𝔖 Scriptorium
✦   LIBER   ✦

📁

Information Systems and Technologies: WorldCIST 2022, Volume 3 (Lecture Notes in Networks and Systems, 470)

✍ Scribed by Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernando Moreira (editor)


Publisher
Springer
Year
2022
Tongue
English
Leaves
651
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks, mobility and pervasive systems; G) intelligent and decision support systems; H) big data analytics and applications; I) human–computer interaction; J) ethics, computers and security; K) health informatics; L) information technologies in education; M) information technologies in radio communications; N) technologies for biomedical applications.

This book is composed by a selection of articles from The 2022 World Conference on Information Systems and Technologies (WorldCIST'22), held between April 12 and 14, in Budva, Montenegro.

WorldCIST is a global forum for researchers and practitioners to present and discuss recent results and innovations, current trends, professional experiences, and challenges of modern information systems and technologies research, together with their technological development and applications.

✦ Table of Contents


Preface
Contents
Organizational Models and Information Systems
Integrated Risk Monitoring in the Quality Management System
1 Introduction
2 Study Design and Approach
3 Integrated Risk Monitoring Model
4 Study Results
4.1 Research Question 1
4.2 Research Question 2
4.3 Research Question 3
5 Conclusion
References
Productivity of Software Development Teams Based on Social and Human Factors: A Dynamic Conceptual Model
1 Introduction
2 Social and Human Factors in Software Engineering
3 System Dynamics in Software Engineering
4 Design of the Conceptual Model
5 Discussion
6 Conclusions and Future Work
References
The Impact of ICTs and Homebased Workspaces on Employee Well-Being During COVID-19 in South Africa
1 Introduction
2 Literature Review
2.1 Personal Wellbeing and the Impact of Homebased Workspaces
2.2 The Impact on Women
2.3 The Role of Managers and Leaders
2.4 Coping Strategies
3 Research Methodology
4 Research Findings, Analysis and Discussion
4.1 Background Information
4.2 Research Analysis and Discussion
5 Conclusion
References
Semantic-Based Image Retrieval Using Hierarchical Clustering and Neighbor Graph
1 Introduction
2 Related Works
3 Research Method
3.1 The Hierarchical Clustering Tree GP-Tree
3.2 The Neighbor Cluster Graph
3.3 Image Retrieval on the Neighbor Cluster Graph
3.4 The Architecture of Semantic-Based Image Retrieval
3.5 Constructing Ontology for Image Datasets
4 Semantic-Based Image Retrieval Application
4.1 Experimental Environment
4.2 Application
4.3 Experimental Evaluation
5 Conclusion
References
Innovation and Sustainability Practices in Project Management Within SMEs Context – A Systematic Literature Review
1 Introduction
2 Background
2.1 Innovation
2.2 Sustainability
3 Method
4 Results
4.1 Innovation Practices
4.2 Sustainability Practices
5 Discussion and Conclusions
References
Project Management in Service Sector SMEs: A Comparative Study Between Portugal and Denmark
1 Introduction
2 Background
3 Research Methodology
4 Findings and Discussion
4.1 Most Useful PM Practices in SMEs of the Service Sector in Denmark and Portugal
4.2 PM Approaches, Frameworks and Methodologies Adopted in Denmark and Portugal
4.3 Improving PM in SMEs
5 Conclusion
References
A Job Killer or a Job Creator? The Adoption of AI in Organizations
1 Introduction
2 Literature Review
3 Methodology
4 Analysis and Results
5 Discussion
6 Implications and Recommendations
References
Skills and Competencies Expected from HEI Students: Case Study of a Less Favoured Region
1 Introduction
2 Definition of the Study
2.1 Methodology
2.2 Sample Distribution
3 Results
3.1 Skills/Competences Expected from Students (Organizational Expectations)
3.2 Skills/Competences Expected from Students (Students Expectations)
4 Conclusions
References
A Faulty IoT Network: Simulating Sensors and Perturbations
1 Introduction
2 Related Work
3 Simulation Platform
3.1 Architecture
3.2 Simulation Configuration
3.3 Format of Exchanged Data
3.4 Metrics
4 Experiments
4.1 Overview
4.2 First Case Study
4.3 Second Case Study
5 Conclusion
References
The Method Based on the TOGAF Framework and DevOps Culture in the Implementation and Deployment of Software
1 Introduction
2 Related Literature
2.1 Related Work
2.2 TOGAF Framework
2.3 DevOps Culture
2.4 Software Implementation and Deployment
3 Research Method
4 Results
4.1 Stage 1 Results: Identify Requirements
4.2 Stage 2 Results: Align ADM TOGAF Phases with DEVOPS Culture
4.3 Stage 3 Results: Development of the TDEVOPS Method
4.4 Stage 4 Results: Case Study
5 Conclusion
References
Risk Management in Analytics Solutions Integration and Deploy
1 Introduction
2 Literature Review
3 Methodology
4 Results
5 Discussion
6 Final Considerations
APPENDIX I – “Analytics Life Cycle of Initiatives” Process Modeled
APPENDIX II - Sub-process “Integration and Implementation of Solutions in Analytics” Modeled
APPENDIX III - Risk Validation and Identification Questionnaire
References
A Participative and Collaborative Approach for Security Risk Management Modelling in the Context of Essential Services
1 Introduction
2 Participative and Collaborative Modelling Approach
3 A Participative and Collaborative Modelling Method
3.1 Method Description
3.2 Validating the Method in Essential Services Ecosystem
4 Participative Workshops
4.1 Workshops Description
4.2 Model Consolidation and Continuous Improvement
4.3 Results
5 Validation
5.1 Advantages in Modelling
5.2 Issues in Modelling
6 Conclusion and Future Work
References
KPI’s for Evaluation of DevOps Teams
1 Introduction
2 State of the Art
2.1 Background
2.2 Related Work
3 Reporting the Review
3.1 Performance KPI’s
4 Conclusion
References
Application of Scheduling and Capacity Management Tools in a Multi-project Environment
1 Introduction
2 Theoretical Background
2.1 Main Concepts
2.2 Tools and Techniques
2.3 Microsoft Project
3 Methodology
4 Results
4.1 Schedule Development
4.2 What-if Analysis
4.3 Comparative Analysis Between the Scenarios
5 Conclusion
References
Business Efficiency in Implementation of Wi-Fi Data Offloading Technique in Mobile Networks
1 Introduction
2 Security Solution
2.1 Solutions on Layers One, Two and Three
2.2 RADIUS Server, TACACS + and DHCP Option 82
2.3 Wireless Intrusion Prevention System (W-IPS)
3 Setting up WLANs
3.1 Creating/Searching WLANs
4 Access Point Communication Protocols/Data Encryption
4.1 Configuring Data Encryption
5 Handling Radio Resource Management
5.1 RRM Configuration
5.2 Pico Cell Mode
6 Conclusion
References
The Software Application WEB API for the Measurement and the Control of the Quality of the Air
1 Introduction
2 Methodology
3 Law on the Quality of Air
3.1 European Laws on the Quality of Air
4 Case Study
4.1 Main Intention
4.2 Solid Principle for Designing the Applications
5 Conclusion
References
Software Systems, Architectures, Applications and Tools
The Impact of Instance Selection Algorithms on Maintenance Effort Estimation for Open-Source Software
1 Introduction
2 Machine Learning Techniques: An Overview
3 Empirical Design
3.1 Datasets
3.2 Instance Selection
3.3 Accuracy Criteria and Statistical Test
4 Empirical Results and Discussion
4.1 Empirical Results
4.2 Scott-Knott and Borda Count
5 Threats to Validity
6 Conclusion
References
Towards a Taxonomy of Software Maintainability Predictors: A Detailed View
1 Introduction
2 Classification Methodology
3 Maintainability Predictors Taxonomy: First Level
3.1 Software Design Category
3.2 Software Size Category
3.3 Quality Attributes Category
3.4 Software Process Category
4 Maintainability Predictors Taxonomy: Second Level
4.1 Sub-categories Within the Design Category
4.2 Sub-categories Within the Software Size Category
4.3 Sub-categories Within the Quality Attributes Category
4.4 Sub-categories Within the Software Process Category
5 Maintainability Predictors
6 Conclusion
References
Study of ROS-Based Autonomous Vehicles in Snow-Covered Roads by Means of Behavioral Cloning Using 3DCoAutoSim
1 Introduction
2 Related Work
3 Methodology
3.1 Simulation Implementation
3.2 Architecture and Settings
3.3 ROS and Behavioral Cloning
4 Experimental Setup and Data Analysis
4.1 Data Collection and Training
4.2 Experiments Design and Development
4.3 Data Analysis
5 Results
6 Conclusion and Future Work
References
Designing Customized Touristic Circuits Based on Heuristic and Non-heuristic Algorithms with Gamification Tools
1 Introduction
2 Background and Related Work
2.1 The TTDP Context of the Research
2.2 Gamification in Tourism
3 The Research Context
3.1 Prior Work
3.2 Present Work
4 Materials and Methods
5 Results: Customized Tourist Routes Based on Gamification
5.1 Description of the Elements of the Tourist Routes from the Petrila Theme Park
5.2 Presentation of the Resulting Routes in the Form of Heat Maps and Graphs for the 6 Customized Routes
6 Conclusions
References
Recommender System Based on the Friendship Between Social Network Users in a Cold-Start Scenario
1 Introduction
2 Recommender System
2.1 Social Influence
3 Proposed Recommender System
3.1 Friendly Group Factor
3.2 User Preference Function Representation
3.3 Recommendation Process
4 Architecture, Implementation and Tests in the Controlled Environment
4.1 The Controlled Experiment
5 Conclusion
References
Factors Influencing the Adoption of Infrastructure as a Service by South African Small and Medium-Sized Enterprises
1 Introduction
2 Literature Review
2.1 Definitions and Concepts
2.2 SMEs’ Adoption of IaaS
2.3 Inhibitors and Drivers of Cloud Computing Adoption by SMEs
3 Research Design and Methodology
4 Research Findings, Analysis and Discussion
4.1 Demographics Data
4.2 IaaS Adoption
4.3 Drivers and Inhibitors of IaaS Adoption
5 Conclusion
References
Remote Management of Visits to Points of Interest in Low-Density Rural Territories
1 Introduction
2 Background
3 Goals and Requirements
4 Challenges and Contribution
4.1 Challenges
4.2 Contribution
5 Practical Implementation of the Approach
5.1 Architecture and Technologies
5.2 Prototype
6 Experiments and Evaluation
7 Conclusions and Future Work
References
Detecting SQL Injection Vulnerabilities Using Artificial Bee Colony and Ant Colony Optimization
1 Introduction
2 Related Work
3 Problem Definition
4 Problem Representation
5 Artificial Bee Colony
6 Ant Colony Optimization
7 Experimental Results
8 Conclusion
References
Public Policies Vectors for Urban Greening Technological Strategies
1 Introduction
2 Methodology
3 Findings
3.1 Keyword Co-citation Analysis
3.2 Application of Technologies in Urban Greening
4 Final Considerations
References
Designing a Visualization Model to Represent Emotional Changes Through Low-Cost Physiological Sensors with Genre Perspective
1 Introduction
2 Materials and Methods
2.1 Participants
2.2 Emotion Induction
2.3 Capturing Physiological Signals
2.4 Features Selection
2.5 Data Analysis
2.6 Visualization Model
3 Conclusions
References
System Architecture for Home Muscle Rehabilitation Treatment
1 Introduction
2 Literature Review
3 Architecture
3.1 Sensitive Data Protection
4 Prototype for Home Treatment
5 Tests
6 Conclusion
References
On Creation of Synthetic Samples from GANs for Fake News Identification Algorithms
1 Introduction
2 Background
2.1 Systems for Fake News Detection
2.2 The Imbalance Problem
2.3 The Anatomy of a GAN
3 Proposal
3.1 The Dataset
3.2 The Internal Layers and Different Architectures
3.3 Using CTGANs
3.4 How to Undertake Training and Evolve the System
3.5 How to Assess the Solutions
4 Discussion
5 Conclusion
References
Intelligent Cyberattack Detection on SAFECARE Virtual Hospital
1 Introduction
2 Virtual Hospital
3 IT Threat Detection System
4 Machine Learning Training
4.1 Attack Detection Performance of Ensemble Algorithms on CICIDS2017 Dataset
4.2 Feature Selection and Ensemble Methods on CICIDS2017 Dataset
4.3 Attack Detection Performance on CIDDS-001 Dataset
5 IT Threat Detection System Testing in SAFECARE System
6 Conclusion
A ITDS KPIs Results
References
Evaluation of the Use of Different Parser Generators in a Compiler Construction Course
1 Introduction
2 Methodology
3 Results
4 Related Work
5 Conclusions
References
Software and Systems Modeling
User Interface Modelling Languages for Normalised Systems: Systematic Literature Review
1 Motivation and Introduction
2 Related Work
2.1 Normalised Systems
2.2 Dimensions of Client Applications
3 Methodology
4 Review
4.1 Research Question
4.2 Search and Filters
4.3 Evaluation Criteria
5 Results
6 Discussion and Conclusion
6.1 Limitations
6.2 Research Gaps
6.3 Next Steps
References
Fall Detector
1 Introduction
2 State of the Art
2.1 Methodology Agile
3 Implementation
3.1 Development
3.2 Requirements Analysis
3.3 Architecture
3.4 Components
3.5 Algorithm
4 Results and Simulation
5 Conclusions
References
Burst Ratios of Individual Flows
1 Introduction
2 Related Work
3 The Model
4 Analytical Solution for the Aggregated Traffic
5 Experiments Results and Discussions
5.1 Flows of the Same Type
5.2 Flows of a Common Rate but Different Distributions
5.3 Flows of a Common Type but Different Rates
5.4 Impact of the Buffer Size
5.5 Impact of the Service Time Distribution
6 Conclusions
References
Multi-vendor Software Ecosystem: Challenges from Company’ Perspective
1 Introduction
2 Research Methodology
3 Challenges in Single Vendor Ecosystem
4 Challenges Faced by Companies in a Multi-vendor Ecosystem
5 Conclusion and Future Work
References
Exploring the Drivers of Cryptocurrency Adoption Intent in Africa
1 Introduction
2 Theoretical Background
3 Methodology
4 Results
4.1 Demographic Profile
4.2 Model Assessment
5 Discussions and Implications
6 Limitations and Future Orientations
References
Towards Automatic Gait Analysis from an IT Perspective: A Kinesiology Case
1 Introduction
1.1 Kinematic Gait Analysis
1.2 Related Works
2 A Preliminary Proposal
2.1 Main Functions
2.2 Functionalities of the Proposed System
2.3 IT Architecture
3 Conclusions
References
Technologies for Biomedical Applications
A Pipeline for Segmenting and Classifying Brain Lesions Caused by Stroke: A Machine Learning Approach
1 Introduction
2 The Dataset and Methodology
2.1 Class Selection
2.2 Implementation Environment
2.3 Pre-processing
2.4 Segmentation
2.5 Classification
3 Results and Discussion
4 Conclusions
References
Workshops
Digital Transformation Framework: A Bibliometric Approach
1 Introduction
2 Current State of DT
3 Methodology
4 Results
5 Driving Conceptual Framework
6 Conclusion
References
Discovering Multiple Clusters of Second-Hand Luxury Goods for Profit Improvement Using Network Motif
1 Introduction
2 Related Work
2.1 Second-Hand Luxury Goods Analysis
2.2 Network Analysis
3 Second-Hand Luxury Goods Trade Analysis Model
3.1 Sales Data Collection
3.2 Profit Complex Network and Subnetwork
3.3 Multiple Clusters of Second-Hand Luxury Goods Discovery
4 Experiments
5 Results and Discussion
6 Conclusion
Appendix
References
e-Marketing Influence on Rural Tourism Destination Sustainability: A Conceptual Approach
1 Introduction
2 Conceptual Framework
2.1 e-Marketing
2.2 Rural Tourism Destinations Sustainability
3 Proposed Conceptual Model
3.1 Research Propositions
4 Proposed Model Discussion and Implications
5 Final Considerations and Future Research
5.1 Limitations and Future Research
References
Understanding the Impact of Chatbots on Purchase Intention
1 Introduction
2 Literature Review
2.1 Chatbots
2.2 Attributes of Chatbots
2.3 Attitude Towards Chatbots
2.4 Satisfaction with the Chatbot
2.5 Purchase Intention
2.6 Research Model
3 Methodology
4 Results
4.1 Assessment of the Measurement Model
4.2 Assessment of the Structural Model
5 Conclusion
References
Covering Undefined and Untrusted Values by the Database Index
1 Introduction
2 Indexing
3 Existing Solutions
4 Own Contribution
5 Conclusions
References
The Impact of Table and Index Compression on Data Access Time and CPU Costs
1 Introduction
2 Data Compression
3 Compressed vs. Uncompressed Block
4 Compressed Table
5 Indexing
6 Execution Plan
7 Index Scans
8 Compressed Index
9 Methodology
10 Results
11 Conclusion
References
Study of Twitter for Digital Content Strategies. Case Study Newspaper Metro Ecuador
1 Introduction
1.1 Content Strategy, Case Histories
2 Methodology
3 Results
4 Conclusions
References
Lean Marketing: Application of the Lean Six Sigma to Marketing – Case Study
1 Introduction
2 Literature Revision
2.1 Six Sigma
2.2 DMAIC in the Sales Process
2.3 Lean Six Sigma
2.4 Lean in Sales and Marketing
2.5 Marketing
2.6 Lean Marketing
3 Methodology
4 Results
5 Conclusions
References
Predicting the Portuguese GDP Using Three Different Computational Techniques
1 Introduction
2 Literature Review
3 Empirical Work
3.1 Data Context, Collection, and Preparation
3.2 Data Modelling
4 Results and Discussion
5 Conclusions
References
Search Engine Optimization (SEO) for a Company Website: A Case Study
1 Introduction
2 Literature Review
3 Case Study
4 Results
5 Conclusions and Future Work
References
Subject Line Personalization Techniques and Their Influence in the E-Mail Marketing Open Rate
1 Introduction
2 Literature Review
2.1 E-Mail Marketing
2.2 The Importance of Subject Line in E-mail Marketing
3 Methodology
4 Results
5 Conclusions
6 Limitations and Future Research
References
Consumer Attitudes Regarding Strategies in Digital Marketing
1 Introduction
2 Literature Review
3 Methodology
4 Analysis and Discussion of Results
5 Conclusion
References
Computer Based Information System for Pharmacies
1 Introduction
2 Current State of Pharmacy Software
3 Designing Own Pharmacy Software Solution
4 System Architecture
5 E-Health
6 Prescription Issue
7 Reservation
8 Conclusions
References
Social Media in China and Portugal and “digital Bubbles” of Political Information
1 Introduction
2 How Do Chinese Social Networks Work?
2.1 WeChat
2.2 Sina Weibo
2.3 Baidu Tieba
3 How is Censorship Applied?
3.1 Basic Prohibitions
3.2 Repercussions
3.3 Government Response
4 Methodology: What is the Influence of Social Networks on Users’ Voting Intentions/Political Ideologies?
5 Results and Discussion
5.1 Cronbach’s Alpha Coefficient
6 Conclusion
References
Complex Testing System for Evaluation Results
1 Introduction
2 State of the Art and the History of Developing
3 Main Requirements for the System
4 Design of the Testing System
5 The Architecture of the Testing System
6 Important Technologies Used
7 Conclusion
References
New Trends in Fast Reroute
1 Introduction
2 Analysis of Existing Solution
2.1 PURR
2.2 Fibbing
2.3 Cleavage of Arborescences to Increase FRR Resilience
3 Discussion
3.1 PURR
3.2 Fibbing
3.3 Cleavage of Arborescences
4 Conclusion
References
Brand Communication on Instagram During the COVID-19 Pandemic: The Portuguese Context
1 Introduction
2 Theoretical Framework
2.1 The Importance of Instagram for Brands
2.2 Instagram Marketing Strategies
2.3 The Portuguese Context
3 Methodology
4 Findings and Discussion
5 Conclusion
References
Optimal Distribution of Current Resources in a Production Environment - A Sustainable and Ethical Framework for the Digital Era
1 Introduction
2 The Logic of the Original Research Themes According to a Six Sigma Approach [23]
2.1 Content of the Research
3 Road Map for the Product
3.1 Status Quo – Results of the Research Project
4 Findings and Thought Process
5 Conclusions - Summary of the Product/Solution
6 Limitations and Future Research
References
Tracking Method for Aircraft on Ground (AOG) Service and the Challenges for E-commerce
1 Introduction
2 Related Work
2.1 Existing Technology and Solutions
3 Aircraft on Ground Losses
4 Proposed Solution
4.1 AOG Box
5 Validation
6 Conclusion and Future Work
References
Impact of Corporate Social Responsibility (CSR) Activities of Sports Clubs in Portugal on Brand Attitude and Electronic Word-of-Mouth Intention
1 Introduction
2 Literature Review
2.1 CSR in Sports Organizations
2.2 Sports Marketing
2.3 Word-of-Mouth (WOM) and Electronic Word-of-Mouth (e-WOM)
3 Methodology
3.1 Procedures
3.2 Research Hypothesis
3.3 Statistical Methods
4 Results
4.1 Sample Characterization
4.2 Reliability of the Scales
4.3 Analysis of the Research Hypotheses
5 Discussion, Conclusion, and Implications
References
Author Index


📜 SIMILAR VOLUMES


Information Systems and Technologies: Wo
✍ Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernan 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,

Information Systems and Technologies: Wo
✍ Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernan 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book covers the following main topics: A) information and knowledge management; B) organizational models and information systems; C) software and systems modeling; D) software systems, architectures, applications and tools; E) multimedia systems and applications; F) computer networks,

Information Systems and Technologies: Wo
✍ Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernan 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis

Information Technology and Systems: ICIT
✍ Álvaro Rocha (editor), Carlos Ferrás (editor), Waldo Ibarra (editor) 📂 Library 📅 2023 🏛 Springer 🌐 English

<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology &amp; Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24</span><span

Information Technology and Systems: Proc
✍ Álvaro Rocha (editor), Carlos Ferrás (editor), Abel Méndez Porras (editor), Efre 📂 Library 📅 2022 🏛 Springer 🌐 English

<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2022 International Conference on Information Technology &amp; Systems (ICITS'22), held at Tecnológico de Costa Rica, in San Carlos, Costa Rica, between the 9th and the 11th of February

Information Systems and Technologies: Wo
✍ Alvaro Rocha (editor), Hojjat Adeli (editor), Gintautas Dzemyda (editor), Fernan 📂 Library 📅 2024 🏛 Springer 🌐 English

<span>This book is composed of a selection of articles from the 11st World Conference on Information Systems and Technologies, held between 4 and 5 of April 2023, at Sant'Anna School of Advanced Studies, in Pisa, Italy. WorldCIST is a global forum for researchers and practitioners to present and dis