So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee
{"title":"Machine Learning-Based Cooperative Clustering for Detecting and Mitigating Jamming Attacks in beyond 5G Networks","authors":"So-Eun Jeon, Sun-Jin Lee, Yu-Rim Lee, Heejung Yu, Il-Gu Lee","doi":"10.1007/s10796-024-10534-6","DOIUrl":"https://doi.org/10.1007/s10796-024-10534-6","url":null,"abstract":"<p>As the frequency of jamming attacks on wireless networks has increased, conventional local jamming detection methods cannot counter advanced jamming attacks. To maximize the jammer detection performance of machine learning (ML)-based detection methods, a global model that reflects the local detection results of each local node is necessary. This study proposes an ML-based cooperative clustering (MLCC) technique aimed at effectively detecting and countering jamming in beyond-5G networks that utilize smart repeaters. The MLCC algorithm optimizes the detection rate by creating and updating a global ML model based on the jammer detection results determined by each local node. The network performance is optimized through load balancing among the smart repeaters and access points, and the best path is selected to avoid jammers. The experimental results demonstrate that the MLCC improves the detection rate and throughput by up to 5.21% and 26.35%, respectively, while reducing the energy consumption and latency by up to 76.68% and 7.14%, respectively.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"35 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142142472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leveraging Action Knowledge from Product Reviews to Enhance Human-Centered Recommender Systems: A Knowledge Graph-Based Framework","authors":"Fouad Zablith","doi":"10.1007/s10796-024-10529-3","DOIUrl":"https://doi.org/10.1007/s10796-024-10529-3","url":null,"abstract":"<p>Actions that people aim to do are considered one of the main drivers behind purchase decisions and uncovering people’s needs in a human-centered manner. Such actions are often expressed by buyers in product reviews. However, most existing recommender system approaches still lack incorporating buyer-product action knowledge in the recommendation process. This limitation increases the gap between buyers’ needs and the recommended products. This research proposes a knowledge graph-based framework to represent buyers’ action knowledge from product reviews and integrate it in recommender systems to provide more human-centered and explainable recommendations. The framework is validated through a set of prototypes, which demonstrate the feasibility of buyers expressing their needs in the form of actions and recommending products accordingly. An initial evaluation revealed a promising 75% System Usability Scale score, with interview-based feedback that shed light on the capabilities of the proposed approach in supporting buyers in their online product selection experience.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"571 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142123535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection or Cynicism? Dual Strategies for Coping with Privacy Threats","authors":"Lu Yu, Li He, Jian Du, Xiaobo Wu","doi":"10.1007/s10796-024-10531-9","DOIUrl":"https://doi.org/10.1007/s10796-024-10531-9","url":null,"abstract":"<p>Dealing with privacy threats and adopting appropriate strategies to manage personal information have become crucial challenges for internet users. While adaptive problem-focused coping (APFC) has been extensively discussed in the literature on information privacy, little is known about maladaptive emotion-focused coping (MEFC). This paper proposes that individuals employ privacy protection motivation (a form of APFC) and privacy cynicism (a form of MEFC), according to their threat and coping appraisals. These two coping strategies will then influence their behaviour regarding the disclosure of personal information on the internet. Offering an empirical analysis of 346 samples of survey data from China, this paper reveals that privacy cynicism, which is mainly affected by deep concerns about privacy and high self-efficacy but low response efficacy, and inconsistency between users’ motivations for protecting their privacy and their actual disclosure behavior are the reasons for the privacy paradox. This study provides crucial theoretical support and practical guidance for the privacy management of internet users’ information.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"7 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142101414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Class Imbalance Problem: A Wrapper-Based Approach using Under-Sampling with Ensemble Learning","authors":"Riyaz Sikora, Yoon Sang Lee","doi":"10.1007/s10796-024-10533-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10533-7","url":null,"abstract":"<p>Imbalanced data sets are a growing problem in data mining and business analytics. However, the ability of machine learning algorithms to predict the minority class deteriorates in the presence of class imbalance. Although there have been many approaches that have been studied in literature to tackle the imbalance problem, most of these approaches have been met with limited success. In this study, we propose three methods based on a wrapper approach that combine the use of under-sampling with ensemble learning to improve the performance of standard data mining algorithms. We test our ensemble methods on 10 data sets collected from the UCI repository with an imbalance ratio of at least 70%. We compare their performance with two other traditional techniques for dealing with the imbalance problem and show significant improvement in the recall, AUROC, and the average of precision and recall.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142090181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry
{"title":"Understanding Artificial Intelligence Diffusion through an AI Capability Maturity Model","authors":"Hans Fredrik Hansen, Elise Lillesund, Patrick Mikalef, Νajwa Altwaijry","doi":"10.1007/s10796-024-10528-4","DOIUrl":"https://doi.org/10.1007/s10796-024-10528-4","url":null,"abstract":"<p>The recent advancements in the field of Artificial Intelligence (AI) have sparked a renewed interest in how organizations can potentially leverage and gain value from these technologies. Despite the considerable hype around AI, recent reports indicate that a very small number of organizations have managed to successfully implement these technologies in their operations. While many early studies and consultancy-based reports point to factors that enable adoption, there is a growing understanding that adoption of AI is rather more of a process of maturity. Building on this more nuanced approach of adoption, this study focuses on the diffusion of <i>AI through a maturity lens</i>. To explore this process, we conducted a two-phased qualitative case study to explore how organizations diffuse AI in their operations. During the first phase, we conducted interviews with AI experts to gain insight into the process of diffusion as well as some of the key challenges faced by organizations. During the second phase, we collected data from three organizations that were at different stages of AI diffusion. Based on the synthesis of the results and a cross-case analysis, we developed a capability maturity model for AI diffusion (AICMM), which was then validated and tested. The results highlight that AI diffusion introduces some common challenges along the path of diffusion as well as some ways to mitigate them. From a research perspective, our results show that there are some core tasks associated with early AI diffusion that gradually evolve as the maturity of projects grows. For professionals, we present tools for identifying the current state of maturity and providing some practical guidelines on how to further implement AI technologies in their operations to generate business value.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"42 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142042704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir
{"title":"When Your Thing Won’t Behave: Security Governance in the Internet of Things","authors":"Martin Brennecke, Gilbert Fridgen, Jan Jöhnk, Sven Radszuwill, Johannes Sedlmeir","doi":"10.1007/s10796-024-10511-z","DOIUrl":"https://doi.org/10.1007/s10796-024-10511-z","url":null,"abstract":"<p>In the Internet of Things (IoT), interconnected smart things enable new products and services in cyber-physical systems. Yet, smart things not only inherit information technology (IT) security risks from their digital components, but they may also aggravate them through the use of technology platforms (TPs). In the context of the IoT, TPs describe a tangible (e.g., hardware) or intangible (e.g., software and standards) general-purpose technology that is shared between different models of smart things. While TPs are evolving rapidly owing to their functional and economic benefits, this is partly to the detriment of security, as several recent IoT security incidents demonstrate. We address this problem by formalizing the situation’s dynamics with an established risk quantification approach from platforms in the automotive industry, namely a Bernoulli mixture model. We outline and discuss the implications of relevant parameters for security risks of TP use in the IoT, i.e., correlation and heterogeneity, vulnerability probability and conformity costs, exploit probability and non-conformity costs, as well as TP connectivity. We argue that these parameters should be considered in IoT governance decisions and delineate prescriptive governance implications, identifying potential counter-measures at the individual, organizational, and regulatory levels.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142022250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Katharina Breiter, Carlotta Crome, Anna Maria Oberländer, Feline Schnaak
{"title":"Dynamic Capabilities for the Twin Transformation Climb: A Capability Maturity Model","authors":"Katharina Breiter, Carlotta Crome, Anna Maria Oberländer, Feline Schnaak","doi":"10.1007/s10796-024-10520-y","DOIUrl":"https://doi.org/10.1007/s10796-024-10520-y","url":null,"abstract":"<p>Digital transformation and sustainability transformation are at the top of organizations’ agendas to remain competitive. While guidance on both transformations exists separately, even more research on integrating digital and sustainability transformation, namely twin transformation, is required. Specifically, deeper knowledge about relevant twin transformation capabilities and progress is needed for effective implementation. To enhance the understanding and provide corresponding guidance, we developed a twin transformation capability maturity model focusing on dynamic capabilities required to realize twin transformation based on a structured literature review and interviews with 13 experts. Further, we demonstrated its use with a technology service provider. Our contribution is twofold: First, accounting for organizations’ twin transformation starting points in terms of their digitalization and sustainability experience and expertise, we reveal three pathways to becoming a twin transformer. Second, our work provides an overview of 45 relevant twin transformation capabilities structured along six capability dimensions and four maturity stages. Our work also provides relevant practical implications supporting organizations in assessing their twin transformation maturity building the foundation for targeted capability development.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"56 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141904580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Does Performance-Based Monetary Incentive Influence Cyberloafing’s Effects on Task Performance?","authors":"Jungwon Kuem, Yixin Zhang","doi":"10.1007/s10796-024-10525-7","DOIUrl":"https://doi.org/10.1007/s10796-024-10525-7","url":null,"abstract":"<p>With the widespread use of computers and the internet in the workplace, computer use for personal reasons during work time, or cyberloafing, has become quite common. Without a clear understanding of the consequences of cyberloafing, practitioners cannot properly design an IT policy aimed at managing employees' cyberloafing. This study aims to develop and test a model of the relationship between cyberloafing and task performance. Specifically, we attempt to demonstrate how performance-based monetary incentives and time change the role of cyberloafing in task performance. Drawing on the theory of goal setting and the capacity theory of attention, we developed research hypotheses on how cyberloafing interacts with incentives and time to influence task performance. To test the hypotheses, we conducted five 2 × 2 experiments repeatedly on 189 subjects. The results of hierarchical linear modeling showed that although cyberloafing generally worsened task performance, this relationship varied with performance-based monetary incentives. Incentives significantly diminished the negative effect of cyberloafing on task performance. However, as our theory predicted, the moderating effect of incentives decreased over time. More specifically, we found that the two-way interaction between cyberloafing and incentives was in effect during earlier phases but gradually disappeared over time. This study contributes to IS research and practice by providing valuable insights into the role of cyberloafing in task performance and how this relationship changes over time with the option of performance-based monetary incentives.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"21 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141908966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of Perceived Barriers of Electronic Health Information Exchange on Physician’s Use of EHR: A Normalisation Process Theory Approach","authors":"Avijit Sengupta, Anik Mukherjee, Debra VanderMeer","doi":"10.1007/s10796-024-10524-8","DOIUrl":"https://doi.org/10.1007/s10796-024-10524-8","url":null,"abstract":"<p>Digitizing healthcare is a major aim of healthcare policy, with efforts aimed at increasing adoption of electronic health records (EHRs). We study the capability use for EHRs through the lens of normalisation process theory to assess whether these barriers to adoption also remain barriers to sustained use. We focus on health information exchange (HIE), which is one of the most challenging capabilities identified in the literature. We analyse the National Electronic Health Records Survey data, in which physicians were asked whether known HIE adoption barriers remain in place, and how frequently they use HIE capabilities. Though we expect that adoption barriers reported to be less problematic will be associated with greater capability use, we found that adoption barriers perceived to be more (less) problematic were not necessarily those that predicted less (greater) capability use. This study contributes through a critical examination of the process of normalization of EHR capabilities.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"45 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141899783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Prasanta Kumar Pattanaik, Shivam Gupta, Ashis K. Pani, Urmii Himanshu, Ilias O. Pappas
{"title":"Impact of Inter and Intra Organizational Factors in Healthcare Digitalization: a Conditional Mediation Analysis","authors":"Prasanta Kumar Pattanaik, Shivam Gupta, Ashis K. Pani, Urmii Himanshu, Ilias O. Pappas","doi":"10.1007/s10796-024-10522-w","DOIUrl":"https://doi.org/10.1007/s10796-024-10522-w","url":null,"abstract":"<p>Digitalization of the healthcare industry is a major trend and focus worldwide. It has the capability to improve the quality of care, reduce costs, and increase accessibility. India’s Healthcare Vision 2030 serves as a driving force compelling healthcare organization in India to embrace digitalization in their operations and services. We surveyed Indian healthcare employees to provide a comprehensive understanding of how external factors impact an organization's internal resources towards successful adoption of healthcare digitalization. The integration of three theoretical perspectives Institutional Theory (IP), Resource-Based View (RBV), and Absorptive Capacity Theory (ACT)) enables a more holistic and intricacies view. Our results emphasize that healthcare digital transformation requires more than just investment and time. Neglecting to respond to external pressures can lead to limited outcomes in digitalization efforts. It necessitates the presence of an appropriate organizational culture, accompanied by strong belief and support from top management.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"21 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141899784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}