a commonly accepted definition for cyber reputation was lacking despite the growing use of the term “online reputation”. In addition, the structured questions data were analysed using relative importance index rankings. The analysis results revealed significant factors in determining reputational damage due to cyberattacks, as well as highlighting reputation factor discrepancies between private and public institutions. Theoretically, this study contributes to the body of knowledge relating to cybersecurity of organisations. Practically, this research is expected to aid organisations to properly position themselves to meet cyber incidents and become more competitive in the post-COVID-19 era.
      Citation: Informatics
      PubDate: 2022-03-18
      DOI: 10.3390/informatics9010028
      Issue No: Vol. 9, No. 1 (2022)
       
  • Informatics, Vol. 9, Pages 29: Benchmarking Deep Learning Methods for
           Behaviour-Based Network Intrusion Detection

    • Authors: Mário Antunes, Luís Oliveira, Afonso Seguro, João Veríssimo, Ruben Salgado, Tiago Murteira
      First page: 29
      Abstract: Network security encloses a wide set of technologies dealing with intrusions detection. Despite the massive adoption of signature-based network intrusion detection systems (IDSs), they fail in detecting zero-day attacks and previously unseen vulnerabilities exploits. Behaviour-based network IDSs have been seen as a way to overcome signature-based IDS flaws, namely through the implementation of machine-learning-based methods, to tolerate new forms of normal network behaviour, and to identify yet unknown malicious activities. A wide set of machine learning methods has been applied to implement behaviour-based IDSs with promising results on detecting new forms of intrusions and attacks. Innovative machine learning techniques have emerged, namely deep-learning-based techniques, to process unstructured data, speed up the classification process, and improve the overall performance obtained by behaviour-based network intrusion detection systems. The use of realistic datasets of normal and malicious networking activities is crucial to benchmark machine learning models, as they should represent real-world networking scenarios and be based on realistic computers network activity. This paper aims to evaluate CSE-CIC-IDS2018 dataset and benchmark a set of deep-learning-based methods, namely convolutional neural networks (CNN) and long short-term memory (LSTM). Autoencoder and principal component analysis (PCA) methods were also applied to evaluate features reduction in the original dataset and its implications in the overall detection performance. The results revealed the appropriateness of using the CSE-CIC-IDS2018 dataset to benchmark supervised deep learning models. It was also possible to evaluate the robustness of using CNN and LSTM methods to detect unseen normal activity and variations of previously trained attacks. The results reveal that feature reduction methods decreased the processing time without loss of accuracy in the overall detection performance.
      Citation: Informatics
      PubDate: 2022-03-20
      DOI: 10.3390/informatics9010029
      Issue No: Vol. 9, No. 1 (2022)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 18.207.133.27
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-