80 research outputs found

    Arguing with behavior influence: A model for web-based group decision support systems

    Get PDF
    In this work, we propose an argumentation-based dialogue model designed for Web-based Group Decision Support Systems, that considers the decision-makers' intentions. The intentions are modeled as behavior styles which allow agents to interact with each other as humans would in face-to-face meetings. In addition, we propose a set of arguments that can be used by the agents to perform and evaluate requests, while considering the agents' behavior style. The inclusion of decision-makers' intentions intends to create a more reliable and realistic process. Our model proved, in different contexts, that higher levels of consensus and satisfaction are achieved when using agents modeled with behavior styles compared to agents without any features to represent the decision-makers' intentions.- (undefined

    The Behavioral Roots of Information Systems Security:Exploring Key Factors Related to Unethical IT Use

    Get PDF
    Unethical information technology (IT) use, related to activities such as hacking, software piracy, phishing, and spoofing, has become a major security concern for individuals, organizations, and society in terms of the threat to information systems (IS) security. While there is a growing body of work on this phenomenon, we notice several gaps, limitations, and inconsistencies in the literature. In order to further understand this complex phenomenon and reconcile past findings, we conduct an exploratory study to uncover the nomological network of key constructs salient to this phenomenon, and the nature of their interrelationships. Using a scenario-based study of young adult participants, and both linear and nonlinear analyses, we uncover key nuances of this phenomenon of unethical IT use. We find that unethical IT use is a complex phenomenon, often characterized by nonlinear and idiosyncratic relationships between the constructs that capture it. Overall, ethical beliefs held by the individuals, along with economic, social, and technological considerations are found to be relevant to this phenomenon. In terms of practical implications, these results suggest that multiple interventions at various levels may be required to combat this growing threat to IS security

    Benchmarking framework to measure extent of ICT adoption for building project management

    Get PDF
    This project discusses a component of the research study conducted to provide construction organizations with a generic benchmarking framework to assess their extent of information communication technology (ICT) adoption for building project management processes. It defines benchmarking and discusses objectives of the required benchmarking framework and development of the framework. The study focuses on ICT adoption by small and medium enterprises (SMEs) in the construction industry and with respect to SMEs it is important to understand processes, their indicators, and measures in the local context. Structure of the suggested benchmarking framework has been derived after extensive literature survey and a questionnaire survey conducted in the Indian construction industry. The suggested benchmarking process is an iterative process divided into four stages. It can be implemented at organization and industry levels for rating the construction organizations for ICT adoption and performance measurement. The framework has a generic structure and can be generalized and applied for other countries with due considerations

    Using 2D Hierarchical Heavy Hitters to Investigate Binary Relationships

    Full text link
    This chapter presents VHHH: a visual data mining tool to compute and investigate hierarchical heavy hitters (HHHs) for two-dimensional data. VHHH computes the HHHs for a two-dimensional categorical dataset and a given threshold, and visualizes the HHHs in the three dimensional space. The chapter evaluates VHHH on synthetic and real world data, provides an interpretation alphabet, and identifies common visualization patterns of HHHs

    Elbe DSS: A Planning Support System for Strategic River Basin Planning

    No full text
    The German part of the Elbe River and its basin are characterized by multiple problems and objectives that call for strategic management based on an integrated approach. In August 2002, the region suffered a catastrophic flood with loss of lives and damage amounting to over 9 billion Euro. During the summer months, because of low flows, shipping along the river is problematic, which considerably reduces the economic transport capacity of the river. Several areas along the river act as a habitat for rare plant and animal species and have been designated as nature reserves. The output of diffuse and point sources of pollution in the river basin must be controlled in order to comply with standards of the EU Water Framework Directive (EU 2000)
    corecore