Atnaujinkite slapukų nuostatas

Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 2326, 2023, Proceedings 1st ed. 2023 [Minkštas viršelis]

Edited by , Edited by , Edited by , Edited by
  • Formatas: Paperback / softback, 685 pages, aukštis x plotis: 235x155 mm, weight: 1074 g, 114 Illustrations, color; 60 Illustrations, black and white; XXVI, 685 p. 174 illus., 114 illus. in color., 1 Paperback / softback
  • Serija: Lecture Notes in Business Information Processing 476
  • Išleidimo metai: 23-May-2023
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 303133079X
  • ISBN-13: 9783031330797
  • Formatas: Paperback / softback, 685 pages, aukštis x plotis: 235x155 mm, weight: 1074 g, 114 Illustrations, color; 60 Illustrations, black and white; XXVI, 685 p. 174 illus., 114 illus. in color., 1 Paperback / softback
  • Serija: Lecture Notes in Business Information Processing 476
  • Išleidimo metai: 23-May-2023
  • Leidėjas: Springer International Publishing AG
  • ISBN-10: 303133079X
  • ISBN-13: 9783031330797
This book constitutes the proceedings of the 17th International Conference on Research Challenges in Information Sciences, RCIS 2023, which took place in Corfu, Greece, during May 2326, 2023. It focused on the special theme "Information Science and the Connected World".The scope of RCIS is summarized by the thematic areas of information systems and their engineering; user-oriented approaches; data and information management; business process management; domain-specific information systems engineering; data science; information infrastructures, and reflective research and practice.





The 28 full papers presented in this volume were carefully reviewed and selected from a total of 87 submissions. The book also includes 15 Forum papers and 6 Doctoral Consortium papers. The contributions were organized in topical sections named: Requirements; conceptual modeling and ontologies; machine learning and analytics; conceptual modeling and semantic networks; business process design and computing in the continuum; requirements and evaluation; monitoring and recommending; business process analysis and improvement; user interface and experience; forum papers; doctoral consortium papers. Two-page abstracts of the tutorials can be found in the back matter of the volume.
Requirements.- Goal Modelling: Design and Manufacturing in Cloud
Migration High-Level Requirements.- Idea Browsing on Digital Participation
Platforms: A Mixed-methods Requirements Study.- Conceptual modeling and
ontologies.- What Do Users Think about Abstractions of Ontology-Driven
Conceptual Models.- On the Semantics of Risk Propagation.- The omnipresent
role of technology in social-ecological systems: ontological discussion and
updated integrated framework.- Machine Learning and Analytics.- Detection of
fishing activities from vessel trajectories.- Framework for Blockchain Data
Analysis.- Reinforcement learning for scriptless testing: An empirical
investigation of reward functions.- Conceptual modeling and semantic
networks.- DBSpark: A system for natural language to SPARQL translation.- An
Automated Patterns-based Model-to-Model Mapping and Transformation System for
Labeled Property Graphs.- Improving Conceptual Domain Characterization in
Ontology Networks.- Business Process Design and Computing in the Continuum.-
Digital Technology-Driven Business Process Redesign: A Classification
Framework.- Supporting the Implementation of Digital Twins for IoT-Enhanced
BPs.- Context-Aware Digital Twins to Support Software Management at the
Edge.- Adoption of Virtual Agents in Healthcare E-commerce: a Perceived Value
Perspective.- Requirements and Evaluation.- Addressing Trust Issues in
Supply-Chain Management Systems through Blockchain Software Patterns.-
Evaluating Process Effciency with Data Envelopment Analysis: a Case in the
Automotive Industry.- A Model of Qualitative Factors in Forensic-Ready
Software Systems.- Monitoring and recommending.- Monitoring object-centric
Business Processes: An Empirical Study.- A Peekinto the Working Day:
Comparing Techniques for Recording Employee Behaviour.- Context-aware
recommender systems: aggregation-based dimensionality reduction.- Business
processes analysis and improvement Discovery of Improvement Opportunities in
Knock-out Checks of Business Processes.- Persuasive Visual Presentation of
Prescriptive Business Processes.- TraVaG: Differentially Private Trace
Variant Generation Using GANs.- User interface and experience.- When
Dashboards Content Becomes a Barrier - Exploring the Effects of Cognitive
Overloads on BI Adoption.- The effect of visual information complexity on
urban mobility intention and behavior.- Interoperability of Open Science
Metadata: what about the reality.- Forum papers. -Online-Notes System:
Real-time speech recognition and translation of lectures.- Temporal relation
extraction from clinical texts using knowledge graphs.-  Domain TILEs: Test
Informed Learning with Examples from the Testing Domain.- Using GUI change
detection for delta testing.- Enterprise Modeling for Machine Learning:
Case-based Analysis and Initial Framework Proposal.- Towards Creating a
Secure Framework for Building Mirror World Applications.- Towards a Secure
and Privacy compliant Framework for EducationalData Mining.- Internet of
Cloud (IoC): The need of raising privacy and security awareness.- Comparative
study of unsupervised keyword extraction methods for job recommendation in an
industrial environment.- A Meta-model for Digital Business Ecosystem Design.-
Students in Team-Based Software Development Projects: An Exploratory Study.-
Ontology of Product Provenance for Value Networks.- A Data Value Matrix:
Linking FAIR Data with Business Models.- An Information Privacy Competency
Model for Online Consumers.- DECENT: A Domain Specific Language to Design
Governance Decisions.- Doctoral Consortium papers.- Business User-oriented
Recommender System of Data.- Secure infrastructure for cyber-physical
ranges.- Guidelines for Developers and Recommendations for Users to Mitigate
Phishing Attacks: An Interdisciplinary Research Approach.- Leveraging
Exogeneous Data for the Predictive Monitoring of IT Service Management
Processes.- Predicting privacy decisions in mobile applications and raising
users privacy awareness.- Information overload: Coping mechanisms and tools
impact.