Search results

1 – 10 of over 3000
Open Access
Article
Publication date: 2 May 2022

Samuli Laato, Miika Tiainen, A.K.M. Najmul Islam and Matti Mäntymäki

Inscrutable machine learning (ML) models are part of increasingly many information systems. Understanding how these models behave, and what their output is based on, is a…

10675

Abstract

Purpose

Inscrutable machine learning (ML) models are part of increasingly many information systems. Understanding how these models behave, and what their output is based on, is a challenge for developers let alone non-technical end users.

Design/methodology/approach

The authors investigate how AI systems and their decisions ought to be explained for end users through a systematic literature review.

Findings

The authors’ synthesis of the literature suggests that AI system communication for end users has five high-level goals: (1) understandability, (2) trustworthiness, (3) transparency, (4) controllability and (5) fairness. The authors identified several design recommendations, such as offering personalized and on-demand explanations and focusing on the explainability of key functionalities instead of aiming to explain the whole system. There exists multiple trade-offs in AI system explanations, and there is no single best solution that fits all cases.

Research limitations/implications

Based on the synthesis, the authors provide a design framework for explaining AI systems to end users. The study contributes to the work on AI governance by suggesting guidelines on how to make AI systems more understandable, fair, trustworthy, controllable and transparent.

Originality/value

This literature review brings together the literature on AI system communication and explainable AI (XAI) for end users. Building on previous academic literature on the topic, it provides synthesized insights, design recommendations and future research agenda.

Open Access
Article
Publication date: 27 October 2020

Aya Rizk, Anna Ståhlbröst and Ahmed Elragal

Within digital innovation, there are two significant consequences of the pervasiveness of digital technology: (1) the increasing connectivity is enabling a wider reach and scope…

2722

Abstract

Purpose

Within digital innovation, there are two significant consequences of the pervasiveness of digital technology: (1) the increasing connectivity is enabling a wider reach and scope of innovation structures, such as innovation networks and (2) the unprecedented availability of digital data is creating new opportunities for innovation. Accordingly, there is a growing domain for studying data-driven innovation (DDI), especially in contemporary contexts of innovation networks. The purpose of this study is to explore how DDI processes take form in a specific type of innovation networks, namely federated networks.

Design/methodology/approach

A multiple case study design is applied in this paper. We draw our analysis from data collected over six months from four cases of DDI. The within-analysis is aimed at constructing the DDI process instance in each case, while the crosscase analysis focuses on pattern matching and cross-case synthesis of common and unique characteristics in the constructed processes.

Findings

Evidence from the crosscase analysis suggests that the widely accepted four-phase digital innovation process (including discovery, development, diffusion and post-diffusion) does not account for the explorative nature of data analytics and DDI. We propose an extended process comprising an explicit exploration phase before development, where refinement of the innovation concept and exploring social relationships are essential. Our analysis also suggests two modes of DDI: (1) asynchronous, i.e. data acquired before development and (2) synchronous, i.e. data acquired after (or during) development. We discuss the implications of these modes on the DDI process and the participants in the innovation network.

Originality/value

The paper proposes an extended version of the digital innovation process that is more specifically suited for DDI. We also provide an early explanation to the variation in DDI process complexities by highlighting the different modes of DDI processes. To the best of our knowledge, this is the first empirical investigation of DDI following the process from early stages of discovery till postdiffusion.

Details

European Journal of Innovation Management, vol. 25 no. 6
Type: Research Article
ISSN: 1460-1060

Keywords

Open Access
Article
Publication date: 26 July 2023

Joni Salminen, João M. Santos, Soon-gyo Jung and Bernard J. Jansen

The “what is beautiful is good” (WIBIG) effect implies that observers tend to perceive physically attractive people in a positive light. The authors investigate how the WIBIG…

Abstract

Purpose

The “what is beautiful is good” (WIBIG) effect implies that observers tend to perceive physically attractive people in a positive light. The authors investigate how the WIBIG effect applies to user personas, measuring designers' perceptions and task performance when employing user personas for the design of information technology (IT) solutions.

Design/methodology/approach

In a user experiment, the authors tested six different personas with 235 participants that were asked to develop remote work solutions based on their interaction with a fictitious user persona.

Findings

The findings showed that a user persona's perceived attractiveness was positively correlated with other perceptions of the persona. The personas' completeness, credibility, empathy, likability and usefulness increased with attractiveness. More attractive personas were also perceived as more agreeable, emotionally stable, extraverted and open, and the participants spent more time engaging with personas they perceived attractive. A linguistic analysis indicated that the IT solutions created for more attractive user personas demonstrated a higher degree of affect, but for the most part, task outputs did not vary by the personas' perceived attractiveness.

Research limitations/implications

The WIBIG effect applies when designing IT solutions with user personas, but its effect on task outputs appears limited. The perceived attractiveness of a user persona can impact how designers interact with and engage with the persona, which can influence the quality or the type of the IT solutions created based on the persona. Also, the findings point to the need to incorporate hedonic qualities into the persona creation process. For example, there may be contexts where it is helpful that the personas be attractive; there may be contexts where the attractiveness of the personas is unimportant or even a distraction.

Practical implications

The findings point to the need to incorporate hedonic qualities into the persona creation process. For example, there may be contexts where it is helpful that the personas be attractive; there may be contexts where the attractiveness of the personas is unimportant or even a distraction.

Originality/value

Because personas are created to closely resemble real people, the authors might expect the WIBIG effect to apply. The WIBIG effect might lead decision makers to favor more attractive personas when designing IT solutions. However, despite its potential relevance for decision making with personas, as far as the authors know, no prior study has investigated whether the WIBIG effect extends to the context of personas. Overall, it is important to understand how human factors apply to IT system design with personas, so that the personas can be created to minimize potentially detrimental effects as much as possible.

Details

Information Technology & People, vol. 36 no. 8
Type: Research Article
ISSN: 0959-3845

Keywords

Open Access
Article
Publication date: 30 April 2021

Ahmad R. Pratama and Firman M. Firmansyah

In this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating…

2348

Abstract

Purpose

In this study, the authors seek to understand factors that naturally influence users to adopt two-factor authentication (2FA) without even trying to intervene by investigating factors within individuals that may influence their decision to adopt 2FA by themselves.

Design/methodology/approach

A total of 1,852 individuals from all 34 provinces in Indonesia participated in this study by filling out online questionnaires. The authors discussed the results from statistical analysis further through the lens of the loss aversion theory.

Findings

The authors found that loss aversion, represented by higher income that translates to greater potential pain caused by losing things to be the most significant demographic factor behind 2FA adoption. On the contrary, those with a low-income background, even if they have some college degree, are more likely to skip 2FA despite their awareness of this technology. The authors also found that the older generation, particularly females, to be among the most vulnerable groups when it comes to authentication-based cyber threats as they are much less likely to adopt 2FA, or even to be aware of its existence in the first place.

Originality/value

Authentication is one of the most important topics in cybersecurity that is related to human-computer interaction. While 2FA increases the security level of authentication methods, it also requires extra efforts that can translate to some level of inconvenience on the user's end. By identifying the associated factors from the user's ends, a necessary intervention can be made so that more users are willing to jump on the 2FA adopters' train.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 8 April 2021

Stefano Magistretti, Luis Allo, Roberto Verganti, Claudio Dell’Era and Felix Reutter

Mastering innovation in highly regulated markets might require companies to overcome significant barriers. Rules, laws and limitations on social, economic and institutional…

4236

Abstract

Purpose

Mastering innovation in highly regulated markets might require companies to overcome significant barriers. Rules, laws and limitations on social, economic and institutional dimensions can hinder the ability of a company to transfer knowledge within and across organizational boundaries. However, as recent research in innovation management increasingly advocates user involvement and early understanding of user needs as best practices, the inability to freely interact with customers due to highly regulated market restrictions can hinder the company’s capability to innovate. Hence, this paper aims to shed light on how an emerging managerial approach, such as Design Sprint, can support companies operating in highly regulated markets to overcome user involvement limitations and boost human-centered innovation.

Design/methodology/approach

This paper sheds light on how to boost innovation in a highly regulated market by leveraging an in-depth case study. The study investigates the use of the Design Sprint approach adopted by the pharmaceutical multinational Johnson & Johnson to revise the way its R&D department orchestrates the new product development process, overcoming the user involvement challenges of highly regulated markets.

Findings

In analyzing six different projects undertaken in the past two years, the findings illustrate three microfoundational dimensions of the Design Sprint approach in highly regulated markets, the so-called 3T model: team, time and tools. Indeed, deploying the Design Sprint in a highly regulated market has proven that being able to experiment in the early stages, building rough prototypes in real-time and openly collaborating with partners is crucial to boost innovation and anticipate constraints.

Originality/value

The paper sheds light on the Design Sprint approach by initially grounding an emerging managerial approach on organizational and management theory, leveraging the lens of microfoundations. In doing so, this study suggests how Design Sprint is based on the pillars of experimentation, knowledge transfer and co-creation usually neglected in highly regulated markets where user involvement is challenging. Finally, this study discloses the importance of using a design-based methodology in fostering innovation in highly regulated markets.

Details

Journal of Knowledge Management, vol. 25 no. 11
Type: Research Article
ISSN: 1367-3270

Keywords

Open Access
Article
Publication date: 19 May 2022

Akhilesh S Thyagaturu, Giang Nguyen, Bhaskar Prasad Rimal and Martin Reisslein

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long…

1039

Abstract

Purpose

Cloud computing originated in central data centers that are connected to the backbone of the Internet. The network transport to and from a distant data center incurs long latencies that hinder modern low-latency applications. In order to flexibly support the computing demands of users, cloud computing is evolving toward a continuum of cloud computing resources that are distributed between the end users and a distant data center. The purpose of this review paper is to concisely summarize the state-of-the-art in the evolving cloud computing field and to outline research imperatives.

Design/methodology/approach

The authors identify two main dimensions (or axes) of development of cloud computing: the trend toward flexibility of scaling computing resources, which the authors denote as Flex-Cloud, and the trend toward ubiquitous cloud computing, which the authors denote as Ubi-Cloud. Along these two axes of Flex-Cloud and Ubi-Cloud, the authors review the existing research and development and identify pressing open problems.

Findings

The authors find that extensive research and development efforts have addressed some Ubi-Cloud and Flex-Cloud challenges resulting in exciting advances to date. However, a wide array of research challenges remains open, thus providing a fertile field for future research and development.

Originality/value

This review paper is the first to define the concept of the Ubi-Flex-Cloud as the two-dimensional research and design space for cloud computing research and development. The Ubi-Flex-Cloud concept can serve as a foundation and reference framework for planning and positioning future cloud computing research and development efforts.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 16 August 2021

Shamal Faily, Claudia Iacob, Raian Ali and Duncan Ki-Aries

This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.

Abstract

Purpose

This paper aims to present a tool-supported approach for visualising personas as social goal models, which can subsequently be used to identify security tensions.

Design/methodology/approach

The authors devised an approach to partially automate the construction of social goal models from personas. The authors provide two examples of how this approach can identify previously hidden implicit vulnerabilities and validate ethical hazards faced by penetration testers and their safeguards.

Findings

Visualising personas as goal models makes it easier for stakeholders to see implications of their goals being satisfied or denied and designers to incorporate the creation and analysis of such models into the broader requirements engineering (RE) tool-chain.

Originality/value

The approach can be used with minimal changes to existing user experience and goal modelling approaches and security RE tools.

Details

Information & Computer Security, vol. 29 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 30 June 2020

Asefeh Asemi, Andrea Ko and Mohsen Nowkarizi

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of…

22043

Abstract

Purpose

This paper reviews literature on the application of intelligent systems in the libraries with a special issue on the ES/AI and Robot. Also, it introduces the potential of libraries to use intelligent systems, especially ES/AI and robots.

Design/methodology/approach

Descriptive and content review methods are applied, and the researchers critically reviewed the articles related to library ESs and robots from Web of Science as a general database and Emerald as a specific database in library and information science from 2007–2017. Four scopes considered to classify the articles as technology, service, user and resource. It is found that published researches on the intelligent systems have contributed to many librarian purposes like library technical services like the organization of information resources, storage and retrieval of information resources, library public services as reference services, information desk and other purposes.

Findings

A review of the previous studies shows that ESs are a useable intelligent system in library and information science that mimic librarian expert’s behaviors to support decision making and management. Also, it is shown that the current information systems have a high potential to be improved by integration with AI technologies. In this researches, librarian robots mostly designed for detection and replacing books on the shelf. Improving the technology of gripping, localizing and human-robot interaction are the main concern in recent librarian robot research. Our conclusion is that we need to develop research in the area of smart resources.

Originality/value

This study has a new approach to the literature review in this area. We compared the published papers in the field of ES/AI and robot and library from two databases, general and specific.

Open Access
Article
Publication date: 3 May 2022

Zakayo Kjellström

This paper aims to show how an illegal repository of literature, the Z-library, relates to and influences its users and how this relation is unique due to the illegal nature of…

3686

Abstract

Purpose

This paper aims to show how an illegal repository of literature, the Z-library, relates to and influences its users and how this relation is unique due to the illegal nature of the platform. The paper utilizes the idea of gamification to exemplify how to motivate users to contribute to a large shadow library in order to create the “world's largest e-book library,” sans “librarians.”

Design/methodology/approach

The study makes use of an ethnographic approach. It interrogates the functions of the website through intensive use—a close reading of sorts. The data provide a foundation for illustrating how illegal text repositories function at a surface level and how their design appeals to their user-base.

Findings

The paper provides a thorough and non-biased overview of how a “black open access” or “shadow library” site provides its users with pirated literature. It suggests that the lynchpin sustaining their functionality is a gamification of piracy designed to motivate a fragmented collective of individuals who work primarily for personal reward, rather than altruistic goals.

Research limitations/implications

Due to the design of the study, the findings are not universal or applicable to all illegal repositories of text. Readers and researchers are encouraged to apply the concept introduced here to other cases.

Social implications

This paper includes implication on the perception of literature piracy, how pirated literature is distributed and who performs the labor required to sustain illicit text repositories.

Originality/value

This paper provides a novel conceptual basis to study literature piracy.

Details

Journal of Documentation, vol. 78 no. 7
Type: Research Article
ISSN: 0022-0418

Keywords

Open Access
Article
Publication date: 4 April 2023

Qifeng Yan

This paper aims to provide a systematic literature review of the state-of-the-art applications of climate information in humanitarian relief efforts, to further the knowledge of…

Abstract

Purpose

This paper aims to provide a systematic literature review of the state-of-the-art applications of climate information in humanitarian relief efforts, to further the knowledge of how climate science can be better integrated into the decision-making process of humanitarian supply chains.

Design/methodology/approach

A systematic literature review was conducted using a combination of key search terms developed from both climate science and humanitarian logistics literature. Articles from four major databases were retrieved, reduced and analyzed.

Findings

The study illustrates the status of application of climate information in humanitarian work, and identifies usability, collaboration and coordination as three key themes.

Originality/value

By delivering an overview of the current applications and challenges of climate information, this literature review proposes a three-phase conceptual framework.

Details

Journal of Humanitarian Logistics and Supply Chain Management, vol. 13 no. 3
Type: Research Article
ISSN: 2042-6747

Keywords

1 – 10 of over 3000