Search results

1 – 8 of 8
Article
Publication date: 14 February 2024

Yaxi Liu, Chunxiu Qin, Yulong Wang and XuBu Ma

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search…

Abstract

Purpose

Exploratory search activities are ubiquitous in various information systems. Much potentially useful or even serendipitous information is discovered during the exploratory search process. Given its irreplaceable role in information systems, exploratory search has attracted growing attention from the information system community. Since few studies have methodically reviewed current publications, researchers and practitioners are unable to take full advantage of existing achievements, which, in turn, limits their progress in this field. Through a literature review, this study aims to recapitulate important research topics of exploratory search in information systems, providing a research landscape of exploratory search.

Design/methodology/approach

Automatic and manual searches were performed on seven reputable databases to collect relevant literature published between January 2005 and July 2023. The literature pool contains 146 primary studies on exploratory search in information system research.

Findings

This study recapitulated five important topics of exploratory search, namely, conceptual frameworks, theoretical frameworks, influencing factors, design features and evaluation metrics. Moreover, this review revealed research gaps in current studies and proposed a knowledge framework and a research agenda for future studies.

Originality/value

This study has important implications for beginners to quickly get a snapshot of exploratory search studies, for researchers to re-align current research or discover new interesting issues, and for practitioners to design information systems that support exploratory search.

Details

The Electronic Library , vol. 42 no. 2
Type: Research Article
ISSN: 0264-0473

Keywords

Open Access
Article
Publication date: 31 July 2023

Daniel Šandor and Marina Bagić Babac

Sarcasm is a linguistic expression that usually carries the opposite meaning of what is being said by words, thus making it difficult for machines to discover the actual meaning…

2955

Abstract

Purpose

Sarcasm is a linguistic expression that usually carries the opposite meaning of what is being said by words, thus making it difficult for machines to discover the actual meaning. It is mainly distinguished by the inflection with which it is spoken, with an undercurrent of irony, and is largely dependent on context, which makes it a difficult task for computational analysis. Moreover, sarcasm expresses negative sentiments using positive words, allowing it to easily confuse sentiment analysis models. This paper aims to demonstrate the task of sarcasm detection using the approach of machine and deep learning.

Design/methodology/approach

For the purpose of sarcasm detection, machine and deep learning models were used on a data set consisting of 1.3 million social media comments, including both sarcastic and non-sarcastic comments. The data set was pre-processed using natural language processing methods, and additional features were extracted and analysed. Several machine learning models, including logistic regression, ridge regression, linear support vector and support vector machines, along with two deep learning models based on bidirectional long short-term memory and one bidirectional encoder representations from transformers (BERT)-based model, were implemented, evaluated and compared.

Findings

The performance of machine and deep learning models was compared in the task of sarcasm detection, and possible ways of improvement were discussed. Deep learning models showed more promise, performance-wise, for this type of task. Specifically, a state-of-the-art model in natural language processing, namely, BERT-based model, outperformed other machine and deep learning models.

Originality/value

This study compared the performance of the various machine and deep learning models in the task of sarcasm detection using the data set of 1.3 million comments from social media.

Details

Information Discovery and Delivery, vol. 52 no. 2
Type: Research Article
ISSN: 2398-6247

Keywords

Open Access
Article
Publication date: 26 April 2024

Adela Sobotkova, Ross Deans Kristensen-McLachlan, Orla Mallon and Shawn Adrian Ross

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite…

Abstract

Purpose

This paper provides practical advice for archaeologists and heritage specialists wishing to use ML approaches to identify archaeological features in high-resolution satellite imagery (or other remotely sensed data sources). We seek to balance the disproportionately optimistic literature related to the application of ML to archaeological prospection through a discussion of limitations, challenges and other difficulties. We further seek to raise awareness among researchers of the time, effort, expertise and resources necessary to implement ML successfully, so that they can make an informed choice between ML and manual inspection approaches.

Design/methodology/approach

Automated object detection has been the holy grail of archaeological remote sensing for the last two decades. Machine learning (ML) models have proven able to detect uniform features across a consistent background, but more variegated imagery remains a challenge. We set out to detect burial mounds in satellite imagery from a diverse landscape in Central Bulgaria using a pre-trained Convolutional Neural Network (CNN) plus additional but low-touch training to improve performance. Training was accomplished using MOUND/NOT MOUND cutouts, and the model assessed arbitrary tiles of the same size from the image. Results were assessed using field data.

Findings

Validation of results against field data showed that self-reported success rates were misleadingly high, and that the model was misidentifying most features. Setting an identification threshold at 60% probability, and noting that we used an approach where the CNN assessed tiles of a fixed size, tile-based false negative rates were 95–96%, false positive rates were 87–95% of tagged tiles, while true positives were only 5–13%. Counterintuitively, the model provided with training data selected for highly visible mounds (rather than all mounds) performed worse. Development of the model, meanwhile, required approximately 135 person-hours of work.

Research limitations/implications

Our attempt to deploy a pre-trained CNN demonstrates the limitations of this approach when it is used to detect varied features of different sizes within a heterogeneous landscape that contains confounding natural and modern features, such as roads, forests and field boundaries. The model has detected incidental features rather than the mounds themselves, making external validation with field data an essential part of CNN workflows. Correcting the model would require refining the training data as well as adopting different approaches to model choice and execution, raising the computational requirements beyond the level of most cultural heritage practitioners.

Practical implications

Improving the pre-trained model’s performance would require considerable time and resources, on top of the time already invested. The degree of manual intervention required – particularly around the subsetting and annotation of training data – is so significant that it raises the question of whether it would be more efficient to identify all of the mounds manually, either through brute-force inspection by experts or by crowdsourcing the analysis to trained – or even untrained – volunteers. Researchers and heritage specialists seeking efficient methods for extracting features from remotely sensed data should weigh the costs and benefits of ML versus manual approaches carefully.

Social implications

Our literature review indicates that use of artificial intelligence (AI) and ML approaches to archaeological prospection have grown exponentially in the past decade, approaching adoption levels associated with “crossing the chasm” from innovators and early adopters to the majority of researchers. The literature itself, however, is overwhelmingly positive, reflecting some combination of publication bias and a rhetoric of unconditional success. This paper presents the failure of a good-faith attempt to utilise these approaches as a counterbalance and cautionary tale to potential adopters of the technology. Early-majority adopters may find ML difficult to implement effectively in real-life scenarios.

Originality/value

Unlike many high-profile reports from well-funded projects, our paper represents a serious but modestly resourced attempt to apply an ML approach to archaeological remote sensing, using techniques like transfer learning that are promoted as solutions to time and cost problems associated with, e.g. annotating and manipulating training data. While the majority of articles uncritically promote ML, or only discuss how challenges were overcome, our paper investigates how – despite reasonable self-reported scores – the model failed to locate the target features when compared to field data. We also present time, expertise and resourcing requirements, a rarity in ML-for-archaeology publications.

Details

Journal of Documentation, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 23 April 2024

Chen Zhong, Hong Liu and Hwee-Joo Kam

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity…

Abstract

Purpose

Cybersecurity competitions can effectively develop skills, but engaging a wide learner spectrum is challenging. This study aims to investigate the perceptions of cybersecurity competitions among Reddit users. These users constitute a substantial demographic of young individuals, often participating in communities oriented towards college students or cybersecurity enthusiasts. The authors specifically focus on novice learners who showed an interest in cybersecurity but have not participated in competitions. By understanding their views and concerns, the authors aim to devise strategies to encourage their continuous involvement in cybersecurity learning. The Reddit platform provides unique access to this significant demographic, contributing to enhancing and diversifying the cybersecurity workforce.

Design/methodology/approach

The authors propose to mine Reddit posts for information about learners’ attitudes, interests and experiences with cybersecurity competitions. To mine Reddit posts, the authors developed a text mining approach that integrates computational text mining and qualitative content analysis techniques, and the authors discussed the advantages of the integrated approach.

Findings

The authors' text mining approach was successful in extracting the major themes from the collected posts. The authors found that motivated learners would want to form a strategic way to facilitate their learning. In addition, hope and fear collide, which exposes the learners’ interests and challenges.

Originality/value

The authors discussed the findings to provide education and training experts with a thorough understanding of novice learners, allowing them to engage them in the cybersecurity industry.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 7 April 2022

Pierre Jouan and Pierre Hallot

The purpose of this paper is to address the challenging issue of developing a quantitative approach for the representation of cultural significance data in heritage information…

Abstract

Purpose

The purpose of this paper is to address the challenging issue of developing a quantitative approach for the representation of cultural significance data in heritage information systems (HIS). The authors propose to provide experts in the field with a dedicated framework to structure and integrate targeted data about historical objects' significance in such environments.

Design/methodology/approach

This research seeks the identification of key indicators which allow to better inform decision-makers about cultural significance. Identified concepts are formalized in a data structure through conceptual data modeling, taking advantage on unified modeling language (HIS). The design science research (DSR) method is implemented to facilitate the development of the data model.

Findings

This paper proposes a practical solution for the formalization of data related to the significance of objects in HIS. The authors end up with a data model which enables multiple knowledge representations through data analysis and information retrieval.

Originality/value

The framework proposed in this article supports a more sustainable vision of heritage preservation as the framework enhances the involvement of all stakeholders in the conservation and management of historical sites. The data model supports explicit communications of the significance of historical objects and strengthens the synergy between the stakeholders involved in different phases of the conservation process.

Details

Journal of Cultural Heritage Management and Sustainable Development, vol. 14 no. 3
Type: Research Article
ISSN: 2044-1266

Keywords

Article
Publication date: 21 April 2022

Zachary Ball, Jonathan Cagan and Kenneth Kotovsky

This study aims to gain a deeper understanding of the industry practice to guide the formation of support tools with a rigorous theoretical backing. Cross-functional teams are an…

Abstract

Purpose

This study aims to gain a deeper understanding of the industry practice to guide the formation of support tools with a rigorous theoretical backing. Cross-functional teams are an essential component in new product development (NPD) of complex products to promote comprehensive coverage of product design, marketing, sales, support as well as many other activities of business. Efficient use of teams can allow for greater technical competency coverage, increased creativity, reduced development times and greater consideration of ideas from a variety of stakeholders. While academics continually aspire to propose methods for improved team composition, there exists a gap between research directions and applications found within industry practice.

Design/methodology/approach

Through interviewing product development managers working across a variety of industries, this paper investigates the common practices of team utilization in an organizational setting. Following these interviews, this paper proposes a conceptual two-dimensional management support model aggregating the primary drivers of team success and providing direction to systematically address features of team management and composition.

Findings

Based on this work, product managers are recommended to continually address the positioning of members throughout the entire NPD process. In the early stages, individuals are to be placed to work on project components with explicit consideration toward the perceived complexity of tasks and individual competency. Throughout the development process, individuals’ positions vary based on new information while continued emphasis is placed on maintaining a shared understanding.

Originality/value

Bridging the gap between theory and application within product development teams is a necessary step toward improved product develop. Industrial settings require practical solutions that can be applied economically and efficiently within their organization. Theoretical reflections postulated by academia support improved team design; however, to achieve true success, they must be applicable when considering product development.

Details

Journal of Engineering, Design and Technology , vol. 22 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 23 April 2024

Lu Zhang, Pu Dong, Long Zhang, Bojiao Mu and Ahui Yang

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic…

Abstract

Purpose

This study aims to explore the dissemination and evolutionary path of online public opinion from a crisis management perspective. By clarifying the influencing factors and dynamic mechanisms of online public opinion dissemination, this study provides insights into attenuating the negative impact of online public opinion and creating a favorable ecological space for online public opinion.

Design/methodology/approach

This research employs bibliometric analysis and CiteSpace software to analyze 302 Chinese articles published from 2006 to 2023 in the China National Knowledge Infrastructure (CNKI) database and 276 English articles published from 1994 to 2023 in the Web of Science core set database. Through literature keyword clustering, co-citation analysis and burst terms analysis, this paper summarizes the core scientific research institutions, scholars, hot topics and evolutionary paths of online public opinion crisis management research from both Chinese and international academic communities.

Findings

The results show that the study of online public opinion crisis management in China and internationally is centered on the life cycle theory, which integrates knowledge from information, computer and system sciences. Although there are differences in political interaction and stage evolution, the overall evolutionary path is similar, and it develops dynamically in the “benign conflict” between the expansion of the research perspective and the gradual refinement of research granularity.

Originality/value

This study summarizes the research results of online public opinion crisis management from China and the international academic community and identifies current research hotspots and theoretical evolution paths. Future research can focus on deepening the basic theories of public opinion crisis management under the influence of frontier technologies, exploring the subjectivity and emotionality of web users using fine algorithms and promoting the international development of network public opinion crisis management theory through transnational comparison and international cooperation.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 9 May 2023

Jing Chen, Hongli Chen and Yingyun Li

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily…

Abstract

Purpose

Cross-app interactive search has become the new normal, but the characteristics of their tactic transitions are still unclear. This study investigated the transitions of daily search tactics during the cross-app interaction search process.

Design/methodology/approach

In total, 204 young participants' impressive cross-app search experiences in real daily situations were collected. The search tactics and tactic transition sequences in their search process were obtained by open coding. Statistical analysis and sequence analysis were used to analyze the frequently applied tactics, the frequency and probability of tactic transitions and the tactic transition sequences representing characteristics of tactic transitions occurring at the beginning, middle and ending phases. 

Findings

Creating the search statement (Creat), evaluating search results (EvalR), evaluating an individual item (EvalI) and keeping a record (Rec) were the most frequently applied tactics. The frequency and probability of transitions differed significantly between different tactic types. “Creat? EvalR? EvalI? Rec” is the typical path; Initiate the search in various ways and modifying the search statement were highlighted at the beginning phase; iteratively creating the search statement is highlighted in the middle phase; Moreover, utilization and feedback of information are highlighted at the ending phase. 

Originality/value

The present study shed new light on tactic transitions in the cross-app interactive environment to explore information search behaviour. The findings of this work provide targeted suggestions for optimizing APP query, browsing and monitoring systems.

Details

Information Technology & People, vol. 37 no. 3
Type: Research Article
ISSN: 0959-3845

Keywords

1 – 8 of 8