This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24th and the 26th of April
Information Technology and Systems: ICITS 2023
✍ Scribed by Álvaro Rocha (editor), Carlos Ferrás (editor), Waldo Ibarra (editor)
- Publisher
- Springer
- Year
- 2023
- Tongue
- English
- Leaves
- 633
- Series
- Lecture Notes in Networks and Systems; 691
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24th and the 26th of April 2023.
ICIST is a global forum for researchers and practitioners to present and discuss recent findings and innovations, current trends, professional experiences and challenges of modern information technology and systems research, together with their technological development and applications.
The main topics covered are: information and knowledge management; organizational models and information systems; software and systems modelling; software systems, architectures, applications and tools; multimedia systems and applications; computer networks, mobility and pervasive systems; intelligent and decision support systems; big data analytics and applications; human–computer interaction; ethics, computers & security; health informatics; information technologies in education, and Media, Applied Technology and Communication.
✦ Table of Contents
Preface
Contents
Big Data Analytics and Applications
On the Use of Parallel Architectures in DNA Methylation Analysis
1 Introduction
2 Sample Alignment and Methylation Status Inference
3 Detection of Differentially Methylated Regions (DMRs)
4 Artificial Intelligence for Methylation Analysis
5 Conclusions
References
Automation for IBNR Provision Using Power BI and Excel
1 Introduction
1.1 Generalities
2 Methodology
3 Results
4 Conclusions
References
Visualizing the Risks of De-anonymization in High-Dimensional Data
1 Introduction
2 Related Work and Contribution
3 Methods
3.1 k-Anonymity
3.2 l-Diversity
3.3 Spatiotemporal Data Anonymity
3.4 Textual Data Anonymity
3.5 Financial Transactions Data Anonymity
3.6 Aggregation-Based Data Anonymity
4 Application
5 Conclusion and Future Work
References
Computer Networks, Mobility and Pervasive Systems
Wireless Mesh for Schools in the Emberá Comarca
1 Introduction
2 Methodology
3 Internet Connections
4 Why Mesh Networks?
5 Model
6 Conclusions
7 Future Work
References
Implementation of a 2.4 GHz Biquad Antenna for a Microwave and Antenna Laboratory
1 Introduction
2 Development
3 Results
4 Conclusions
References
TaguaSpot: A Versatile Radio Access Networks Design for the Integration of Indigenous Communities to the Information Society
1 Introduction
2 Connectivity Challenges in Indigenous Communities
2.1 The Ella Puru Community, a Case Study
2.2 Potential Project Risks
2.3 Potential Benefits
3 Design Requirements of a Versatile Access Network for Indigenous Communities
3.1 Requirements
3.2 Design Considerations
4 TaguaSpot High-Level Design
5 Conclusions
References
Ethics, Computers and Security
Vulnerability Analysis in the Business Organization
1 Introduction
2 Methodology
2.1 Vulnerability Analysis Tools
2.2 Vulnerability Analysis Process
2.3 Environment Description
3 Results
3.1 Lifetime of Vulnerability in the Information System
4 Conclusions
References
Information Security: Identification of Risk Factors Through Social Engineering
1 Introduction
2 Risk Factors for Social Engineering Attacks
2.1 Computational Techniques for Social Engineering
2.2 Non-computational Techniques for Social Engineering
3 Methodology
3.1 Social Engineering Attack Vectors
4 Results
5 Techniques to Prevent Social Engineering Attacks
6 Conclusion
References
The Information Security Function and the CISO in Colombia: 2010–2020
1 Introduction
2 Literature Review
3 Methodology
3.1 Research Instrument
3.2 Sample
4 Results
4.1 Function of the Information Security Area and Role of the Professional
4.2 Evolution of the Information Security Professional Profile
5 Discussion
5.1 Security Function, Steadily Growing
5.2 Cybersecurity Professional Profile, a Path of Experience and Expansion
6 Conclusions
References
Privacy and Cyber-Security Using Information Systems: A Proposal for Knowledge, Skills, and Attitudes
1 Introduction
2 Background
3 Methodology
4 Results and Discussions
5 Future Work
6 Conclusions
References
A Case Study of a Privacy-Invading Browser Extension
1 Introduction
2 The Attack Scenario
3 Implementation
4 Discussion
5 Conclusion
References
Human-Computer Interaction
An Animatronic Robot to Provide Therapeutic Support to Preschool Children Attending Medical Consultations
1 Introduction
2 Related Work
3 System Architecture
4 Movement Control System
5 Experimentation and Results
5.1 Structural Analysis
6 Conclusions
References
Evaluating the Engagement by Design Methodology in Crowdsourcing Initiatives
1 Introduction
2 Related Works
3 Engagement by Design Cards
4 Application of the Engagement by Design Methodology
5 Analysis of Cards Choice
6 Evaluation of Ideas Generated by the Engagement by Design Methodology
6.1 Results
7 Lessons Learned
8 Conclusion
References
Applying Semiotic Engineering in Game Pre-production to Promote Reflection on Player Privacy
1 Introduction
2 Theoretical Foundation
2.1 Semiotic Engineering
2.2 Game Development
2.3 Privacy in Games
3 Rationale for Using Semiotic Engineering
4 Proposed Approach
4.1 Guiding Questions to Reflect on Privacy
4.2 Example of How to Answer the Questions
5 Final Remarks and Future Work
References
The Consumer Influence of Digital Coupon Distribution Through a Referral Program
1 Introduction
2 Literature Review
2.1 Sales Promotion and Digital Coupon
2.2 Referral Program
2.3 Consumer Perception: Principles of Influence and Decision-Making
3 Methodology
3.1 Research Question and Hypotheses
3.2 Methodology, Variables, Data and Sample
3.3 Study Context and Procedures
3.4 Data, Factor, Reliability Analysis and Anova
3.5 Results
4 Conclusions
4.1 Final Considerations, Scientific and Managerial Contributions
4.2 Limitations and Future Research
References
Digital Travel – A Study of Travellers’ Views of a Digital Visit to Mexico
1 Introduction
2 Methods and Focus: A Digital Visit to Mexico
2.1 Characteristics of the Participants and the Survey
2.2 Visiting Mexico in Forza Horizon 5
3 Data Analysis and Results
4 Discussion
References
Health Informatics
Medical Entities Extraction with Metamap and cTAKES from Spanish Texts
1 Introduction
1.1 UMLS
1.2 Metamap
1.3 cTAKES
2 Methodology
3 Results
4 Comparison of Metamap and cTAKES
5 Conclusion
References
Health Records Management in Trust Model Blockchain-Based
1 Introduction
2 State of the Art
2.1 Blockchain Technology
2.2 Health Records Concepts
3 Related Work
4 Methodology
5 Proposed Trust Model
6 Conclusion
References
Digital Transformation and Adoption of Electronic Health Records: Critical Success Factors
1 Introduction
2 Background
2.1 Digital Transformation and Electronic Health Records
2.2 Latin America and the Caribbean, and Barriers to EHR Adoption
3 Proposal
3.1 Critical Success Factors (CSFs) for Evaluating the Conditions for Health Services
3.2 Configuration of CSF to EHR Adoption
3.3 Operationalization of the CSFs
4 Towards the Evaluation and Application of the CSFs
4.1 Case Study
5 Conclusions
References
Comorbidity Analysis in the Mexican Population Affected by SARS-CoV2
1 Introduction
1.1 Data Acquisition
1.2 Data Processing
2 Affectation Index
3 Comorbidity Statistics
4 Conclusions
References
Practical Guidelines for Developing Secure FHIR Applications
1 Introduction
1.1 Motivation
1.2 FHIR Standard and Security
1.3 The Security Challenge of FHIR API Based Applications
2 Methods and Materials
2.1 Guidelines
2.2 Testing
3 Results
3.1 Guidelines
3.2 Testing
4 Discussion
References
Intelligent System to Provide Support in the Analysis of Colposcopy Images Based on Artificial Vision and Deep Learning: A First Approach for Rural Environments in Ecuador
1 Introduction
2 Related Work
3 System Architecture
4 Pilot Experiment and Preliminary Results
4.1 Training the Neural Network
4.2 Measurement of Perception of the Mobile Application and the Web Application
5 Conclusions
References
Comparison of Transfer Learning vs. Hyperparameter Tuning to Improve Neural Networks Precision in the Early Detection of Pneumonia in Chest X-Rays
1 Introduction
2 Related Work
3 Methodology
3.1 CNN Architecture
3.2 VGGNet
3.3 ResNet
3.4 MobileNet
3.5 Hyperparameter Tuning
4 Experiment and Preliminary Results
5 Conclusion
References
A Smart Mirror Based on Computer Vision and Deep Learning to Support the Learning of Sexual Violence Prevention and Self-care Health in Youth with Intellectual Disabilities
1 Introduction
2 Related Work
3 System Architecture
4 Experimentation and Results
5 Conclusions
References
Intelligent and Decision Support Systems
Weight Prediction of a Beehive Using Bi-LSTM Network
1 Introduction
2 Database
2.1 LSTM Network
2.2 Bi-LSTM Network
2.3 Performance Measures
2.4 Bi-LSTM Configuration
3 Results and Discussion
4 Conclusions
References
Criteria Selection and Decision-Making Support in IT Governance: A Study via Fuzzy AHP Applied to a Multi-institutional Consortium
1 Introduction
2 Theoretical Reference
3 Methodology
3.1 Business Analysis
3.2 Preparation
3.3 Application of the Questionnaire for Data Collection
3.4 Fuzzy AHP Application—Results
4 Application of the Methodology
4.1 Selection of Criteria and Alternative
4.2 Application of Fuzzy AHP
5 Conclusions
References
Machine Learning Model Optimization for Energy Efficiency Prediction in Buildings Using XGBoost
1 Introduction
2 Methodology
2.1 Data Ingestion
2.2 Data Pre-processing
2.3 Building the Model
2.4 Model Tuning
3 Results
4 Discussion
5 Conclusion
References
Analysis of the Azores Accommodation Offer in Booking.Com Using an Unsupervised Learning Approach
1 Introduction
2 Methodology
3 Results and Discussion
4 Conclusions and Further Work
References
AD-DMKDE: Anomaly Detection Through Density Matrices and Fourier Features
1 Introduction
2 Background and Related Work
2.1 Anomaly Detection
2.2 Anomaly Detection Baseline Methods
3 Anomaly Detection Through Density Matrices and Fourier Features (AD-DMKDE)
3.1 Random Fourier Features and Adaptive Fourier Features
3.2 Density Matrix Calculation
3.3 Quantum Density Estimation
3.4 Threshold Calculation and Prediction Phase
4 Experimental Evaluation
4.1 Experimental Setup
4.2 Results and Discussion
5 Conclusion
References
Enhancing Sentiment Analysis Using Syntactic Patterns
1 Introduction
2 Related Work
2.1 Sentiment Analysis
2.2 Sentiment Analysis Processes
3 Sentiment Classification and Analysis
3.1 The Application Case
3.2 The Initial Process
3.3 Using Syntactic Patterns
3.4 Results Analysis
4 Conclusions and Future Work
References
Feature Selection for Performance Estimation of Machine Learning Workflows
1 Introduction
2 Preliminaries
3 Contribution
4 Experiments
5 Conclusion
References
Development of a Hand Gesture Recognition Model Capable of Online Readjustment Using EMGs and Double Deep-Q Networks
1 Introduction
2 Literature Review
2.1 Double Deep-Q Network
2.2 Variability
2.3 Online Learning and Catastrophic Forgetting
3 Materials and Methods
3.1 Architecture
3.2 Online Readjustment Evaluation
4 Results and Analysis
4.1 Offline/Static Results
4.2 Online Readjustment Evaluation
5 Conclusions and Future Works
References
Information and Knowledge Management
Capitalization of Healthcare Organizations Relationships’ Experience Feedback of COVID’19 Management in Troyes City
1 Introduction
2 Managing COVID’19 Crisis in Troyes City
3 Knowledge Capitalization
4 Relationships Capitalization
4.1 Actors Interviews
4.2 First Results
5 Conclusion
References
Factors for the Application of a Knowledge Management Model in a Higher Education Institution
1 Introduction
2 Literature Review
3 Material and Methods
4 Results
4.1 Categories
5 Discussion and Analysis of Results
6 Conclusions
References
eWom, Trust, and Perceived Value Related to Repurchases in the e-commerce Sector of Department Stores
1 Introduction
2 Literature Revision
2.1 Trust
2.2 eWom
2.3 Perceived Value
2.4 Repurchase
3 Methodology
4 Results
5 Conclusions
References
Transitioning to Digital Services: Assessing the Impact of Digital Service Efforts on Performance Outcomes and the Moderating Effect of Service Promotion
1 Introduction
2 Theoretical Background
2.1 Servitization, Digital Services and Digital Service Performance
2.2 Service Offerings and Promotion of Services on Firm Websites
3 Methodology
3.1 Data Collection and Sample of Survey
3.2 Constructs Measurement of the Survey
3.3 AI Assessment of Services Promoted on Company Websites
3.4 Data, Psychometric Properties and Common Method Variance
4 Results
5 Discussion
5.1 Research Contribution and Managerial Implications
6 Limitations and Future Research
References
IoT Devices Data Management in Supply Chains by Applying BC and ML
1 Introduction
2 Literature Review
2.1 VeChain
2.2 Elliptic Curve Cryptography
2.3 Proof of Learning
2.4 Machine Learning and Blockchain on IIoT
3 Design
4 Implementation
4.1 Communication Protocols Between Devices
4.2 Blockchain Implementation
5 Results
5.1 Test Methodology
5.2 Obtained Results
6 Conclusions
7 Future Work
References
Raising Awareness of CEO Fraud in Germany: Emotionally Engaging Narratives Are a MUST for Long-Term Efficacy
1 Introduction to the Current Situation
2 The Main Findings from Literature Reviews
2.1 CEO Fraud Attacks and Learning
2.2 Learning, Narratives, and Serious Games
3 The Project’s Serious Games Simulating CEO Fraud Attacks
3.1 Background of the German Project
3.2 The Analog CEO Fraud Learning Scenario
3.3 The Digital CEO Fraud Learning Scenario
4 Discussion
5 Outlook
References
A Module Based on Data Mining Techniques to Analyze School Attendance Patterns of Children with Disabilities in Cañar - Ecuador
1 Introduction
2 Related Work
3 Methodology
4 Experiment and Preliminary Results
5 Limitations
6 Conclusions
References
Improving Semantic Similarity Measure Within a Recommender System Based-on RDF Graphs
1 Introduction
2 Problem Statement
3 Related Works
3.1 Recommender Systems
3.2 Semantic Similarity Measure
3.3 Vector Representation of Words
4 Measure of Similarity Within a Recommender System
4.1 Recommender System for the Purchase/Sale of Used Vehicles
4.2 Semantic Similarity Measure Between Triplets
5 Experiments
6 Conclusion and Perspectives
References
Comparative Analysis of the Prediction of the Academic Performance of Entering University Students Using Decision Tree and Random Forest
1 Introduction
2 Related Works
2.1 Learning Concepts
2.2 Theoretical Bases
2.3 Synthetic Minority Oversampling Technique (SMOTE)
3 Methodology
3.1 Research Design
3.2 Population and Sample
4 Results and Discussion
5 Conclusions and Future Works
References
Intellectual Capital and Public Sector: There are Similarities with Private Sector?
1 Introduction
2 Literature Review
3 Conclusions
References
EITBOK, ITBOK, and BIZBOK to Educational Process Improvement
1 Introduction
2 Methodology
3 Results
4 Discussion
5 Conclusions
References
Rating Pre-writing Skills in Ecuadorian Children: A Preliminary Study Based on Transfer Learning, Hyperparameter Tuning, and Deep Learning
1 Introduction
2 Related Work
3 Methodology
3.1 Transfer Learning
3.2 Data Augmentation
3.3 Hyperparameter Tuning
3.4 CNN (Convolutional Neural Networks)
3.5 VGG16
3.6 Resnet50
3.7 InceptionV3
4 Experiment and Preliminary Results
4.1 Geometric Shapes Classification
4.2 Geometric Shapes Rating
5 Limitations
6 Conclusions
References
Geographic Patterns of Academic Dropout and Socioeconomic Characteristics Using Clustering
1 Introduction
2 Methodology
2.1 Research and Information Technics
2.2 Methodology Process
3 Results
3.1 Discussion
3.2 Conclusions
References
Implementation of Digital Resources in the Teaching and Learning of English in University Students
1 Introduction
2 Method
2.1 Level and Design
2.2 Population and Sample
2.3 Technique and Instruments for Data Analysis
2.4 Instrument Reliability
3 Results
4 Discussion and Conclusion
References
Communicational Citizenship in the Media of Ecuador
1 Introduction
2 Objectives
3 Methodology
4 Results
5 Discussion and Conclusions
References
A Multimedia Resource Ontology for Semantic E-Learning Domain
1 Introduction
2 Background
2.1 Ontology and Knowledge Inferencing
2.2 Multimedia Ontologies
3 Multimedia Resources Ontology
4 Future Works
References
Business Process Management in the Digital Transformation of Higher Education Institutions
1 Introduction
2 Understanding Business Process Management in the Digital Transformation Context
3 An Approach for Business Process Management in the Digital Transformation of Higher Education Institutions
3.1 Subprocess: Analysis and Lifting of Process Improvements
4 Processes Analysis and Lifting at Salesian Polytechnic University
5 Conclusions and Future Works
References
Collaborative Strategies for Business Process Management at Salesian Polytechnic University
1 Introduction
2 Collaboration and Business Process Management
3 Research Methodology
4 Collaborative Strategies for Business Process Management at Salesian Polytechnic University
4.1 Interactions Among Processes Coordinator and Processes Analysts
4.2 Interactions Among Process Analysts and Expert Users
4.3 Interactions Among Process Analysts
4.4 Interaction Among Process Coordinator and Decision-Makers
5 Conclusions
References
Does Sharing Lead to Smarter Products? Managing Information Flows for Collective Servitization
1 Introduction
2 Sharing-Induced Design Principles
2.1 Supply and Demand Dynamics
2.2 Market-Maker Incentives
2.3 Aftermarket Control and Information
2.4 Product-Design Principles
3 Collective Servitization
4 Product Intelligence
5 Conclusion
References
Analysis of On-line Platforms for Citizen Participation in Latin America, Using International Regulations
1 Introduction
2 Overview
2.1 E-Government
2.2 Citizen E-Participation
2.3 Citizen Participation Platforms
2.4 Citizen Participation in Latin America
3 e-Participation Reference Frameworks
3.1 Canada's Public Participation Guide
3.2 United Nations e-Government
3.3 ePfw Framework (e-Participation Framework)
4 Methodology
4.1 Evaluation Criteria
4.2 Case Study: South American Citizen-Participation Platforms
4.3 Citizen Participation Platforms in Latin America
4.4 Analysis of Citizen e-Participation Platforms
5 Results and Evaluation
5.1 Reasonable Time
5.2 e-Participation Mechanisms in Latin America
5.3 e-Participation Levels
5.4 Transparency
5.5 Platform Usage
5.6 e-Participation Tools
6 Conclusions
References
Managerial Information Processing in the Era of Big Data and AI – A Conceptual Framework from an Evolutionary Review
1 Introduction
2 Evolutionary Mapping of Managerial Information Processing
2.1 Information Behavior – [22] IUE Theory
2.2 Mintzberg’s Managerial Information Behavior
2.3 Choo’s Model of Human Cognition in Managerial Information Processing
2.4 The Cognitive Views of Organisational Information Processing
2.5 Performativity of Intelligent Systems in Distributed Decision Making
3 Discussion and the Framework
3.1 The Driving Forces
4 Conclusion
References
Empowering European Customers: A Digital Ecosystem for Farm-to-Fork Traceability
1 Introduction
2 State of the Art: Food Traceability Solutions
3 A New Tool for Farm-to-Fork Traceability
3.1 Food Classification and Description: Ingredients
3.2 A Simplified Model for the Food Supply Chain
3.3 TrFood Software Platform
4 Study Case: Methods, Materials and Results
5 Conclusions
References
Design of a Task Delegation System in a Context of Standardized Projects
1 Introduction
2 Background
2.1 Task Delegation
2.2 Performance Evaluation
2.3 Standardized Projects
3 Research Methodology
3.1 Planning and Implementation of the SMS
3.2 RQ1. What Criteria are Applied for the Task Delegation? are Any of them Related to Performance?
3.3 RQ2. What Computer Tools are Reported? Which Ones Allow Tasks to be Delegated Based on Established Criteria?
3.4 RQ3. What Method of Performance Evaluation is Used in Organizations?
4 Implementation of Delegator
4.1 High Level Requirements
4.2 Main Algorithm
4.3 Delegator Architecture
4.4 Test Cases
5 Final Discussion
References
eSFarmer - A Solution for Accident Detection in Farmer Tractors
1 Introduction
2 Accidents Overview
3 Proposal Solution
3.1 Client Component
3.2 Broker
3.3 Server Component
3.4 Mobile Application
4 Conclusion
4.1 Future Work
References
An Approach to Identifying Best Practices in Higher Education Teaching Using a Digital Humanities Data Capturing and Pattern Tool
1 Introduction
2 Related Works
3 Modelling Best Practices in Digital Teaching
3.1 The MUSE4Anything Tool
3.2 Data Collection Using the MUSE4Anything Tool
4 Result and Discussion: Data Model
5 Conclusion
References
📜 SIMILAR VOLUMES
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2023 International Conference on Information Technology & Systems (ICITS'23), held at Universidad Nacional de San Antonio Abad del Cusco, in Cusco, Peru, between the 24</span><span
<p><p>This book features a selection of articles from The 2019 International Conference on Information Technology & Systems (ICITS’19), held at the Universidad de Las Fuerzas Armadas, in Quito, Ecuador, on 6th to 8th February 2019.</p><p>ICIST is a global forum for researchers and practitioners to p
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2021 International Conference on Information Technology & Systems (ICITS 21), held at the Universidad Estatal Península de Santa Elena, in Libertad, Ecuador, between the 10th and t
<p><span>This book is composed by the papers accepted for presentation and discussion at The 2019 International Conference on Information Technology & Systems (ICITS'20), held at the Universidad Distrital Francisco José de Caldas, in Bogotá, Colombia, on 5th to 7th February 2020.</span></p><p><s
<p><span>This book is composed by the papers written in English and accepted for presentation and discussion at The 2022 International Conference on Information Technology & Systems (ICITS'22), held at Tecnológico de Costa Rica, in San Carlos, Costa Rica, between the 9th and the 11th of February