{"title":"Predicting Information Diffusion on Twitter a Deep Learning Neural Network Model Using Custom Weighted Word Features","authors":"A. Kushwaha, A. K. Kar, P. Ilavarasan","doi":"10.1007/978-3-030-44999-5_38","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_38","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unsupervised Anomaly Detection of Healthcare Providers Using Generative Adversarial Networks","authors":"K. Naidoo, Vukosi Marivate","doi":"10.1007/978-3-030-44999-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_35","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132611539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Information Technology in Fintech Innovation: Insights from the New York City Ecosystem","authors":"S. Mamonov","doi":"10.1007/978-3-030-44999-5_26","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_26","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a Strategic Model for Safeguarding the Preservation of Business Value During Human Interactions with Information Systems","authors":"C. Grobler, T. M. V. D. Merwe","doi":"10.1007/978-3-030-44999-5_29","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_29","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation Considerations for Big Data Analytics (BDA): A Benefit Dependency Network Approach","authors":"J. Maritz, S. Eybers, M. Hattingh","doi":"10.1007/978-3-030-44999-5_40","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_40","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Gerber, P. L. Roux, Carike Kearney, A. V. D. Merwe
{"title":"The Zachman Framework for Enterprise Architecture: An Explanatory IS Theory","authors":"A. Gerber, P. L. Roux, Carike Kearney, A. V. D. Merwe","doi":"10.1007/978-3-030-44999-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_32","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Requirements of Data Visualisation Tools to Analyse Big Data: A Structured Literature Review","authors":"Joy Lowe, M. Matthee","doi":"10.1007/978-3-030-44999-5_39","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_39","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115217624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Broker-Based Framework for the Recommendation of Cloud Services: A Research Proposal","authors":"Raoul Hentschel, Susanne Strahringer","doi":"10.1007/978-3-030-44999-5_34","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_34","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Disruptiveness of Cryptocurrencies: A Causal Layered Analysis-Based Approach","authors":"Matti Mäntymäki, Milla Wirén, A. Islam","doi":"10.1007/978-3-030-44999-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_3","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Governance Challenges Constraining Business Process Management: The Case of a Large South African Financial Services Corporate","authors":"Carmen Doyle, Lisa F. Seymour","doi":"10.1007/978-3-030-44999-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_27","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}