Md. Rafiqul Islam, Shaowu Liu, Imran Razzak, M. A. Kabir, Xianzhi Wang, Peter Tilocca, Guandong Xu
{"title":"MHIVis: Visual Analytics for Exploring Mental Illness of Policyholders in Life Insurance Industry","authors":"Md. Rafiqul Islam, Shaowu Liu, Imran Razzak, M. A. Kabir, Xianzhi Wang, Peter Tilocca, Guandong Xu","doi":"10.1109/BESC51023.2020.9348301","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348301","url":null,"abstract":"Stakeholders such as insurance managers (IMs) in the insurance industry are committed to yet lack the timely and actionable information for alleviating policyholder's mental health concerns and the industry's mental health climate. Existing research has revealed that depression, anxiety, stress, etc., can provide deeper insights into policyholders' mental health states. However, such data remain unexplored for supporting stakeholders and government goals. In this paper, we design an interactive visualization system to provide deeper insight into policyholder's mental health states. Our study has three implications: (i) insurance data are potentially useful for understanding policyholders' mental health; (ii) a dashboard-like visual representation is helpful for the decision-making of Stakeholders; and (iii) some insight into the mental health of Australians have been deduced. Finally, we evaluate the utility of our visualization system by comparing it's features with the existing dashboards.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114902564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative Norms and the Growth of Threat: Differences Across Tight and Loose Cultures","authors":"Xinyue Pan, Dana S. Nau, M. Gelfand","doi":"10.1109/BESC51023.2020.9348297","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348297","url":null,"abstract":"Cultural differences in conformity pressures play a critical role in whether and how a society can effectively adopt a cooperative norm and fight against an evolving threat. Using an agent-based evolutionary game theoretic model, our results show that in general, tight societies with stronger conformity pressures adopt a cooperative norm faster than loose societies. As a consequence, the threat ends up lower in tight societies. However, high conformity pressures in tight societies are also a double-sided sword. Sometimes, a tight society may conform to a defective norm at the beginning of a threat, leading to a faster escalation of threat at the early stage of a threat. Nevertheless, as threat increases, tight societies are able to switch to a cooperative norm quickly and slow down the growth of threat, so eventually the threat levels in tight societies are close to or lower than that in loose societies. Our findings bring insight into how cultural differences in conformity pressures influence different societies' success in dealing with collective threats.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129795851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Are They Likely to Complain on Phish or Spam? A Prediction Model","authors":"S. Al-Hussaini, Dena Al-Thani, Y. Yang","doi":"10.1109/BESC51023.2020.9348318","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348318","url":null,"abstract":"Customers are the core of businesses. Specifically, telecommunication companies, customer satisfaction is considered to be a commercial necessity and therefore a priority. High rates of customer satisfaction increase both retention and attraction rates. As a result, telecommunication companies are always seeking new means to achieve these objectives. A large volume of calls is received in a typical call center from customers complaining about phishing or spam attacks daily. It is difficult to identify the purpose of the call manually. In this work, we expand on previous efforts to focus more on impacted phone spam or phish consumers. The study focuses on both mediums of communication, phone calls and messages. A historical sample of customers' complaints dataset was used, and several machine learning classification algorithms were applied to analyze the calls. These are Logistic Regression, XGBoost, Gradient Boosting, Random Forest, CatBoost, KNN, and SVM. The predictive model can identify whether an individual is likely to complain about a spam or phish attack. The performance of the baseline classifier achieves an accuracy of 63.4 % that is based on CatBoost. Moreover, the model identifies consumers' demographics. The findings show that people of age 45 are more likely to complain and that males are less likely to complain.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127022566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Lightweight Network for Fast Semantic Segmentation","authors":"Ruiqi Luo, Yuanzhouhan Cao, Yi Jin, Yidong Li","doi":"10.1109/BESC51023.2020.9348326","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348326","url":null,"abstract":"Semantic segmentation is a fundamental task in computer vision and is widely used in industry. However, current state-of-the-art architectures usually bring heavy computation complexity, making it hard to meet the demand for real-time, and can not be implemented in industry. In this paper, we propose a lightweight network to complete fast segmentation. Our network follows encoder-decoder style, which encodes rich spatial information at shallow layers and gains sufficient semantic information at deep layers. At the decoder part, we use attention mechanism to re-weight features and gradually fuse high-level features back to low-level features. We evaluate our network on Cityscapes dataset. Our method achieves an accuracy of 68.0 % mean intersection over union, and runs at 50.7 frames per second at full resolution (1024x2048) on one NVIDIA GeForce GTX 1080Ti card.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"472 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129235712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristian Pulido, A. Reyes, J. Rudas, Jorge Victorino, Darwin Martínez, L. A. Narváez, Francisco Gómez
{"title":"An evolutionary algorithm for reducing fear of crime","authors":"Cristian Pulido, A. Reyes, J. Rudas, Jorge Victorino, Darwin Martínez, L. A. Narváez, Francisco Gómez","doi":"10.1109/BESC51023.2020.9348330","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348330","url":null,"abstract":"A fundamental aspect of the perception of security is the fear of crime, which is the concern of being a crime victim. The fear of crime has negative social consequences, including neighborhood deterioration, physical and behavioral health outcomes, among others. Different interventions allow fear of reduction, including crime reduction, an increase of police presence, and improvement of social cohesion, among others. However, there are no quantitative approaches to guide the selection of policies for reducing the fear of crime. This article proposes a novel method based on optimization for finding policies aimed to decrease fear of crime by using mathematical models and evolutionary algorithms. Results suggest that policies that promote interactions among members of different groups may enhance community cohesion resulting in reductions of the fear of crime for the most susceptible members in the group.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Eliciting Requirements for a Student-focussed Capture The Flag","authors":"David Szedlak, Andrew M'manga","doi":"10.1109/BESC51023.2020.9348329","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348329","url":null,"abstract":"The current consensus is that a lack of skilled young persons entering the cyber security industry is contributing significantly to the accrescent cyber security skills gap. However, little progress has been made in terms of handling key contributing factors such as cyber security education. While Capture The Flag (CTF) exercises in cyber security education present some of the necessary requirements, we hypothesise that the current CTF forms do not possess the requirements necessary for promoting student engagement and learning. The paper presents the results of a study aimed at identifying the requirements of a student-focused CTF.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowledge Interaction Enhanced Knowledge Tracing for Learner Performance Prediction","authors":"Wenbin Gan, Yuan Sun, Yi Sun","doi":"10.1109/BESC51023.2020.9348285","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348285","url":null,"abstract":"One of the fundamental tasks when providing personalized tutoring services to learners in online learning systems is to predict learner performance on future exercises. To achieve this goal, it is necessary to estimate and trace the knowledge proficiency (KP) of learners by modeling their learning performance. The existing models either fail to capture the long-term dependencies in the exercising sequence to model the influence of a previous exercise to the current one or find it difficult to explain the results. To solve these issues, we propose herein a novel model, called the knowledge interaction-enhanced knowledge tracing (KIKT), to estimate and trace the evolution of learners' KP. We first propose a framework by unifying the strength of the memory network to enhance the representation of the knowledge state and the interpretability of the Item Response Theory to explain learner performance. In this framework, we trace each learner's KP on each knowledge concept overtime, and further infer their proficiencies and the item characteristics using two kinds of neural networks. Moreover, we incorporate the knowledge interaction and the cognitive difficulty into our model to further exploit the long-term dependencies and the adaptive item difficulty in the exercising sequences. Extensive experiments conducted on five real-world datasets demonstrate the superiority of our model.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127724330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human Capital Structure and High-Quality Development: An Empirical Study","authors":"Wenwen Qin, Jun Xue, M. Wei","doi":"10.1109/BESC51023.2020.9348289","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348289","url":null,"abstract":"This paper empirically investigates the impact of human capital structure in the process of China's economic transition from a high-speed growth stage to a high-quality development stage. A high-quality development evaluation system has been built on the innovative, coordinated, green, open and shared development. The measurement of human capital structure is calculated by proportion of employed population with various education. In the empirical analysis, static and dynamic panel data models are used, and the results of estimation reveal that increase in the proportion of high-educated population would effectively promote the quality of regional development. In order to avoid low quality trap, the less-developed regions in China should take corresponding policies to improve their human structures.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116695660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Joint Model of Entity Recognition and Predicate Mapping for Chinese Knowledge Base Question Answering","authors":"Hongjing Li, Lin Li","doi":"10.1109/BESC51023.2020.9348292","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348292","url":null,"abstract":"Knowledge base question answering(KBQA) is the key technology of natural language processing. How to understand the semantic information of the natural language problem and capture the semantic relationship between the problem and the structured triples are the problems that KBQA needs to solve. The boundary of subject entities in Chinese questions is not as clear as English, which increases the difficulty of entity recognition. Besides, the variable Chinese grammar makes predicate mapping more difficult for semantic analysis. Existing KBQA is usually implemented using a pipeline model, which has two disadvantages: (1) Errors caused by entity recognition will be propagated to predicate mapping. (2) Neither entity recognition nor predicate mapping can benefit from the information available to each other. So we propose a BERT-based KBQA to joint entity recognition and predicate mapping tasks that use their dependencies to improve model performance. BERT can solve the semantic ambiguity of the Chinese Q&A databases and improve the accuracy of Chinese Knowledge Base Question Answering(CKBQA). The model achieved an F1 score of 92.04% on the NLPCC 2016 KBQA dataset.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"602 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131241527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IT Investment Governance and Corporate Governance: Perspective and Approach","authors":"Abhishek Mahalle, J. Yong, Xiaohui Tao","doi":"10.1109/BESC51023.2020.9348312","DOIUrl":"https://doi.org/10.1109/BESC51023.2020.9348312","url":null,"abstract":"Corporate Governance, Business plan and Strategy and it's alignment with IT investments has been a subject of discussion as early as 1990s. With productivity paradox and net present value (and other financial methods) of IT investments researched over a period of time, this paper is to put perspective for IT investment in present economic scenario with latest technologies and in digital world. With cloud computing infrastructure requiring all other IT governance principles and processes to be followed, IT investment demands investment more than only in hardware and software development, maintenance and support. IT investment and it's relation to corporate strategy, business risk management, information economics, new business enabler, productivity tool, control systems to deliver shareholder value and constantly create business value has emerged to new domain. Innovation, it's relation to technology, technological innovations and their relation to competitive advantage for an organization has created new areas that demand investment. With competition in business environment and integrated global economy, regulators demand more compliant business processes delivered through modern technological infrastructure. Having investigated the financial, non-financial, economic, tangible and non-tangible benefits of IT investment, this paper provides the new perspective to assess IT investments and make IT investment decision. This papers provides new perspectives and approaches for IT investment portfolio management.","PeriodicalId":224502,"journal":{"name":"2020 7th International Conference on Behavioural and Social Computing (BESC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129612814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}