66 research outputs found

    REACHING OUT: INVOLVING USERS IN INNOVATION TASKS THROUGH SOCIAL MEDIA

    Get PDF
    Integrating social media into the innovation process can open up the potential for organizations to utilize the collective creativity of consumers from all over the world. The research in this paper sets out to identify how social media can facilitate innovation. By taking a design science approach this research has come up with a new method for matching innovation tasks with social media characteristics. This supports the selection of best suitable social media and can help organizations to achieve their innovation goals. At the core of the method is a honeycomb model which describes seven social media characteristics on three dimensions: audience, content and time. The method has been evaluated by using an approach called scenario walkthrough that is applied in a real-life spatial planning project. This research concludes that there is no one-size-fits-all answer to the question how social media can be of value for the innovation process. However, organizations that want to know how it can benefit their own innovation process can use the Social Media Innovation Method presented in this research as a way to provide an answer to that question, uniquely tailored to each innovation task for which social media is to be used

    Laboratory forensics for open science readiness: an investigative approach to research data management

    Get PDF
    Recently, the topic of research data management has appeared at the forefront of Open Science as a prerequisite for preserving and disseminating research data efficiently. At the same time, scientific laboratories still rely upon digital files that are processed by experimenters to analyze and communicate laboratory results. In this study, we first apply a forensic process to investigate the information quality of digital evidence underlying published results. Furthermore, we use semiotics to describe the quality of information recovered from storage systems with laboratory forensics techniques. Next, we formulate laboratory analytics capabilities based on the results of the forensics analysis. Laboratory forensics and analytics form the basis of research data management. Finally, we propose a conceptual overview of open science readiness, which combines laboratory forensics techniques and laboratory analytics capabilities to help overcome research data management challenges in the near future.Algorithms and the Foundations of Software technolog

    Open-CyKG: an open cyber threat intelligence knowledge graph

    Get PDF
    Instant analysis of cybersecurity reports is a fundamental challenge for security experts as an immeasurable amount of cyber information is generated on a daily basis, which necessitates automated information extraction tools to facilitate querying and retrieval of data. Hence, we present Open-CyKG: an Open Cyber Threat Intelligence (CTI) Knowledge Graph (KG) framework that is constructed using an attention-based neural Open Information Extraction (OIE) model to extract valuable cyber threat information from unstructured Advanced Persistent Threat (APT) reports. More specifically, we first identify relevant entities by developing a neural cybersecurity Named Entity Recognizer (NER) that aids in labeling relation triples generated by the OIE model. Afterwards, the extracted structured data is canonicalized to build the KG by employing fusion techniques using word embeddings. As a result, security professionals can execute queries to retrieve valuable information from the Open-CyKG framework. Experimental results demonstrate that our proposed components that build up Open-CyKG outperform state-of-the-art models.1 (c) 2021 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).Algorithms and the Foundations of Software technolog

    Exploring research data management planning challenges in practice

    Get PDF
    Research data management planning (RDMP) is the process through which researchers first get acquainted with research data management (RDM) matters. In recent years, public funding agencies have implemented governmental policies for removing barriers to access to scientific information. Researchers applying for funding at public funding agencies need to define a strategy for guaranteeing that the acquired funds also yield high-quality and reusable research data. To achieve that, funding bodies ask researchers to elaborate on data management needs in documents called data management plans (DMP). In this study, we explore several organizational and technological challenges occurring during the planning phase of research data management, more precisely during the grant submission process. By doing so, we deepen our understanding of a crucial process within research data management and broaden our understanding of the current stakeholders, practices, and challenges in RDMP

    The Cybersecurity Focus Area Maturity (CYSFAM) model

    Get PDF
    Algorithms and the Foundations of Software technolog

    Automated business goal extraction from e-mail repositories to bootstrap business understanding

    Get PDF
    The Cross-Industry Standard Process for Data Mining (CRISP-DM), despite being the most popular data mining process for more than two decades, is known to leave those organizations lacking operational data mining experience puzzled and unable to start their data mining projects. This is especially apparent in the first phase of Business Understanding, at the conclusion of which, the data mining goals of the project at hand should be specified, which arguably requires at least a conceptual understanding of the knowledge discovery process. We propose to bridge this knowledge gap from a Data Science perspective by applying Natural Language Processing techniques (NLP) to the organizations' e-mail exchange repositories to extract explicitly stated business goals from the conversations, thus bootstrapping the Business Understanding phase of CRISP-DM. Our NLP-Automated Method for Business Understanding (NAMBU) generates a list of business goals which can subsequently be used for further specification of data mining goals. The validation of the results on the basis of comparison to the results of manual business goal extraction from the Enron corpus demonstrates the usefulness of our NAMBU method when applied to large datasets.Algorithms and the Foundations of Software technolog

    The effect of countermeasure readability on security intentions

    Get PDF
    Horizon 2020(H2020)883588Computer Systems, Imagery and Medi

    Theory of mind in freely-told children’s narratives: a classification approach

    Get PDF
    Children are the focal point for studying the link between language and Theory of Mind (ToM) competence. Language and ToM are often studied with younger children and standardized tests, but as both are social competences, data and methods with higher ecological validity are critical.We leverage a corpus of 442 freely-told stories by Dutch children aged 4-12, recorded in their everyday classroom environments, to study language and ToM with NLP-tools. We labelled stories according to the mental depth of story characters children create, as a proxy for their ToM competence ‘in action’, and built a classifier with features encoding linguistic competences identified in existing work as predictive of ToM.We obtain good and fairly robust results (F1-macro = .71), relative to the complexity of the task for humans. Our results are explainable in that we link specific linguistic features such as lexical complexity and sentential complementation, that are relatively independent of children’s ages, to higher levels of character depth. This confirms and extends earlier work, as our study includes older children and socially embedded data from a different domain. Overall, our results support the idea that language and ToM are strongly interlinked, and that in narratives the former can scaffold the latter.NWOVI.Veni.191C.051LIACS-Managemen
    • …
    corecore