Search results

1 – 10 of 455
Open Access
Article
Publication date: 9 December 2022

Xuwei Pan, Xuemei Zeng and Ling Ding

With the continuous increase of users, resources and tags, social tagging systems gradually present the characteristics of “big data” such as large number, fast growth, complexity…

Abstract

Purpose

With the continuous increase of users, resources and tags, social tagging systems gradually present the characteristics of “big data” such as large number, fast growth, complexity and unreliable quality, which greatly increases the complexity of recommendation. The contradiction between the efficiency and effectiveness of recommendation service in social tagging is increasingly becoming prominent. The purpose of this study is to incorporate topic optimization into collaborative filtering to enhance both the effectiveness and the efficiency of personalized recommendations for social tagging.

Design/methodology/approach

Combining the idea of optimization before service, this paper presents an approach that incorporates topic optimization into collaborative recommendations for social tagging. In the proposed approach, the recommendation process is divided into two phases of offline topic optimization and online recommendation service to achieve high-quality and efficient personalized recommendation services. In the offline phase, the tags' topic model is constructed and then used to optimize the latent preference of users and the latent affiliation of resources on topics.

Findings

Experimental evaluation shows that the proposed approach improves both precision and recall of recommendations, as well as enhances the efficiency of online recommendations compared with the three baseline approaches. The proposed topic optimization–incorporated collaborative recommendation approach can achieve the improvement of both effectiveness and efficiency for the recommendation in social tagging.

Originality/value

With the support of the proposed approach, personalized recommendation in social tagging with high quality and efficiency can be achieved.

Details

Data Technologies and Applications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2514-9288

Keywords

Content available
Article
Publication date: 17 August 2010

George Macgregor

827

Abstract

Details

Library Review, vol. 59 no. 7
Type: Research Article
ISSN: 0024-2535

Keywords

Open Access
Article
Publication date: 8 February 2023

Kibbeum Na and Kwanghee Han

Gamification is a booming motivational approach in information systems. Leaderboards play a key role in gamification; however, there are mixed findings regarding the heterogeneous…

4064

Abstract

Purpose

Gamification is a booming motivational approach in information systems. Leaderboards play a key role in gamification; however, there are mixed findings regarding the heterogeneous motivational impacts of leaderboard positions. This study aims to clarify the motivational effects of high and low leaderboard positions by assembling diverse behavioral measures and self-reports. The measures used in this study shed a light on the quantitative and qualitative dynamics of motivation facilitated by leaderboard positions. The authors inspect motivation in relation to satisfaction and frustration of competence need.

Design/methodology/approach

The authors conducted an online experiment set in a crowdsourcing context, asking the participants to compete in an image tagging game. Participants' leaderboard positions were manipulated to be either high or low for five consecutive rounds. The number of clicks, tags, duration of tagging and persistence on the task were measured as indicators of motivation.

Findings

High ranks on leaderboards induced complacent behaviors choosing easy ways to maintain their positions, while low ranks led the participants to stick to the right process of the task with intensified motivation round after round. However, neither of the motivations seemed to be of intrinsic nature.

Originality/value

The present study provides conclusive evidence on the varying motivational impact of leaderboard positions. The authors also demonstrate how the “needs-as-motive” model (Sheldon and Gunz, 2009) applies to gamification. Its implications in self-determination theory and gamification literature are discussed.

Details

Internet Research, vol. 33 no. 7
Type: Research Article
ISSN: 1066-2243

Keywords

Open Access
Article
Publication date: 13 September 2018

Patrick O’Brien, Scott W.H. Young, Kenning Arlitsch and Karl Benedict

The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the…

7667

Abstract

Purpose

The purpose of this paper is to examine the extent to which HTTPS encryption and Google Analytics services have been implemented on academic library websites, and discuss the privacy implications of free services that introduce web tracking of users.

Design/methodology/approach

The home pages of 279 academic libraries were analyzed for the presence of HTTPS, Google Analytics services and privacy-protection features.

Findings

Results indicate that HTTPS implementation on library websites is not widespread, and many libraries continue to offer non-secured connections without an automatically enforced redirect to a secure connection. Furthermore, a large majority of library websites included in the study have implemented Google Analytics and/or Google Tag Manager, yet only very few connect securely to Google via HTTPS or have implemented Google Analytics IP anonymization.

Practical implications

Librarians are encouraged to increase awareness of this issue and take concerted and coherent action across five interrelated areas: implementing secure web protocols (HTTPS), user education, privacy policies, informed consent and risk/benefit analyses.

Originality/value

Third-party tracking of users is prevalent across the web, and yet few studies demonstrate its extent and consequences for academic library websites.

Details

Online Information Review, vol. 42 no. 6
Type: Research Article
ISSN: 1468-4527

Keywords

Open Access
Article
Publication date: 21 March 2022

Wei Xiong, Ziyi Xiong and Tina Tian

The performance of behavioral targeting (BT) mainly relies on the effectiveness of user classification since advertisers always want to target their advertisements to the most…

1565

Abstract

Purpose

The performance of behavioral targeting (BT) mainly relies on the effectiveness of user classification since advertisers always want to target their advertisements to the most relevant users. In this paper, the authors frame the BT as a user classification problem and describe a machine learning–based approach for solving it.

Design/methodology/approach

To perform such a study, two major research questions are investigated: the first question is how to represent a user’s online behavior. A good representation strategy should be able to effectively classify users based on their online activities. The second question is how different representation strategies affect the targeting performance. The authors propose three user behavior representation methods and compare them empirically using the area under the receiver operating characteristic curve (AUC) as a performance measure.

Findings

The experimental results indicate that ad campaign effectiveness can be significantly improved by combining user search queries, clicked URLs and clicked ads as a user profile. In addition, the authors also explore the temporal aspect of user behavior history by investigating the effect of history length on targeting performance. The authors note that an improvement of approximately 6.5% in AUC is achieved when user history is extended from 1 day to 14 days, which is substantial in targeting performance.

Originality/value

This paper confirms the effectiveness of BT on user classification and provides a validation of BT for Internet advertising.

Details

Journal of Internet and Digital Economics, vol. 2 no. 1
Type: Research Article
ISSN: 2752-6356

Keywords

Open Access
Article
Publication date: 14 August 2017

Jose Ignacio Tamayo Segarra, Bilal Al Jammal and Hakima Chaouchi

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on…

2895

Abstract

Purpose

Internet of Things’ (IoT’s) first wave started with tracking services for better inventory management mainly using radio frequency identification (RFID) technology. Later on, monitoring services became one of the major interests, including sensing technologies, and then more actuation for remote control-type of IoT applications such as smart homes, smart cities and Industry 4.0. In this paper, the authors focus on the RFID technology impairment. They propose to take advantage of the mature IoT technologies that offer native service discovery such as blutooth or LTE D2D ProSe or Wifi Direct. Using the automatic service discovery in the new framework will make heterogeneous readers aware of the presence of other readers and this will be used by the proposed distributed algorithm to better control the multiple RFID reader interference problem. The author clearly considers emerging Industry 4.0 use case, where RFID technology is of major interest for both identification and tracking. To enhance the RFID tag reading performance, collisions in the RFID frequency should be minimized with reader-to-reader coordination protocols. In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation.

Design/methodology/approach

In this paper, the author proposes a simple distributed reader anti-collision protocol named DiSim that makes use of proximity services of IoT network and is compliant with the current RFID standards. The author evaluates the efficiency of the proposal via simulation to study its behavior in very dense and heterogeneous RFID environments. Specifically, the author explores the coexistence of powerful static readers and small mobile readers, comparing the proposal with a standard ETSI CSMA method. The proposal reduces significantly the number of access attempts, which are resource-expensive for the readers. The results show that the objectives of DiSim are met, producing low reader collision probability and, however, having lower average readings per reader per time.

Findings

DiSim is evaluated with the ETSI standard LBT protocol for multi-reader environments in several environments with varied levels of reader and tag densities, having both static powerful RFID readers and heterogeneous randomly moving mobile RFID readers. It effectively reduces the number of backoffs or contentions for the RFID channel. This has high reading success rate due to the avoided collisions; however, the readers are put to wait, and DiSim has less average readings per reader per time. As an additional side evaluation, the ETSI standard LBT mechanism was found to present a good performance for low-density mid-coverage scenarios, however, with high variability on the evaluation results.

Research limitations/implications

To show more results, the author needs to do real experimentation in a warehouse, such as Amazon warehouse, where he expects to have more and more robots, start shelves, automatic item finding on the shelve, etc.

Practical implications

Future work considers experimentation in a real warehouse equipped with heterogeneous RFID readers and real-time analysis of RFID reading efficiency also combined with indoor localization and navigation for warehouse mobile robots.

Social implications

More automatization is expected in the future; this work makes the use of RFID technology more efficient and opens more possibilities for services deployment in different domains such as the industry which was considered not only in this paper but also in smart cites and smart homes.

Originality/value

Compared to the literature, the proposal offers the advantage to not be dependent on a centralized server controlling the RFID readers. It also offers the possibility for an existing RFID architecture to add new readers from a different manufacturer, as the readers using the approach will have the possibility to discover the capabilities of the new interaction other RFID readers. This solution takes advantage of the available proximity service that will be more and more offered by the IoT technologies.

Open Access
Article
Publication date: 25 September 2018

Ruwini Edirisinghe

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of…

23363

Abstract

Purpose

The future construction site will be pervasive, context aware and embedded with intelligence. The purpose of this paper is to explore and define the concept of the digital skin of the future smart construction site.

Design/methodology/approach

The paper provides a systematic and hierarchical classification of 114 articles from both industry and academia on the digital skin concept and evaluates them. The hierarchical classification is based on application areas relevant to construction, such as augmented reality, building information model-based visualisation, labour tracking, supply chain tracking, safety management, mobile equipment tracking and schedule and progress monitoring. Evaluations of the research papers were conducted based on three pillars: validation of technological feasibility, onsite application and user acceptance testing.

Findings

Technologies learned about in the literature review enabled the envisaging of the pervasive construction site of the future. The paper presents scenarios for the future context-aware construction site, including the construction worker, construction procurement management and future real-time safety management systems.

Originality/value

Based on the gaps identified by the review in the body of knowledge and on a broader analysis of technology diffusion, the paper highlights the research challenges to be overcome in the advent of digital skin. The paper recommends that researchers follow a coherent process for smart technology design, development and implementation in order to achieve this vision for the construction industry.

Details

Engineering, Construction and Architectural Management, vol. 26 no. 2
Type: Research Article
ISSN: 0969-9988

Keywords

Open Access
Article
Publication date: 24 January 2022

Yu Xiang

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

1749

Abstract

Purpose

This paper aims to examine the recommendation system of the video-sharing website YouTube to study how control of users is effected on online platforms.

Design/methodology/approach

This paper conceptualises algorithmic systems as protocols – technological and social infrastructures that both facilitate and govern interactions between autonomous actors (Galloway and Thacker, 2004, 2007). It adopts a netnographic approach (Kozinets, 2002) to study not only the formal, technological systems of the platform but also the systems as they were made sense of, understood and enacted upon by actors. It relies both on information as revealed by the organisation itself, as well as discussions between lay users in online forums and press coverage.

Findings

The results of this study indicate that the ways in which platforms selectively facilitate interactions between users constitute a form of control. While maintaining the appearance of an open and neutral marketplace, interactions on the platform are in fact highly structured. The system relies on the surveillance of user interactions to rapidly identify and propagate marketable contents, so as to maximise user “engagement” and ad revenue. The systems place few demands or restrictions on individual users, instead control is effected in a probabilistic fashion, over the population of users as a whole, so as to, in aggregate, accomplish organisational goal.

Originality/value

This paper contributes to the literature on accounting and control practices in online spaces, by extending the notion of control beyond overt rankings and evaluations, to the underlying technical and social infrastructures that facilitate and shape interactions.

Details

Qualitative Research in Accounting & Management, vol. 19 no. 3
Type: Research Article
ISSN: 1176-6093

Keywords

Open Access
Article
Publication date: 21 June 2019

Jiemin Zhong, Haoran Xie and Fu Lee Wang

A recommendation algorithm is typically applied to speculate on users’ preferences based on their behavioral characteristics. The purpose of this paper is to provide a systematic…

4670

Abstract

Purpose

A recommendation algorithm is typically applied to speculate on users’ preferences based on their behavioral characteristics. The purpose of this paper is to provide a systematic review of recommendation systems by collecting related journal articles from the last five years (i.e. from 2014 to 2018). This paper aims to study the correlations between recommendation technologies and e-learning systems.

Design/methodology/approach

The paper reviews the relevant articles using five assessment aspects. A coding scheme was put forward that includes the following: the metrics for the e-learning system, the evaluation metrics for the recommendation algorithms, the recommendation filtering technology, the phases of the recommendation process and the learning outcomes of the system.

Findings

The research indicates that most e-learning systems will adopt the adaptive mechanism as a primary metric, and accuracy is a vital evaluation indicator for recommendation algorithms. In existing e-learning recommender systems, the most common recommendation filtering technology is hybrid filtering. The information collection phase is an important process recognized by most studies. Finally, the learning outcomes of the recommender system can be achieved through two key indicators: affections and correlations.

Originality/value

The recommendation technology works effectively in closing the gap between the information producer and the information consumer. This technology could help learners find the information they are interested in as well as send them a valuable message. The opportunities and challenges of the current study are discussed; the results of this study could provide a guideline for future research.

Details

Asian Association of Open Universities Journal, vol. 14 no. 1
Type: Research Article
ISSN: 2414-6994

Keywords

Open Access
Article
Publication date: 25 April 2020

Sebastian Maximilian Dennerlein, Vladimir Tomberg, Tamsin Treasure-Jones, Dieter Theiler, Stefanie Lindstaedt and Tobias Ley

Introducing technology at work presents a special challenge as learning is tightly integrated with workplace practices. Current design-based research (DBR) methods are focused on…

2156

Abstract

Purpose

Introducing technology at work presents a special challenge as learning is tightly integrated with workplace practices. Current design-based research (DBR) methods are focused on formal learning context and often questioned for a lack of yielding traceable research insights. This paper aims to propose a method that extends DBR by understanding tools as sociocultural artefacts, co-designing affordances and systematically studying their adoption in practice.

Design/methodology/approach

The iterative practice-centred method allows the co-design of cognitive tools in DBR, makes assumptions and design decisions traceable and builds convergent evidence by consistently analysing how affordances are appropriated. This is demonstrated in the context of health-care professionals’ informal learning, and how they make sense of their experiences. The authors report an 18-month DBR case study of using various prototypes and testing the designs with practitioners through various data collection means.

Findings

By considering the cognitive level in the analysis of appropriation, the authors came to an understanding of how professionals cope with pressure in the health-care domain (domain insight); a prototype with concrete design decisions (design insight); and an understanding of how memory and sensemaking processes interact when cognitive tools are used to elaborate representations of informal learning needs (theory insight).

Research limitations/implications

The method is validated in one long-term and in-depth case study. While this was necessary to gain an understanding of stakeholder concerns, build trust and apply methods over several iterations, it also potentially limits this.

Originality/value

Besides generating traceable research insights, the proposed DBR method allows to design technology-enhanced learning support for working domains and practices. The method is applicable in other domains and in formal learning.

Details

Information and Learning Sciences, vol. 121 no. 3/4
Type: Research Article
ISSN: 2398-5348

Keywords

1 – 10 of 455