Research Challenges in Information Science: 14th International Conference, RCIS 2020, Limassol, Cyprus, September 23–25, 2020, Proceedings

s of Invited Talks Explainable AI is Not Yet Understandable AI

[1]  Joonas Tuhkuri,et al.  ETLAnow: A Model for Forecasting with Big Data – Forecasting Unemployment with Google Searches in Europe , 2016 .

[2]  Thorsten Brants,et al.  One billion word benchmark for measuring progress in statistical language modeling , 2013, INTERSPEECH.

[3]  Mayuram S. Krishnan,et al.  The Personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization , 2006, MIS Q..

[4]  J. Euzenat,et al.  Ontology Matching , 2007, Springer Berlin Heidelberg.

[5]  Paul Johannesson,et al.  Is the Public Motivated to Engage in Open Data Innovation? , 2014, EGOV.

[6]  van der Wmp Wil Aalst,et al.  Business process simulation : how to get it right? , 2008 .

[7]  Frank Piessens,et al.  All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS , 2015, USENIX Annual Technical Conference.

[8]  Adriana Marotta,et al.  Data Quality Evaluation in Document Oriented Data Stores , 2018, ER Workshops.

[9]  Prabhakar M. Dixit,et al.  Interactive process mining , 2019 .

[10]  Bryan Pfaffenberger,et al.  The rhetoric of dread: Fear, uncertainty, and doubt (FUD) in information technology marketing , 2000 .

[11]  Asunción Gómez-Pérez,et al.  METHONTOLOGY: From Ontological Art Towards Ontological Engineering , 1997, AAAI 1997.

[12]  Touradj Ebrahimi,et al.  A Reliable and Reversible Image Privacy Protection Based on False Colors , 2018, IEEE Transactions on Multimedia.

[13]  Hal Daumé,et al.  Deep Unordered Composition Rivals Syntactic Methods for Text Classification , 2015, ACL.

[14]  Robert Feldt,et al.  Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry , 2012, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation.

[15]  Max Mühlhäuser,et al.  Analyzing business process anomalies using autoencoders , 2018, Machine Learning.

[16]  Xavier Franch,et al.  Natural Language Processing for Requirements Engineering: The Best Is Yet to Come , 2018, IEEE Software.

[17]  Connie R. Wanberg,et al.  The individual experience of unemployment. , 2012, Annual review of psychology.

[18]  Helena Holmström Olsson,et al.  JAutomate: A Tool for System- and Acceptance-test Automation , 2013, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation.

[19]  Deborah Lee,et al.  I Trust It, but I Don’t Know Why , 2013, Hum. Factors.

[20]  Andreas Kerren,et al.  Text visualization techniques: Taxonomy, visual survey, and community insights , 2015, 2015 IEEE Pacific Visualization Symposium (PacificVis).

[21]  WebsterJane,et al.  Analyzing the past to prepare for the future , 2002 .

[22]  Steven L. Alter The concept of ‘IT artifact’ has outlived its usefulness and should be retired now , 2015, Inf. Syst. J..

[23]  José Matías Rivero,et al.  Challenges for the Adoption of Model-Driven Web Engineering Approaches in Industry , 2017, J. Web Eng..

[24]  Shirley Gregor,et al.  The Anatomy of a Design Theory , 2007, J. Assoc. Inf. Syst..

[25]  Arto Vihavainen,et al.  Learning agile software engineering practices using coding dojo , 2013, SIGITE Conference.

[26]  Gabriele Bavota,et al.  Release Planning of Mobile Apps Based on User Reviews , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[27]  Marcela Genero,et al.  A systematic identification of consistency rules for UML diagrams , 2018, J. Syst. Softw..

[28]  Slobodan Vucetic,et al.  Travel Speed Forecasting by Means of Continuous Conditional Random Fields , 2011 .

[29]  Wil M. P. van der Aalst Business Process Simulation Revisited , 2010, EOMAS.

[30]  Christoph Meinel,et al.  Punctuation Prediction for Unsegmented Transcript Based on Word Vector , 2016, LREC.

[31]  James P. Peerenboom,et al.  Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .

[32]  Qi Feng,et al.  A business process simulation method supporting resource evolution , 2014, ICSSP 2014.

[33]  Johnny Saldaña,et al.  The Coding Manual for Qualitative Researchers , 2009 .

[34]  Marc Cuggia,et al.  The French Health Data Hub and the German Medical Informatics Initiatives: Two National Projects to Promote Data Sharing in Healthcare , 2019, Yearbook of Medical Informatics.

[35]  Josivania Silva Farias,et al.  The Motivation to Participate in Citizen-Sourcing and Hackathons in the Public Sector , 2018, BAR - Brazilian Administration Review.

[36]  Tanja E. J. Vos,et al.  TESTAR: Tool Support for Test Automation at the User Interface Level , 2015, Int. J. Inf. Syst. Model. Des..

[37]  Jérôme Euzenat,et al.  An API for Ontology Alignment , 2004, SEMWEB.

[38]  Monique Snoeck,et al.  CaMeLOT: An educational framework for conceptual data modelling , 2019, Inf. Softw. Technol..

[39]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[40]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[41]  S. Pfleeger,et al.  From Weakest Link to Security Hero: Transforming Staff Security Behavior , 2014 .

[42]  Jeffrey D. Ullman,et al.  Implementing data cubes efficiently , 1996, SIGMOD '96.

[43]  Judith Masthoff,et al.  Kindness is Contagious: Exploring Engagement in a Gamified Persuasive Intervention for Wellbeing , 2017, PGW@CHI PLAY.

[44]  John Mylopoulos,et al.  A Core Ontology for Privacy Requirements Engineering , 2018, ArXiv.

[45]  Wil M. P. van der Aalst,et al.  On the Representational Bias in Process Mining , 2011, 2011 IEEE 20th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[46]  Ilia Bider In Search for a Good Theory: Commuting between Research and Practice in Business Process Domain , 2011, BMMDS/EMMSAD.

[47]  Matteo Golfarelli,et al.  Approximate OLAP of document-oriented databases: A variety-aware approach , 2019, Inf. Syst..

[48]  Jonathan I. Maletic,et al.  Journal of Software Maintenance and Evolution: Research and Practice Survey a Survey and Taxonomy of Approaches for Mining Software Repositories in the Context of Software Evolution , 2022 .

[49]  Max Jacobson,et al.  A Pattern Language: Towns, Buildings, Construction , 1981 .

[50]  Udo Kelter,et al.  Understanding model evolution through semantically lifting model differences with SiLift , 2012, 2012 28th IEEE International Conference on Software Maintenance (ICSM).

[51]  Tanja E. J. Vos,et al.  Industrial Scaled Automated Structural Testing with the Evolutionary Testing Tool , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.

[52]  Bernd Brügge,et al.  Semiautomatic security requirements engineering and evolution using decision documentation, heuristics, and user monitoring , 2014, 2014 IEEE 1st International Workshop on Evolving Security and Privacy Requirements Engineering (ESPRE).

[53]  Ekkart Kindler,et al.  Incremental Workflow Mining Based on Document Versioning Information , 2005, ISPW.

[54]  Peter Bell,et al.  Sequence-to-sequence models for punctuated transcription combining lexical and acoustic features , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[55]  John Mylopoulos,et al.  GaiusT: supporting the extraction of rights and obligations for regulatory compliance , 2013, Requirements Engineering.

[56]  Jacques Derrida,et al.  L'écriture Et La Différence , 1967 .

[57]  Jens Bürger Recovering Security in Model-Based Software Engineering by Context-Driven Co-Evolution , 2019 .

[58]  Yang Song,et al.  Learning Fine-Grained Image Similarity with Deep Ranking , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[59]  Gregg Rothermel,et al.  Comparing model-based and dynamic event-extraction based GUI testing techniques: An empirical study , 2014, J. Syst. Softw..

[60]  Anna Goldenberg,et al.  What Clinicians Want: Contextualizing Explainable Machine Learning for Clinical End Use , 2019, MLHC.

[61]  Camille Salinesi,et al.  A Security Ontology for Security Requirements Elicitation , 2015, ESSoS.

[62]  R. F. Hull,et al.  Zen in the Art of Archery , 1948 .

[63]  Wil M. P. van der Aalst,et al.  Incremental Discovery of Hierarchical Process Models , 2020, RCIS.

[64]  Mark Giancaspro,et al.  Is a 'smart contract' really a smart idea? Insights from a legal perspective , 2017, Comput. Law Secur. Rev..

[65]  Irina O. Rajewsky Intermediality, Intertextuality, and Remediation: A Literary Perspective on Intermediality , 2005 .

[66]  Kohei Honda,et al.  An Interaction-based Language and its Typing System , 1994, PARLE.

[67]  Eddie Hughes Unlocking Blockchain: Embracing New Technologies to Drive Efficiency and Empower the Citizen , 2018, The Journal of the British Blockchain Association.

[68]  King Sing Cheung,et al.  Consistency Analysis on Lifecycle Model and Interaction Model , 1998 .

[69]  Rachida Dssouli,et al.  Big Data Pre-processing: A Quality Framework , 2015, 2015 IEEE International Congress on Big Data.

[70]  Or Biran,et al.  Explanation and Justification in Machine Learning : A Survey Or , 2017 .

[71]  Nyi Nyi Htun,et al.  Effects of personal characteristics in control-oriented user interfaces for music recommender systems , 2019, User Modeling and User-Adapted Interaction.

[72]  Felipe Caro,et al.  Zara Uses Operations Research to Reengineer Its Global Distribution Process , 2010, Interfaces.

[73]  Tim Miller,et al.  Explanation in Artificial Intelligence: Insights from the Social Sciences , 2017, Artif. Intell..

[74]  Hans K. Hvide Tournament Rewards and Risk Taking , 1999, Journal of Labor Economics.

[75]  Claes Wohlin,et al.  Experimentation in Software Engineering , 2000, The Kluwer International Series in Software Engineering.

[76]  C. Lejeune Montrer, calculer, explorer, analyser. Ce que l'informatique fait (faire) à l'analyse qualitative , 2010 .

[77]  Tariq M. King,et al.  Using WReSTT in SE courses: an empirical study , 2012, SIGCSE '12.

[78]  Quoc V. Le,et al.  QANet: Combining Local Convolution with Global Self-Attention for Reading Comprehension , 2018, ICLR.

[79]  Mathias Weske,et al.  Disambiguation of DMN Decision Tables , 2018, BIS.

[80]  Robert Feldt,et al.  Visual GUI testing in practice: challenges, problemsand limitations , 2015, Empirical Software Engineering.

[81]  Dimitrios Kouzapas,et al.  Privacy by typing in the π-calculus , 2017, Log. Methods Comput. Sci..

[82]  Ilia Bider,et al.  Structural Coupling, Strategy and Fractal Enterprise Modeling , 2020, RCIS.

[83]  Athanasios Kehagias,et al.  A note on the refinement of ontologies , 2000, Int. J. Intell. Syst..

[84]  Pankesh Patel,et al.  Enabling high-level application development for the Internet of Things , 2015, J. Syst. Softw..

[85]  Jagruti D. Parmar,et al.  Anomaly Detection in Data Mining: A Review , 2017 .

[86]  Frank Eliassen,et al.  A resource oriented integration architecture for the Internet of Things: A business process perspective , 2015, Pervasive Mob. Comput..

[87]  David W. Embley,et al.  Big Data - Conceptual Modeling to the Rescue , 2013, ER.

[88]  Slim Abdennadher,et al.  Character Computing: Computer Science meets Psychology , 2018, MUM.

[89]  Mohsen Guizani,et al.  BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[90]  Keng Siau,et al.  Can UML Be Simplified? Practitioner Use of UML in Separate Domains , 2007, EMMSAD.

[91]  Pável Calado,et al.  RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies , 2018, Requirements Engineering.

[92]  Ying Liu,et al.  Organizational Control, Incentive Contracts, and Knowledge Transfer in Offshore Business Process Outsourcing , 2015, Inf. Syst. Res..

[93]  Sebastian G. Elbaum,et al.  Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable , 2007, 29th International Conference on Software Engineering (ICSE'07).

[94]  Christoph Trattner,et al.  Towards Health (Aware) Recommender Systems , 2017, DH.

[95]  M. Goldstein,et al.  Health information privacy and health information technology in the US correctional setting. , 2014, American journal of public health.

[96]  Iryna Gurevych,et al.  Concatenated Power Mean Word Embeddings as Universal Cross-Lingual Sentence Representations , 2018, 1803.01400.

[97]  Jens Bürger,et al.  Model-Based Security Engineering: Managed Co-evolution of Security Knowledge and Software Models , 2013, FOSAD.

[98]  Christian Catalini,et al.  Blockchain Technology for Healthcare: Facilitating the Transition to Patient-Driven Interoperability , 2018, Computational and structural biotechnology journal.

[99]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[100]  Nobuko Yoshida,et al.  Multiparty asynchronous session types , 2008, POPL '08.

[101]  Assaf Marron,et al.  A Context-Based Behavioral Language for IoT , 2018, MoDELS.

[102]  Rommel N. Carvalho,et al.  Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).

[103]  Fred Popowich,et al.  Visualizing RNN States with Predictive Semantic Encodings , 2019, 2019 IEEE Visualization Conference (VIS).

[104]  Ellen Francine Barbosa,et al.  Educational games: A contribution to software testing education , 2017, 2017 IEEE Frontiers in Education Conference (FIE).

[105]  T. J. Teorey,et al.  A logical design methodology for relational databases using the extended entity-relationship model , 1986, CSUR.

[106]  Norman M. Sadeh,et al.  PrivOnto: A semantic framework for the analysis of privacy policies , 2017 .

[107]  Rita Asplund Unemployment among Finnish Manufacturing Workers. Who Gets Unemployed and from Where , 2000 .

[108]  Vivian W. Mott Knowledge comes from practice: Reflective theory building in practice , 1996 .

[109]  Beatriz Marín,et al.  Learning Conceptual Modeling Design Through the Classutopia Serious Game , 2018, Int. J. Softw. Eng. Knowl. Eng..

[110]  Vasco Thudichum Vasconcelos,et al.  Language Primitives and Type Discipline for Structured Communication-Based Programming Revisited: Two Systems for Higher-Order Session Communication , 1998, SecReT@ICALP.

[111]  Alia El Bolock,et al.  Character Computing , 2020 .

[112]  Olegas Vasilecas,et al.  An approach for allocation of shared resources in the rule-based business process simulation , 2016, CompSysTech.

[113]  Michael I. Jordan,et al.  Distance Metric Learning with Application to Clustering with Side-Information , 2002, NIPS.

[114]  Xiang 'Anthony' Chen,et al.  Outlining the Design Space of Explainable Intelligent Systems for Medical Diagnosis , 2019, IUI Workshops.

[115]  Robert Shimer,et al.  Reassessing the Ins and Outs of Unemployment , 2007 .

[116]  Beatriz Marín,et al.  Testing of model-driven development applications , 2017, Software Quality Journal.

[117]  Kin K. Leung,et al.  A Survey of Incentive Mechanisms for Participatory Sensing , 2015, IEEE Communications Surveys & Tutorials.

[118]  Maria Pantoja,et al.  Introduction to Deep Learning , 2018, Deep Learning.

[119]  John Mylopoulos,et al.  Ontologies for Privacy Requirements Engineering: A Systematic Literature Review , 2016, ArXiv.

[120]  Themis Palpanas,et al.  Model-Driven Dashboards for Business Performance Reporting , 2006, 2006 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC'06).

[121]  Giancarlo Guizzardi,et al.  Ontology, Ontologies and the “I” of FAIR , 2020, Data Intelligence.

[122]  Rebecca Smith,et al.  An Automated System for Interactively Learning Software Testing , 2017, ITiCSE.

[123]  Sunghyun Cho,et al.  A Survey of Scalability Solutions on Blockchain , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).

[124]  Kurt Sandkuhl,et al.  Architecting Service-Dominant Digital Products , 2018, ENASE.

[125]  Erik Wilde,et al.  From the Internet of Things to the Web of Things: Resource-oriented Architecture and Best Practices , 2011, Architecting the Internet of Things.

[126]  Quoc V. Le,et al.  Distributed Representations of Sentences and Documents , 2014, ICML.

[127]  D. Elbourne,et al.  Systematic review of the Hawthorne effect: New concepts are needed to study research participation effects☆ , 2014, Journal of clinical epidemiology.

[128]  Carl Anderson Creating a Data-Driven Organization , 2015 .

[129]  Stephen H. Edwards,et al.  Responses to adaptive feedback for software testing , 2014, ITiCSE '14.

[130]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[131]  Ségolène Aymé,et al.  Empowerment of patients: lessons from the rare diseases community , 2008, The Lancet.

[132]  Franck Dernoncourt,et al.  PubMed 200k RCT: a Dataset for Sequential Sentence Classification in Medical Abstracts , 2017, IJCNLP.

[133]  Ilia Bider,et al.  A fractal enterprise model and its application for business development , 2017, Software & Systems Modeling.

[134]  John Mylopoulos,et al.  Nòmos 3: Reasoning about regulatory compliance of requirements , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).

[135]  Mehrdad Sabetzadeh,et al.  Using Models to Enable Compliance Checking Against the GDPR: An Experience Report , 2019, 2019 ACM/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems (MODELS).

[136]  Holger Schwenk,et al.  Supervised Learning of Universal Sentence Representations from Natural Language Inference Data , 2017, EMNLP.

[137]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[138]  Christian S. Perone,et al.  Evaluation of sentence embeddings in downstream and linguistic probing tasks , 2018, ArXiv.

[139]  Beatriz Marín,et al.  A Methodological Framework for Evaluating Software Testing Techniques and Tools , 2012, 2012 12th International Conference on Quality Software.

[140]  Peyman Oreizy,et al.  An architecture-based approach to self-adaptive software , 1999, IEEE Intell. Syst..

[141]  Alberto Rodrigues da Silva,et al.  RSLingo4Privacy Studio - A Tool to Improve the Specification and Analysis of Privacy Policies , 2017, ICEIS.

[142]  Richard J. Cook,et al.  The Statistical Analysis of Recurrent Events , 2007 .

[143]  Yong Yu,et al.  Long Text Generation via Adversarial Training with Leaked Information , 2017, AAAI.

[144]  Mieke Boon,et al.  Models as Epistemic Tools in Engineering Sciences , 2009 .

[145]  Juan Carlos Augusto,et al.  Security and privacy requirements engineering for human centric IoT systems using eFRIEND and Isabelle , 2017, 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA).

[146]  Giancarlo Guizzardi,et al.  Extending the Foundations of Ontology-Based Conceptual Modeling with a Multi-level Theory , 2015, ER.

[147]  Mihai Lupu,et al.  PrioPrivacy: A Local Recoding K-Anonymity Tool for Prioritised Quasi-Identifiers , 2019, WI.

[148]  Chao Chen,et al.  Using Random Forest to Learn Imbalanced Data , 2004 .

[149]  Benjamin C. M. Fung,et al.  Anonymizing healthcare data: a case study on the blood transfusion service , 2009, KDD.

[150]  Kim-Kwang Raymond Choo,et al.  Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? , 2018, IEEE Cloud Computing.

[151]  Nicola Guarino,et al.  Ontologies and Knowledge Bases. Towards a Terminological Clarification , 1995 .

[152]  Dympna O'Sullivan,et al.  The Role of Explanations on Trust and Reliance in Clinical Decision Support Systems , 2015, 2015 International Conference on Healthcare Informatics.

[153]  Lorrie Faith Cranor,et al.  Protecting people from phishing: the design and evaluation of an embedded training email system , 2007, CHI.

[154]  S. K. Gupta,et al.  Abstractive summarization: An overview of the state of the art , 2019, Expert Syst. Appl..

[155]  Joan Hash,et al.  SP 800-50. Building an Information Technology Security Awareness and Training Program , 2003 .

[156]  Eric S. K. Yu,et al.  Business-driven data analytics: A conceptual modeling framework , 2018, Data Knowl. Eng..

[157]  Bernhard Rumpe,et al.  The UML as a formal modeling notation , 1998, Comput. Stand. Interfaces.

[158]  Soumya Paul,et al.  A Probabilistic Analysis of the Efficiency of Automated Software Testing , 2016, IEEE Transactions on Software Engineering.

[159]  Alexander Hars,et al.  Working for Free? Motivations for Participating in Open-Source Projects , 2002, Int. J. Electron. Commer..

[160]  Thomas R. Gruber,et al.  A translation approach to portable ontology specifications , 1993, Knowl. Acquis..

[161]  Rossana M. de Castro Andrade,et al.  GreaTest: a card game to motivate the software testing learning , 2018, SBES.

[162]  Xuelong Li,et al.  Tensors in Image Processing and Computer Vision , 2009, Advances in Pattern Recognition.

[163]  In Lee,et al.  The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .

[164]  Nikolay Mehandjiev,et al.  Modeling of privacy-aware business processes in BPMN to protect personal data , 2014, SAC.

[165]  Erik Perjons,et al.  An Introduction to Design Science , 2014, Springer International Publishing.

[166]  Randy C. Paffenroth,et al.  Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.

[167]  Maria Virvou,et al.  Based on GDPR privacy in UML: Case of e-learning program , 2017, 2017 8th International Conference on Information, Intelligence, Systems & Applications (IISA).

[168]  Richard Baskerville,et al.  Going back to basics in design science: from the information technology artifact to the information systems artifact , 2015, Inf. Syst. J..

[169]  Haralambos Mouratidis,et al.  Secure Tropos: a Security-Oriented Extension of the Tropos Methodology , 2007, Int. J. Softw. Eng. Knowl. Eng..

[170]  Ksenija Vuković Small and medium sized enterprises in European Union , 2012 .

[171]  Sooyong Park,et al.  A modeling framework for business process reengineering using big data analytics and a goal-orientation , 2017, 2017 11th International Conference on Research Challenges in Information Science (RCIS).

[172]  Andrew P. McAfee,et al.  Machine, Platform, Crowd: Harnessing Our Digital Future , 2017 .

[173]  Stefanos Gritzalis,et al.  NETp1-08: Requirements and Challenges in the Design of Privacy-aware Sensor Networks , 2006, IEEE Globecom 2006.

[174]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[175]  Marlon Dumas On the Convergence of Data and Process Engineering , 2011, ADBIS.

[176]  Roland Imhoff,et al.  What Motivates Nonconformity? Uniqueness Seeking Blocks Majority Influence , 2009, Personality & social psychology bulletin.

[177]  Chi Wu-Lee,et al.  Toward A Service Platform for Developing Smart Contracts on Blockchain in BDD and TDD Styles , 2017, 2017 IEEE 10th Conference on Service-Oriented Computing and Applications (SOCA).

[178]  Sander J. J. Leemans,et al.  Scalable process discovery and conformance checking , 2016, Software & Systems Modeling.

[179]  Sarah Spiekermann,et al.  Online social networks: why we disclose , 2010, J. Inf. Technol..

[180]  Jeanne W. Ross,et al.  Designing and Executing Digital Strategies , 2016, ICIS.

[181]  Tor Eriksson,et al.  Unemployment Flows in Finland, 1969–95: A Time Series Analysis , 1998 .

[182]  Dirk Fahland,et al.  Repairing Process Models to Reflect Reality , 2012, BPM.

[183]  Oscar González Rojas,et al.  Analysis and Re-configuration of Decision Logic in Adaptive and Data-Intensive Processes (Short Paper) , 2017, OTM Conferences.

[184]  Uyen Trang Nguyen,et al.  A new algorithm for money laundering detection based on structural similarity , 2016, 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[185]  Diego Calvanese,et al.  Semantics and Analysis of DMN Decision Tables , 2016, BPM.

[186]  Paolo Giorgini,et al.  Analyzing Trust Requirements in Socio-Technical Systems: A Belief-Based Approach , 2015, PoEM.

[187]  Michael Coughlan,et al.  Interviewing in qualitative research: The one-to-one interview , 2009 .

[188]  Wil M. P. van der Aalst,et al.  Business Process Simulation Survival Guide , 2015, Handbook on Business Process Management.

[189]  A. Parry Handbook of Qualitative Research , 2002 .

[190]  N. M. Oskorbin,et al.  Game-Theoretic Models of Incentive and Control Strategies in Social and Economic Systems , 2015, Cybern. Syst..

[191]  Yoshua Bengio,et al.  Generative Adversarial Nets , 2014, NIPS.

[192]  Amanda Nolen,et al.  Thematic analysis of qualitative research data: Is it as easy as it sounds? , 2018, Currents in pharmacy teaching & learning.

[193]  Veda C. Storey,et al.  Design science in the information systems discipline: an introduction to the special issue on design science research , 2008 .

[194]  Geoffrey B. Sprinkle,et al.  The effects of monetary incentives on effort and task performance: theories, evidence, and a framework for research , 2002 .

[195]  Kiev Gama Crowdsourced Software Development in Civic Apps - Motivations of Civic Hackathons Participants , 2017, ICEIS.

[196]  Boudewijn F. van Dongen,et al.  Process Mining: Overview and Outlook of Petri Net Discovery Algorithms , 2009, Trans. Petri Nets Other Model. Concurr..

[197]  Enrique Onieva,et al.  Multi-head CNN-RNN for multi-time series anomaly detection: An industrial case study , 2019, Neurocomputing.

[198]  Yu-To Chen,et al.  Fuzzy Computing Applications for Anti-Money Laundering and Distributed Storage System Load Monitoring , 2011 .

[199]  Anne Piret,et al.  L'analyse structurale. Une méthode d'analyse de contenu pour les sciences humaines, Bruxelles, De Boeck, 173p , 1996 .

[200]  Werner Ceusters,et al.  Aboutness: towards foundations for the Information Artifact Ontology , 2015, ICBO.

[201]  Gustavo Rossi,et al.  25 Years of Model-Driven Web Engineering: What we achieved, What is missing , 2016, CLEI Electron. J..

[202]  Mario Piattini,et al.  A Data Quality in Use model for Big Data , 2016, Future Gener. Comput. Syst..

[203]  F. Petngang,et al.  Security and privacy protection for automated video surveillance , 2007, 2007 IEEE International Symposium on Signal Processing and Information Technology.

[204]  Kent McPhee,et al.  Design Theory and Software Design , 1996 .

[205]  Yasin Kütük,et al.  PREDICTION OF TRANSITION PROBABILITIES FROM UNEMPLOYMENT TO EMPLOYMENT FOR TURKEY VIA MACHINE LEARNING AND ECONOMETRICS: A COMPARATIVE STUDY , 2019 .

[206]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[207]  Varun Grover,et al.  Creating Strategic Business Value from Big Data Analytics: A Research Framework , 2018, J. Manag. Inf. Syst..

[208]  Zibin Zheng,et al.  Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..

[209]  Mathias Weske,et al.  A Tool for Checking Soundness of Decision-Aware Business Processes , 2017, BPM.

[210]  Peng Li,et al.  Similarity Metric Learning for Face Recognition , 2013, 2013 IEEE International Conference on Computer Vision.

[211]  Ahmad Ashari,et al.  Review of Ontology Evolution Process , 2018 .

[212]  Claus Pahl,et al.  A Pattern-Based Framework of Change Operators for Ontology Evolution , 2009, OTM Workshops.

[213]  Yunming Ye,et al.  A Hierarchical Model with Recurrent Convolutional Neural Networks for Sequential Sentence Classification , 2019, NLPCC.

[214]  Stephen L. Vargo,et al.  Conceptualizing Value: A Service-ecosystem View , 2017 .

[215]  Edward P. Lazear,et al.  The Power of Incentives , 2000 .

[216]  Lin-Tao Lv,et al.  A RBF neural network model for anti-money laundering , 2008, 2008 International Conference on Wavelet Analysis and Pattern Recognition.

[217]  Claus Pahl,et al.  Ontology Change Management and Identification of Change Patterns , 2013, Journal on Data Semantics.

[218]  Felix Hill,et al.  Learning Distributed Representations of Sentences from Unlabelled Data , 2016, NAACL.

[219]  Ming Yang,et al.  DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[220]  Tanja E. J. Vos,et al.  Evaluating the FITTEST Automated Testing Tools: An Industrial Case Study , 2013, 2013 ACM / IEEE International Symposium on Empirical Software Engineering and Measurement.

[221]  Jens Bürger,et al.  A framework for semi-automated co-evolution of security knowledge and system models , 2018, J. Syst. Softw..

[222]  Rachid Chalal,et al.  EXODuS: Exploratory OLAP over Document Stores , 2017, Inf. Syst..

[223]  Kwan-Liu Ma,et al.  Opening the black box - data driven visualization of neural networks , 2005, VIS 05. IEEE Visualization, 2005..

[224]  Johannes De Smedt,et al.  Augmenting processes with decision intelligence: Principles for integrated modelling , 2018, Decis. Support Syst..

[225]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[226]  Daniela E. Damian,et al.  ACon: A learning-based approach to deal with uncertainty in contextual requirements at runtime , 2016, Inf. Softw. Technol..

[227]  Abdelkarim Erradi,et al.  A service computing manifesto: the next 10 years , 2017, Commun. ACM.

[228]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[229]  Ana Alice Baptista,et al.  How to Measure Influence in Social Networks? , 2020, RCIS.

[230]  Paolo Giorgini,et al.  Modeling and Reasoning About Information Quality Requirements , 2015, REFSQ.

[231]  Yann LeCun,et al.  Dimensionality Reduction by Learning an Invariant Mapping , 2006, 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'06).

[232]  Eduard H. Hovy,et al.  Automatic Evaluation of Summaries Using N-gram Co-occurrence Statistics , 2003, NAACL.

[233]  Thierry Poibeau,et al.  Multi-source, Multilingual Information Extraction and Summarization , 2012, Theory and Applications of Natural Language Processing.

[234]  Vera Künzle,et al.  PHILharmonicFlows: towards a framework for object-aware process management , 2011, J. Softw. Maintenance Res. Pract..

[235]  Jong-Hyouk Lee,et al.  Analysis of the main consensus protocols of blockchain , 2020, ICT Express.

[236]  Peter A. Johnson,et al.  Civic Hackathons: Innovation, Procurement, or Civic Engagement? , 2014 .

[237]  Matteo Pagliardini,et al.  Unsupervised Learning of Sentence Embeddings Using Compositional n-Gram Features , 2017, NAACL.

[238]  R. Cialdini Influence: The Psychology of Persuasion , 1993 .

[239]  Yangyong Zhu,et al.  The Challenges of Data Quality and Data Quality Assessment in the Big Data Era , 2015, Data Sci. J..

[240]  Miikka Rokkanen,et al.  Changes in Job Stability: Evidence from Lifetime Job Histories , 2010, SSRN Electronic Journal.

[241]  Ina Schieferdecker,et al.  Model-Driven Testing: Using the UML Testing Profile , 2007 .

[242]  Giancarlo Guizzardi,et al.  Grounding Software Domain Ontologies in the Unified Foundational Ontology (UFO): The case of the ODE Software Process Ontology , 2008, CIbSE.

[243]  Wil M. P. van der Aalst,et al.  Interactive Data-Driven Process Model Construction , 2018, ER.

[244]  Norman Spangenberg,et al.  An Architectural Blueprint for a Multi-purpose Anomaly Detection on Data Streams , 2019, ICEIS.

[245]  Thomas M. Breuel,et al.  Anomaly detection by combining decision trees and parametric densities , 2008, 2008 19th International Conference on Pattern Recognition.

[246]  Phil Blunsom,et al.  Teaching Machines to Read and Comprehend , 2015, NIPS.

[247]  Jolita Ralyté Towards a Method Family Supporting Information Services Co-Creation in the Transdisciplinary Context , 2013, Int. J. Inf. Syst. Model. Des..

[248]  Ilia Bider,et al.  Design Science Research as Movement Between Individual and Generic Situation-Problem–Solution Spaces , 2013 .

[249]  Hamed Taherdoost,et al.  A Review of Technology Acceptance and Adoption Models and Theories , 2023, International Journal For Multidisciplinary Research.

[250]  Li Xiong,et al.  A two-phase algorithm for mining sequential patterns with differential privacy , 2013, CIKM.

[251]  Peter J. Clarke,et al.  Gamification-Based Cyber-Enabled Learning Environment of Software Testing , 2016 .

[252]  Robert B. France,et al.  Defining Precise Semantics for UML , 2000, ECOOP Workshops.

[253]  Y. R. Storch Rudall,et al.  Business Model Generation , 2012 .

[254]  Paolo Giorgini,et al.  GRAnD: A goal-oriented approach to requirement analysis in data warehouses , 2008, Decis. Support Syst..

[255]  Ashish Sureka,et al.  A Case Study on the Application of Case-Based Learning in Software Testing , 2018, ISEC.

[256]  Maleknaz Nayebi,et al.  Toward Data-Driven Requirements Engineering , 2016, IEEE Software.

[257]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[258]  Patrick Delfmann,et al.  Decision model change patterns for dynamic system evolution , 2020, Knowledge and Information Systems.

[259]  A. Pfitzmann,et al.  A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .

[260]  Gerhard Tutz,et al.  Modeling Discrete Time-To-Event Data , 2016 .

[261]  Gennaro Imparato,et al.  A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.

[262]  Olga De Troyer,et al.  Understanding ontology evolution: A change detection approach , 2007, J. Web Semant..

[263]  Gordon J. Pace,et al.  An Automata-Based Approach to Evolving Privacy Policies for Social Networks , 2016, RV.

[264]  Franck Dernoncourt,et al.  Neural Networks for Joint Sentence Classification in Medical Paper Abstracts , 2017, EACL.

[265]  Jeffrey M. Voas,et al.  Demystifying the Internet of Things , 2016, Computer.

[266]  W. Eric Wong,et al.  Improving the State of Undergraduate Software Testing Education , 2012 .

[267]  Ahmed Awad,et al.  Extending BPSim Based on Workflow Resource Patterns , 2018, BIS.

[268]  Tsung-Ting Kuo,et al.  Comparison of blockchain platforms: a systematic review and healthcare examples , 2019, J. Am. Medical Informatics Assoc..

[269]  Oscar González Rojas,et al.  Simod: A Tool for Automated Discovery of Business Process Simulation Models , 2019, BPM.

[270]  Janet Smithson,et al.  Using and analysing focus groups: Limitations and possibilities , 2000 .

[271]  Paul W. P. J. Grefen,et al.  Quantitative Effects of Advanced Resource Constructs in Business Process Simulation , 2018, 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC).

[272]  Kraig Finstad,et al.  The Usability Metric for User Experience , 2010, Interact. Comput..

[273]  Kihyuk Sohn,et al.  Improved Deep Metric Learning with Multi-class N-pair Loss Objective , 2016, NIPS.

[274]  Bela H. Banathy,et al.  SYSTEMS INQUIRY AND ITS APPLICATION IN EDUCATION , 2003 .

[275]  Nava Tintarev,et al.  Reading News with a Purpose: Explaining User Profiles for Self-Actualization , 2019, UMAP.

[276]  Yuan Gao,et al.  Deep Gate Recurrent Neural Network , 2016, ACML.

[277]  Xiaogang Wang,et al.  Deep Learning Face Representation by Joint Identification-Verification , 2014, NIPS.

[278]  Kangde Yao,et al.  A Brief Guide to the Standard Object Modelling Language , 2000 .

[279]  Martin Schumacher,et al.  Competing Risks and Multistate Models with R , 2011 .

[280]  Alan R. Hevner,et al.  POSITIONING AND PRESENTING DESIGN SCIENCE RESEARCH FOR MAXIMUM IMPACT 1 , 2013 .

[281]  Xiaowei Xu,et al.  Text Embeddings for Retrieval From a Large Knowledge Base , 2018, RCIS.

[282]  Veda C. Storey,et al.  Big data technologies and Management: What conceptual modeling can do , 2017, Data Knowl. Eng..

[283]  Yücel Saygin,et al.  Towards trajectory anonymization: a generalization-based approach , 2008, SPRINGL '08.

[284]  Vassilis Christophides,et al.  On Detecting High-Level Changes in RDF/S KBs , 2009, SEMWEB.

[285]  Sooyong Park,et al.  Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.

[286]  Viktor Mikhaĭlovich Glushkov,et al.  An Introduction to Cybernetics , 1957, The Mathematical Gazette.

[287]  Manish Kumar,et al.  Anomaly Detection using Decision Tree based Classifiers , 2016 .

[288]  Michael Gusenbauer,et al.  Google Scholar to overshadow them all? Comparing the sizes of 12 academic search engines and bibliographic databases , 2018, Scientometrics.

[289]  Monique Snoeck,et al.  Existence Dependency: The Key to Semantic Integrity Between Structural and Behavioral Aspects of Object Types , 1998, IEEE Trans. Software Eng..

[290]  Alex Norta,et al.  The State of the Art for Blockchain-Enabled Smart-Contract Applications in the Organization , 2018, 2018 Ivannikov Ispras Open Conference (ISPRAS).

[291]  Paolo Tonella,et al.  A case study-based comparison of web testing techniques applied to AJAX web applications , 2008, International Journal on Software Tools for Technology Transfer.

[292]  Chen Fu,et al.  Experimental assessment of manual versus tool-based maintenance of GUI-directed test scripts , 2009, 2009 IEEE International Conference on Software Maintenance.

[293]  Mohamed Adel Serhani,et al.  Big Data Quality: A Survey , 2018, 2018 IEEE International Congress on Big Data (BigData Congress).

[294]  Nava Tintarev,et al.  Someone really wanted that song but it was not me!: Evaluating Which Information to Disclose in Explanations for Group Recommendations , 2020, IUI Companion.

[295]  Thomas R. Gruber,et al.  Toward principles for the design of ontologies used for knowledge sharing? , 1995, Int. J. Hum. Comput. Stud..

[296]  Tanja E. J. Vos,et al.  Combinatorial Testing in an Industrial Environment -- Analyzing the Applicability of a Tool , 2014, 2014 9th International Conference on the Quality of Information and Communications Technology.

[297]  Xavier Franch,et al.  FAME: Supporting Continuous Requirements Elicitation by Combining User Feedback and Monitoring , 2018, 2018 IEEE 26th International Requirements Engineering Conference (RE).

[298]  Geoffrey E. Hinton,et al.  Reducing the Dimensionality of Data with Neural Networks , 2006, Science.

[299]  Wil M. P. van der Aalst,et al.  Supporting Confidentiality in Process Mining Using Abstraction and Encryption , 2018, SIMPDA.

[300]  Jan-Philipp Steghöfer,et al.  Impact of Gamification on Trace Link Vetting: A Controlled Experiment , 2019, REFSQ.

[301]  Livio Robaldo,et al.  PrOnto: Privacy Ontology for Legal Reasoning , 2018, EGOVIS.

[302]  Philip S. Yu,et al.  Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques , 2010 .

[303]  David E. Goldberg,et al.  A niched Pareto genetic algorithm for multiobjective optimization , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[304]  G. Zajicek,et al.  The Wisdom of the Body , 1934, Nature.

[305]  John Mylopoulos,et al.  Representing and Using Nonfunctional Requirements: A Process-Oriented Approach , 1992, IEEE Trans. Software Eng..

[306]  Jemal H. Abawajy,et al.  User preference of cyber security awareness delivery methods , 2014, Behav. Inf. Technol..

[307]  B.M. Wilamowski,et al.  Neural network architectures and learning algorithms , 2009, IEEE Industrial Electronics Magazine.

[308]  Mike Cohn,et al.  Succeeding with Agile: Software Development Using Scrum , 2009 .

[309]  John Mylopoulos,et al.  Strategic business modeling: representation and reasoning , 2014, Software & Systems Modeling.

[310]  Pearl Brereton,et al.  Presenting software engineering results using structured abstracts: a randomised experiment , 2008, Empirical Software Engineering.

[311]  Paul Janssen,et al.  Frailty Model , 2007, International Encyclopedia of Statistical Science.

[312]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[313]  Sung-Bae Cho,et al.  Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..

[314]  Winston H. Hsu,et al.  Real-time privacy-preserving moving object detection in the cloud , 2013, ACM Multimedia.

[315]  Walid Maalej,et al.  On the automatic classification of app reviews , 2016, Requirements Engineering.

[316]  A Arya Adriansyah,et al.  Aligning observed and modeled behavior , 2014 .

[317]  Matthias Mettler,et al.  Blockchain technology in healthcare: The revolution starts here , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[318]  Hamid H. Jebur,et al.  Machine Learning Techniques for Anomaly Detection: An Overview , 2013 .

[319]  Juha Kettunen,et al.  Education and unemployment duration , 1997 .

[320]  E. L. Jones An experiential approach to incorporating software testing into the computer science curriculum , 2001, 31st Annual Frontiers in Education Conference. Impact on Engineering and Science Education. Conference Proceedings (Cat. No.01CH37193).

[321]  R. Barthes Introduction à l'analyse structurale des récits , 1966 .

[322]  James M. Olson,et al.  False feedback about placebo effectiveness: consequences for the misattribution of speech anxiety , 1988 .

[323]  Wil M. P. van der Aalst,et al.  Mining Roles from Event Logs While Preserving Privacy , 2019, Business Process Management Workshops.

[324]  Juri Marcucci,et al.  The Predictive Power of Google Searches in Forecasting Unemployment , 2012 .

[325]  Diego Calvanese,et al.  Semantic DMN: Formalizing Decision Models with Domain Knowledge , 2017, RuleML+RR.

[326]  Maguelonne Teisseire,et al.  Privacy preserving sequential pattern mining in distributed databases , 2006, CIKM '06.

[327]  Gary B. Lamont,et al.  Evolutionary Algorithms for Solving Multi-Objective Problems , 2002, Genetic Algorithms and Evolutionary Computation.

[328]  Kilian Q. Weinberger,et al.  Distance Metric Learning for Large Margin Nearest Neighbor Classification , 2005, NIPS.

[329]  O. John,et al.  Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German , 2007 .

[330]  Manuel Resinas,et al.  On the definition and design-time analysis of process performance indicators , 2013, Inf. Syst..

[331]  Sungyoung Lee,et al.  Ontology Evolution and Challenges , 2013, J. Inf. Sci. Eng..

[332]  Enrico Motta,et al.  Ontology evolution: a process-centric survey , 2013, The Knowledge Engineering Review.

[333]  Monique Snoeck,et al.  Co-creating e-Government Services: An Empirical Analysis of Participation Methods in Belgium , 2019, Public Administration and Information Technology.

[334]  B. S. Manoj,et al.  IoT Enablers and Their Security and Privacy Issues , 2016 .

[335]  Marti A. Hearst,et al.  Why phishing works , 2006, CHI.

[336]  Colin Tankard,et al.  What the GDPR means for businesses , 2016, Netw. Secur..

[337]  Diana K. Smetters,et al.  Moving from the design of usable security technologies to the design of useful secure applications , 2002, NSPW '02.

[338]  Michael R. Wagner,et al.  Incentive Contracts in Serial Stochastic Projects , 2015, Manuf. Serv. Oper. Manag..

[339]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[340]  Wu He,et al.  Gender difference and employees' cybersecurity behaviors , 2017, Comput. Hum. Behav..

[341]  Marlon Dumas,et al.  Interactive and Incremental Business Process Model Repair , 2017, OTM Conferences.

[342]  Gary Leeming,et al.  A Ledger of Me: Personalizing Healthcare Using Blockchain Technology , 2019, Front. Med..

[343]  Boudewijn F. van Dongen,et al.  Measuring precision of modeled behavior , 2015, Inf. Syst. E Bus. Manag..

[344]  Reinhold Plösch,et al.  Operationalised product quality models and assessment: The Quamoco approach , 2014, Inf. Softw. Technol..

[345]  James C. Spohrer,et al.  Rebuilding Evolution: A Service Science Perspective , 2017, HICSS.

[346]  T. Salthouse,et al.  Personality-cognition relations across adulthood. , 2011, Developmental psychology.

[347]  Samy Bengio,et al.  Large Scale Online Learning of Image Similarity Through Ranking , 2009, J. Mach. Learn. Res..

[348]  Abhishek Awasthi,et al.  Clustering Algorithms for Anti-Money Laundering Using Graph Theory and Social Network Analysis , 2012 .

[349]  Ilia Bider,et al.  State Flow as a Way of Analyzing Business Processes - Case Studies , 2002 .

[350]  Kat Krol,et al.  Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours , 2016, SOUPS.

[351]  Werner Wolf,et al.  The Musicalization of Fiction.A Study in the Theory and History of Intermediality. , 1999 .

[352]  Jan Vanthienen,et al.  A Case-Based Inquiry into the Decision Model and Notation (DMN) and the Knowledge Base (KB) Paradigm , 2018, RuleML+RR.

[353]  Ninghui Li,et al.  On the tradeoff between privacy and utility in data publishing , 2009, KDD.

[354]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[355]  Karen Spärck Jones Automatic summarising: The state of the art , 2007, Inf. Process. Manag..

[356]  Chitu Okoli,et al.  A Guide to Conducting a Systematic Literature Review of Information Systems Research , 2010 .

[357]  Pearl Brereton,et al.  Lessons from applying the systematic literature review process within the software engineering domain , 2007, J. Syst. Softw..

[358]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[359]  Thomas Blaschke,et al.  Myths and realities about the recovery of L׳Aquila after the earthquake , 2014, International journal of disaster risk reduction : IJDRR.

[360]  Bogusław Cyganek,et al.  Speckle Noise Filtering in Side-Scan Sonar Images Based on the Tucker Tensor Decomposition , 2019, Sensors.

[361]  Markus Helfert,et al.  Standardisation of enterprise architecture development for smart cities , 2019, Journal of the Knowledge Economy.

[362]  David Romero,et al.  Enterprise information systems state of the art: Past, present and future trends , 2016, Comput. Ind..

[363]  Su-nan Wang,et al.  A Money Laundering Risk Evaluation Method Based on Decision Tree , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[364]  John K. Gilbert,et al.  Understanding modelling in technology and science: the potential of stories from the field , 2011 .

[365]  Jaap Gordijn,et al.  Value-based requirements engineering: exploring innovative e-commerce ideas , 2003, Requirements Engineering.

[366]  Nagia M. Ghanem,et al.  VSCAN: An Enhanced Video Summarization Using Density-Based Spatial Clustering , 2013, ICIAP.

[367]  Kurt Sandkuhl,et al.  Digital Enterprise Architecture - Transformation for the Internet of Things , 2015, 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop.

[368]  Heru Susanto,et al.  Information Security Awareness Within Business Environment: An IT Review , 2012, ArXiv.

[369]  Christos Katris Prediction of Unemployment Rates with Time Series and Machine Learning Techniques , 2020 .

[370]  Felix Mannhardt,et al.  Sepsis Cases - Event Log , 2016 .

[371]  Geoffrey E. Mills Action Research: A Guide for the Teacher Researcher , 1999 .

[372]  Roel Wieringa,et al.  Design Science Methodology for Information Systems and Software Engineering , 2014, Springer Berlin Heidelberg.

[373]  Faïez Gargouri,et al.  BigDimETL with NoSQL Database , 2018, KES.

[374]  R. Kaplan,et al.  Linking the Balanced Scorecard to Strategy , 1996 .

[375]  Andrew Lippman,et al.  A Case Study for Blockchain in Healthcare : “ MedRec ” prototype for electronic health records and medical research data , 2016 .

[376]  Jian Zhang,et al.  SQuAD: 100,000+ Questions for Machine Comprehension of Text , 2016, EMNLP.

[377]  Richard F. Paige,et al.  The Single Model Principle , 2002, J. Object Technol..

[378]  Shiguo Wang,et al.  A Comprehensive Survey of Data Mining-Based Accounting-Fraud Detection Research , 2010, 2010 International Conference on Intelligent Computation Technology and Automation.

[379]  Trisha Greenhalgh,et al.  Selecting, designing, and developing your questionnaire , 2004, BMJ : British Medical Journal.

[380]  László Böszörményi,et al.  State-of-the-art and future challenges in video scene detection: a survey , 2013, Multimedia Systems.

[381]  Melvin R. Crask,et al.  Protection motivation theory : An extension of fear appeals theory in communication , 1989 .

[382]  Marko Vukolic,et al.  The Quest for Scalable Blockchain Fabric: Proof-of-Work vs. BFT Replication , 2015, iNetSeC.

[383]  Andrea Bondavalli,et al.  A conceptual model for analyzing information quality in System-of-Systems , 2017, 2017 12th System of Systems Engineering Conference (SoSE).

[384]  Rein Turn Classification of personal information for privacy protection purposes , 1976, AFIPS '76.

[385]  Xavier Franch,et al.  How Can Quality Awareness Support Rapid Software Development? - A Research Preview , 2017, REFSQ.

[386]  Mikael Berndtsson,et al.  Becoming a Data-Driven Organisation , 2018, ECIS.

[387]  Davor Svetinovic,et al.  A taxonomy of security and privacy requirements for the Internet of Things (IoT) , 2014, 2014 IEEE International Conference on Industrial Engineering and Engineering Management.

[388]  Nader Sadegh,et al.  A perceptron network for functional identification and control of nonlinear systems , 1993, IEEE Trans. Neural Networks.

[389]  Fabiano Dalpiaz,et al.  Conceptualizing Requirements Using User Stories and Use Cases: A Controlled Experiment , 2020, REFSQ.

[390]  Shigeaki Yamazaki,et al.  Adoption of structured abstracts by general medical journals and format for a structured abstract. , 2005, Journal of the Medical Library Association : JMLA.

[391]  Martijn Zoet,et al.  Verification capabilities for business rules management in the Dutch governmental context , 2017, 2017 International Conference on Research and Innovation in Information Systems (ICRIIS).

[392]  Christopher D. Manning,et al.  Effective Approaches to Attention-based Neural Machine Translation , 2015, EMNLP.

[393]  Weng-Keen Wong,et al.  Principles of Explanatory Debugging to Personalize Interactive Machine Learning , 2015, IUI.

[394]  Erland Jonsson,et al.  Synthesizing test data for fraud detection systems , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[395]  James Philbin,et al.  FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[396]  Sabine Buckl,et al.  On the State-of-the-Art in Enterprise Architecture Management Literature , 2011 .

[397]  Stephen H. Edwards,et al.  Experiences using test-driven development with an automated grader , 2007 .

[398]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[399]  Lisanne Bainbridge,et al.  Ironies of automation , 1982, Autom..

[400]  David Clark,et al.  Computers at risk: safe computing in the information age , 1991 .

[401]  Fabrizio Maria Maggi,et al.  A Tool for the Analysis of DMN Decision Tables , 2016, BPM.

[402]  Raian Ali,et al.  Personalising Explainable Recommendations: Literature and Conceptualisation , 2020, WorldCIST.

[403]  Bogusław Cyganek,et al.  Object Detection and Recognition in Digital Images: Theory and Practice , 2013 .

[404]  Wei Dong,et al.  Human factors in software security risk management , 2008, LMSA '08.

[405]  Sam Newman,et al.  Building microservices - designing fine-grained systems, 1st Edition , 2015 .

[406]  Michael Chromik,et al.  Dark Patterns of Explainability, Transparency, and User Control for Intelligent Systems , 2019, IUI Workshops.

[407]  Ilia Bider,et al.  Using Enterprise Models to Explain and Discuss Autopoiesis and Homeostasis in Socio-technical Systems , 2020, Complex Syst. Informatics Model. Q..

[408]  Lorena Otero-Cerdeira,et al.  Ontology matching: A literature review , 2015, Expert Syst. Appl..

[409]  Tomi Kyyrä,et al.  Partial Unemployment Insurance Benefits and the Transition Rate to Regular Work , 2008 .

[410]  Christopher D. Manning,et al.  Get To The Point: Summarization with Pointer-Generator Networks , 2017, ACL.

[411]  Neil A. M. Maiden,et al.  Applying Modular Method Engineering to Validate and Extend the RESCUE Requirements Process , 2005, ER.

[412]  Klaus F. Zimmermann,et al.  A panel analysis of job changes and unemployment , 1994 .

[413]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[414]  Oscar Pastor,et al.  Verifying goal-oriented specifications used in model-driven development processes , 2017, Inf. Syst..

[415]  Deborah L. McGuinness,et al.  Toward establishing trust in adaptive agents , 2008, IUI '08.

[416]  David A. Cohn,et al.  Improving generalization with active learning , 1994, Machine Learning.

[417]  Liping Zhao,et al.  Natural Language Processing (NLP) for Requirements Engineering: A Systematic Mapping Study , 2020, ArXiv.

[418]  Krishna P. Gummadi,et al.  Investigating Ad Transparency Mechanisms in Social Media: A Case Study of Facebooks Explanations , 2018, NDSS.

[419]  T.E. Boult,et al.  PICO: Privacy through Invertible Cryptographic Obscuration , 2005, Computer Vision for Interactive and Intelligent Environment (CVIIE'05).

[420]  Yanjun Qi,et al.  Empirical Evaluation of Workload Forecasting Techniques for Predictive Cloud Resource Scaling , 2016, 2016 IEEE 9th International Conference on Cloud Computing (CLOUD).

[421]  A. Tiwana,et al.  Beyond Valuation: “Options Thinking” in IT Project Management , 2005 .

[422]  Dhiren Patel,et al.  A Survey on Internet of Things: Security and Privacy Issues , 2014 .

[423]  David Simms,et al.  The Heart of Enterprise , 1980 .

[424]  Prateek Mittal,et al.  Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[425]  Bogusław Cyganek,et al.  Thumbnail Tensor—A Method for Multidimensional Data Streams Clustering with an Efficient Tensor Subspace Model in the Scale-Space † , 2019, Sensors.

[426]  Tariq M. King,et al.  Integrating Testing into Software Engineering Courses Supported by a Collaborative Learning Environment , 2014, TOCE.

[427]  Lucy Kimbell,et al.  Rethinking Design Thinking: Part I , 2011 .

[428]  Mohammed Zuhair Al-Taie,et al.  Visualization of Explanations in Recommender Systems , 2014 .

[429]  Mathias Weske,et al.  Decision Management in the Insurance Industry: Standards and Tools , 2017, BPM.

[430]  Amutha Prabakar Muniyandi,et al.  Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .

[431]  Selmin Nurcan,et al.  Model Driven Architectures for Enterprise Information Systems , 2004, CAiSE.

[432]  Henk Corporaal,et al.  Analytics for the internet of things , 2009, CHI Extended Abstracts.

[433]  Kurt Eiselt,et al.  Understanding and improving the culture of hackathons: Think global hack local , 2015, 2015 IEEE Frontiers in Education Conference (FIE).

[434]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[435]  David Budgen,et al.  Reporting computing projects through structured abstracts: a quasi-experiment , 2011, Empirical Software Engineering.

[436]  Janna Hastings,et al.  A scoping review of ontologies related to human behaviour change , 2019, Nature Human Behaviour.

[437]  Shang Gao,et al.  Smart contract applications within blockchain technology: A systematic mapping study , 2018, Telematics Informatics.

[438]  Olivier Teste,et al.  Automatic Classification Rules for Anomaly Detection in Time-Series , 2020, RCIS.

[439]  Anjana Gosain,et al.  Literature Review of Data Model Quality Metrics of Data Warehouse , 2015 .

[440]  Elizabeth Chang,et al.  Application of Protege and SPARQL in the field of project knowledge management , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[441]  Kathryn B. Laskey,et al.  Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat Risk , 2016, STIDS.

[442]  Faïez Gargouri,et al.  ETL Based Framework for NoSQL Warehousing , 2017, EMCIS.

[443]  Werner Ceusters,et al.  An Information Artifact Ontology Perspective on Data Collections and Associated Representational Artifacts , 2012, MIE.

[444]  Vahid Garousi,et al.  Comparing automated visual GUI testing tools: an industrial case study , 2017, A-TEST@ESEC/SIGSOFT FSE.

[445]  E. Glass,et al.  A rapid and robust sequence-based genotyping method for BoLA-DRB3 alleles in large numbers of heterozygous cattle. , 2008, Animal genetics.

[446]  Diego Calvanese,et al.  Semantics, Analysis and Simplification of DMN Decision Tables , 2018, Inf. Syst..

[447]  David G. Lowe,et al.  Similarity Metric Learning for a Variable-Kernel Classifier , 1995, Neural Computation.

[448]  Mike Uschold,et al.  Building Ontologies: Towards a Unified Methodology , 1996 .

[449]  Andrey Kashlev,et al.  A Big Data Modeling Methodology for Apache Cassandra , 2015, 2015 IEEE International Congress on Big Data.

[450]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[451]  Matthias Weidlich,et al.  Privacy-Preserving Process Mining , 2019, Business & Information Systems Engineering.

[452]  Diane M. Strong,et al.  Beyond Accuracy: What Data Quality Means to Data Consumers , 1996, J. Manag. Inf. Syst..

[453]  D. Wiegmann,et al.  Similarities and differences between human–human and human–automation trust: an integrative review , 2007 .

[454]  Manuel Díaz,et al.  On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[455]  Moe Thandar Wynn,et al.  Modelling Complex Resource Requirements in Business Process Management Systems , 2010 .

[456]  Peter Müller,et al.  A Program Logic for Bytecode , 2005, Electron. Notes Theor. Comput. Sci..

[457]  Margarida Silveira,et al.  Unsupervised Anomaly Detection in Energy Time Series Data Using Variational Recurrent Autoencoders with Attention , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).

[458]  Jens Bürger,et al.  Maintaining requirements for long-living software systems by incorporating security knowledge , 2014, 2014 IEEE 22nd International Requirements Engineering Conference (RE).

[459]  I. Ajzen,et al.  Attitudes and the Attitude-Behavior Relation: Reasoned and Automatic Processes , 2000 .

[460]  Monique Snoeck,et al.  Consistency by Construction: The Case of MERODE , 2003, ER.

[461]  Xu An Wang,et al.  Key Technologies of Anomaly Detection Using PCA-LSTM , 2019, IMIS.

[462]  Samira Si-Said Cherfi,et al.  Data quality in ETL process: A preliminary study , 2019, KES.

[463]  Christoph Treude,et al.  Google Summer of Code: Student Motivations and Contributions , 2019, J. Syst. Softw..

[464]  Michael Jackson,et al.  The World and the Machine , 1995, 1995 17th International Conference on Software Engineering.

[465]  Diane C. P. Smith,et al.  Database abstractions: aggregation and generalization , 1977, TODS.

[466]  Rob Davis,et al.  ARIS Design Platform: Getting Started with BPM , 2007 .

[467]  Nicola Ueffing,et al.  Improved models for automatic punctuation prediction for spoken and written text , 2013, INTERSPEECH.

[468]  Guy Doumeingts,et al.  GRAI integrated methodology and its mapping onto generic enterprise reference architecture and methodology , 1997 .

[469]  Vitalik Buterin A NEXT GENERATION SMART CONTRACT & DECENTRALIZED APPLICATION PLATFORM , 2015 .

[470]  Wil M. P. van der Aalst,et al.  Responsible Data Science: Using Event Data in a "People Friendly" Manner , 2016, ICEIS.

[471]  J Peder,et al.  UNEMPLOYMENT : A REVIEW OF THE EVIDENCE FRQM PANEL DATA , 2004 .

[472]  Oscar González Rojas,et al.  Automated Discovery of Business Process Simulation Models from Event Logs , 2020, Decis. Support Syst..

[473]  Marc J. de Vries,et al.  Models as artefacts of a dual nature: a philosophical contribution to teaching about models designed and used in engineering practice , 2017 .

[474]  R. Baumeister,et al.  High self-control predicts good adjustment, less pathology, better grades, and interpersonal success. , 2004, Journal of personality.

[475]  Benjamin Van Durme,et al.  Annotated Gigaword , 2012, AKBC-WEKEX@NAACL-HLT.

[476]  Sherif Sakr,et al.  Automated Machine Learning: State-of-The-Art and Open Challenges , 2019, ArXiv.

[477]  David Bawden,et al.  The dark side of information: overload, anxiety and other paradoxes and pathologies , 2009, J. Inf. Sci..

[478]  Tanel Alumäe,et al.  LSTM for punctuation restoration in speech transcripts , 2015, INTERSPEECH.

[479]  Wassnaa Al-Mawee,et al.  Privacy and Security Issues in IoT Healthcare Applications for the Disabled Users a Survey , 2012 .

[480]  Peter Kroes,et al.  The dual nature of technical artefacts , 2006 .

[481]  Touradj Ebrahimi,et al.  Using warping for privacy protection in video surveillance , 2013, 2013 18th International Conference on Digital Signal Processing (DSP).

[482]  Sue Holwell,et al.  Information, Systems and Information Systems: Making Sense of the Field , 1998 .

[483]  Irene Lill,et al.  A Framework for Managing Post-disaster Housing Reconstruction☆ , 2015 .

[484]  Nava Tintarev,et al.  Introduction to the Special Issue on Human Interaction with Artificial Advice Givers , 2016, ACM Trans. Interact. Intell. Syst..

[485]  Niels Martin,et al.  The Use of Process Mining in Business Process Simulation Model Construction , 2016, Bus. Inf. Syst. Eng..

[486]  Alan R. Hevner,et al.  Utilizing, Producing, and Contributing Design Knowledge in DSR Projects , 2018, DESRIST.

[487]  Arie van Deursen,et al.  Pragmatic Software Testing Education , 2019, SIGCSE.

[488]  Dahui Li,et al.  Task Design, Motivation, and Participation in Crowdsourcing Contests , 2011, Int. J. Electron. Commer..

[489]  David R. Thomas,et al.  A General Inductive Approach for Analyzing Qualitative Evaluation Data , 2006 .

[490]  Ahmed Awad,et al.  RBPSim: A Resource-aware Extension of BPSim Using Workflow Resource Patterns , 2018, ZEUS.

[491]  Mathias Weske,et al.  Design of an Extensible BPMN Process Simulator , 2017, Business Process Management Workshops.

[492]  Richard Baskerville,et al.  Distinctions Among Different Types of Generalizing in Information Systems Research , 1999, New Information Technologies in Organizational Processes.

[493]  Nyi Nyi Htun,et al.  ContextPlay: Evaluating User Control for Context-Aware Music Recommendation , 2019, UMAP.

[494]  Vishanth Weerakkody,et al.  A framework for analysing blockchain technology adoption: Integrating institutional, market and technical factors , 2020, Int. J. Inf. Manag..

[495]  Aparna Gupta,et al.  Impact of compensation structure and managerial incentives on bank risk taking , 2015, Eur. J. Oper. Res..

[496]  Abdulmotaleb El-Saddik,et al.  Survey on ontologies for affective states and their influences , 2018, Semantic Web.

[497]  Yiming Yang,et al.  XLNet: Generalized Autoregressive Pretraining for Language Understanding , 2019, NeurIPS.

[498]  Jens Bürger,et al.  Restoring security of evolving software models using graph transformation , 2014, International Journal on Software Tools for Technology Transfer.

[499]  Christophe Labreuche,et al.  Use of a multi-criteria decision support tool to prioritize reconstruction projects in a post-disaster phase , 2015, 2015 2nd International Conference on Information and Communication Technologies for Disaster Management (ICT-DM).

[500]  Casper Boks,et al.  User‐centred design for sustainable behaviour , 2008 .

[501]  Laurian M. Chirica,et al.  The entity-relationship model: toward a unified view of data , 1975, SIGF.

[502]  Weijia Jia,et al.  Influence analysis in social networks: A survey , 2018, J. Netw. Comput. Appl..

[503]  Matteo Golfarelli,et al.  QETL: An approach to on-demand ETL from non-owned data sources , 2017, Data Knowl. Eng..

[504]  Inigo Martinez de Rituerto de Troya,et al.  Predicting , explaining , and understanding risk of long-term unemployment , 2018 .

[505]  Timo Kehrer,et al.  Henshin: A Usability-Focused Framework for EMF Model Transformation Development , 2017, ICGT.

[506]  Ilia Bider,et al.  Using Fractal Enterprise Model to Assist Complexity Management , 2018, BIR Workshops.

[507]  Göran Goldkuhl,et al.  A Multi-Grounded Design Research Process , 2010, DESRIST.

[508]  Shikha Agrawal,et al.  Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.

[509]  Judith Masthoff,et al.  Explaining Recommendations: Design and Evaluation , 2015, Recommender Systems Handbook.

[510]  Sander J. J. Leemans,et al.  Discovering Block-Structured Process Models from Event Logs - A Constructive Approach , 2013, Petri Nets.

[511]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[512]  Yannis Charalabidis,et al.  A Review of Opinion Mining Methods for Analyzing Citizens' Contributions in Public Policy Debate , 2011, ePart.

[513]  Asunción Gómez-Pérez,et al.  A Double Classification of Common Pitfalls in Ontologies , 2010 .

[514]  Jian Sun,et al.  Deep Residual Learning for Image Recognition , 2015, 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).

[515]  James Hartley,et al.  Is it appropriate to use structured abstracts in social science journals? , 1997, Learn. Publ..

[516]  Rosalind W. Picard Affective computing: challenges , 2003, Int. J. Hum. Comput. Stud..

[517]  Harry Matlay,et al.  "Blanket" approaches to promoting ICT in small firms: some lessons from the DTI ladder adoption model in the UK , 2001, Internet Res..

[518]  Raian Ali,et al.  Online Peer Support Groups to Combat Digital Addiction: User Acceptance and Rejection Factors , 2019, WorldCIST.

[519]  Laurence Alpay,et al.  An empowerment-based approach to developing innovative e-health tools for self-management , 2010, Health Informatics J..

[520]  Ilia Bider,et al.  Linking Autopoiesis to Homeostasis in Socio-Technical Systems , 2019, STPIS@ECIS.

[521]  Shiliang Sun,et al.  Network-Scale Traffic Modeling and Forecasting with Graphical Lasso and Neural Networks , 2012, ArXiv.

[522]  Colette Rolland,et al.  A Multi-Model View of Process Modelling , 1999, Requirements Engineering.

[523]  Monique Snoeck,et al.  Assessing the effectiveness of feedback enabled simulation in teaching conceptual modeling , 2014, Comput. Educ..

[524]  Xavier Franch,et al.  Towards Integrating Data-Driven Requirements Engineering into the Software Development Process: A Vision Paper , 2020, REFSQ.

[525]  Matteo Golfarelli,et al.  Schema profiling of document-oriented databases , 2018, Inf. Syst..

[526]  Hajo A. Reijers,et al.  An Approach for the Automated Generation of Engaging Dashboards , 2019, OTM Conferences.

[527]  Liz Bayley,et al.  The Structured Abstract: An Essential Tool for Researchers , 2003 .

[528]  Rob Fergus,et al.  Visualizing and Understanding Convolutional Networks , 2013, ECCV.

[529]  Atif M. Memon,et al.  GUITAR: an innovative tool for automated testing of GUI-driven software , 2014, Automated Software Engineering.

[530]  Richard T. Watson,et al.  Analyzing the Past to Prepare for the Future: Writing a Literature Review , 2002, MIS Q..

[531]  Roel Wieringa,et al.  Six strategies for generalizing software engineering theories , 2015, Sci. Comput. Program..

[532]  Haralambos Mouratidis,et al.  DEFeND Architecture: A Privacy by Design Platform for GDPR Compliance , 2019, TrustBus.

[533]  Bhumika Gupta,et al.  Analysis of Various Decision Tree Algorithms for Classification in Data Mining , 2017 .

[534]  Cyrus Shahabi,et al.  An entropy-based framework for efficient post-disaster assessment based on crowdsourced data , 2016, EM-GIS.

[535]  Olly Gotel,et al.  Teaching software quality assurance by encouraging student contributions to an open source web-based system for the assessment of programming assignments , 2008, ITiCSE.

[536]  Alexander Gluhak,et al.  A survey on facilities for experimental internet of things research , 2011, IEEE Communications Magazine.

[537]  Xinpeng Zhang,et al.  An efficient privacy protection scheme for data security in video surveillance , 2019, J. Vis. Commun. Image Represent..

[538]  B. LeBaron Agent-based Computational Finance , 2006 .

[539]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[540]  T. J. Hunt,et al.  Leader-member exchange relationships in health information management. , 2014, Perspectives in health information management.

[541]  Jianhua Tao,et al.  Self-attention Based Model for Punctuation Prediction Using Word and Speech Embeddings , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[542]  Jimmy Ba,et al.  Adam: A Method for Stochastic Optimization , 2014, ICLR.

[543]  Islam H. El-adaway,et al.  Decision-Making Framework for Holistic Sustainable Disaster Recovery: Agent-Based Approach for Decreasing Vulnerabilities of the Associated Communities , 2018, Journal of Infrastructure Systems.

[544]  Tanja E. J. Vos,et al.  Q-learning strategies for action selection in the TESTAR automated testing tool , 2016 .

[545]  Miguel Toro,et al.  Visual ppinot: A Graphical Notation for Process Performance Indicators , 2019, Bus. Inf. Syst. Eng..

[546]  John Mylopoulos,et al.  Towards an Ontology for Privacy Requirements via a Systematic Literature Review , 2017, ER.

[547]  Stephanie Boehm,et al.  Information Dashboard Design The Effective Visual Communication Of Data , 2016 .

[548]  Max Chevalier,et al.  Document-oriented Models for Data Warehouses - NoSQL Document-oriented for Data Warehouses , 2016, ICEIS.

[549]  Lawrence Joseph,et al.  The Sustainability of a Workplace Wellness Program That Incorporates Gamification Principles: Participant Engagement and Health Benefits After 2 Years , 2019, American journal of health promotion : AJHP.

[550]  G. Henriques,et al.  Psychology defined. , 2004, Journal of clinical psychology.

[551]  Gerard Briscoe,et al.  Digital Innovation: The Hackathon Phenomenon , 2014 .

[552]  Johannes De Smedt,et al.  Developing a Modelling and Mining Framework for Integrated Processes and Decisions , 2017, OTM Workshops.

[553]  Jens Bürger,et al.  Versioning and Evolution Requirements for Model-Based System Development , 2014, Softwaretechnik-Trends.

[554]  George Drosatos,et al.  Blockchain Applications in the Biomedical Domain: A Scoping Review , 2019, Computational and structural biotechnology journal.

[555]  Mumbai,et al.  Internet of Things (IoT): A Literature Review , 2015 .

[556]  Udo Kelter,et al.  A rule-based approach to the semantic lifting of model differences in the context of model versioning , 2011, 2011 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011).

[557]  Patrick Delfmann,et al.  A Tool for Decision Logic Verification in DMN Decision Tables , 2019, BPM.

[558]  Rim Djedidi,et al.  Ontology Change Management , 2009, I-SEMANTICS.

[559]  A. Onwuegbuzie,et al.  Toward a Definition of Mixed Methods Research , 2007 .

[560]  R. Graham,et al.  Spearman's Footrule as a Measure of Disarray , 1977 .

[561]  Tanja E. J. Vos,et al.  Automated Localisation Testing in Industry with Test ^* ∗ , 2016, ICTSS.

[562]  Joos Vandewalle,et al.  A Multilinear Singular Value Decomposition , 2000, SIAM J. Matrix Anal. Appl..

[563]  Alessandro Berti,et al.  Process Mining for Python (PM4Py): Bridging the Gap Between Process- and Data Science , 2019, ArXiv.

[564]  Gianna Reggio,et al.  Consistency Problems in UML-Based Software Development , 2004, UML Satellite Activities.

[565]  Alexander M. Rush,et al.  LSTMVis: A Tool for Visual Analysis of Hidden State Dynamics in Recurrent Neural Networks , 2016, IEEE Transactions on Visualization and Computer Graphics.

[566]  Tanja E. J. Vos,et al.  Scriptless Testing at the GUI Level in an Industrial Setting , 2020, RCIS.

[567]  Nicolas Mayer,et al.  Model-based Management of Information System Security Risk , 2012 .

[568]  Alessandro Vinciarelli,et al.  A Survey of Personality Computing , 2014, IEEE Transactions on Affective Computing.

[569]  Panos Kalnis,et al.  On the Anonymization of Sparse High-Dimensional Data , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[570]  Cynthia Mathis Beath,et al.  Designed for Digital: How to Architect Your Business for Sustained Success , 2019 .

[571]  Elena Lloret,et al.  Text summarisation in progress: a literature review , 2011, Artificial Intelligence Review.

[572]  César A. Hidalgo,et al.  Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.

[573]  José F. Ruiz,et al.  Privacy Requirements: Findings and Lessons Learned in Developing a Privacy Platform , 2016, 2016 IEEE 24th International Requirements Engineering Conference (RE).

[574]  Christoph Augenstein,et al.  Anomaly Detection on Data Streams - A LSTM's Diary , 2020, RCIS.

[575]  Boudewijn F. van Dongen,et al.  Replaying history on process models for conformance checking and performance analysis , 2012, WIREs Data Mining Knowl. Discov..

[576]  Sigrid Eldh,et al.  Towards a Test Automation Improvement Model (TAIM) , 2014, 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops.

[577]  Sandeep Purao,et al.  Design Research in the Technology of Information Systems: Truth or Dare , 2002 .

[578]  Uma Rani,et al.  Understanding unemployment flows , 2011 .

[579]  Michael Devetsikiotis,et al.  Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.

[580]  Anthony Simonofski,et al.  The Impact of Impediments on Open Government Data Use: Insights from Users , 2019, 2019 13th International Conference on Research Challenges in Information Science (RCIS).

[581]  Mehrdad Sabetzadeh,et al.  The Case for Context-Driven Software Engineering Research: Generalizability Is Overrated , 2017, IEEE Softw..

[582]  Rolf Niedermeier,et al.  Fixed-parameter algorithms for Kemeny rankings , 2009, Theor. Comput. Sci..

[583]  Björn Niehaves,et al.  Reconstructing the giant: On the importance of rigour in documenting the literature search process , 2009, ECIS.

[584]  Abdallah Arioua,et al.  Explanatory dialogues with argumentative faculties over inconsistent knowledge bases , 2017, Expert Syst. Appl..

[585]  Monique Snoeck,et al.  Hearing the Voice of Citizens in Smart City Design: The CitiVoice Framework , 2018, Business & Information Systems Engineering.

[586]  Mark Guzdial,et al.  Introducing testing practices into objects and design course , 2003, Proceedings 16th Conference on Software Engineering Education and Training, 2003. (CSEE&T 2003)..

[587]  Franck Berthelon,et al.  Emotion ontology for context awareness , 2013, 2013 IEEE 4th International Conference on Cognitive Infocommunications (CogInfoCom).

[588]  Isabelle Mirbel,et al.  Situational method engineering: combining assembly-based and roadmap-driven approaches , 2005, Requirements Engineering.

[589]  Thomas Bäck,et al.  Anomaly Detection in Univariate Time Series: An Empirical Comparison of Machine Learning Algorithms , 2019, ICDM.

[590]  Marlon Dumas,et al.  Lightning Fast Business Process Simulator , 2011 .

[591]  Praneeth Babu Marella,et al.  Ancile: Privacy-Preserving Framework for Access Control and Interoperability of Electronic Health Records Using Blockchain Technology , 2018 .

[592]  Paolo Tonella,et al.  Capture-replay vs. programmable web testing: An empirical assessment during test case evolution , 2013, 2013 20th Working Conference on Reverse Engineering (WCRE).

[593]  Camille Salinesi,et al.  A Requirement-driven Approach for Designing Data Warehouses , 2006 .

[594]  Krsto Pandza,et al.  Management as Design, But What Kind of Design? An Appraisal of the Design Science Analogy for Management , 2010 .

[595]  Reiko Heckel,et al.  Automatic Inference of Rule-Based Specifications of Complex In-place Model Transformations , 2017, ICMT.

[596]  Paulo Cortez,et al.  A deep learning classifier for sentence classification in biomedical and computer science abstracts , 2019, Neural Computing and Applications.

[597]  Alexander M. Rush,et al.  Bottom-Up Abstractive Summarization , 2018, EMNLP.

[598]  S. Probert Introduction to Systems Theory , 2013 .

[599]  David Alexander "From Rubble to Monument" Revisited : Modernised Perspectives on Recovery from Disaster , 2007 .

[600]  James Hartley,et al.  Obtaining information accurately and quickly: are structured abstracts more efficient? , 1996, J. Inf. Sci..

[601]  Marijn Janssen,et al.  Citizens' Motivations for Engaging in Open Data Hackathons , 2019, ePart.

[602]  Bran Selic,et al.  The Pragmatics of Model-Driven Development , 2003, IEEE Softw..

[603]  Arnaldo de Albuquerque Araújo,et al.  VSUMM: A mechanism designed to produce static video summaries and a novel evaluation method , 2011, Pattern Recognit. Lett..

[604]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[605]  Jeffrey Pennington,et al.  GloVe: Global Vectors for Word Representation , 2014, EMNLP.

[606]  Lars Elleström,et al.  Media Transformation: The Transfer of Media Characteristics among Media , 2014 .

[607]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[608]  Bruce A. Draper,et al.  Looking Under the Hood: Visualizing What LSTMs Learn , 2019, ICIAR.

[609]  B. Kitchenham,et al.  Case Studies for Method and Tool Evaluation , 1995, IEEE Softw..

[610]  Michael Gibbs,et al.  TESTING TOURNAMENTS ? AN APPRAISAL OF THE THEORY AND EVIDENCE , 2001 .

[611]  Luke S. Zettlemoyer,et al.  Deep Contextualized Word Representations , 2018, NAACL.

[612]  Paul Clements,et al.  ATAM: Method for Architecture Evaluation , 2000 .

[613]  Syed Muhammad Anwar,et al.  Generation of personalized video summaries by detecting viewer's emotion using electroencephalography , 2019, J. Vis. Commun. Image Represent..

[614]  Mark Schafer,et al.  Antecedents of Groupthink , 1996 .

[615]  Salvatore T. March,et al.  Design and natural science research on information technology , 1995, Decis. Support Syst..

[616]  Chia-han Lee,et al.  On-Line Multi-View Video Summarization for Wireless Video Sensor Network , 2015, IEEE Journal of Selected Topics in Signal Processing.

[617]  Jun Tang,et al.  Developing an intelligent data discriminating system of anti-money laundering based on SVM , 2005, 2005 International Conference on Machine Learning and Cybernetics.

[618]  Monique Snoeck,et al.  Enterprise Information Systems Engineering : The MERODE Approach , 2014 .

[619]  Tomas Mikolov,et al.  Enriching Word Vectors with Subword Information , 2016, TACL.

[620]  Alan R. Hevner,et al.  Exploring the Relationship between Design Science Research and Innovation: A Case Study of Innovation at Chevron , 2011 .

[621]  Robert Cooper,et al.  Modernism, Post Modernism and Organizational Analysis 3: The Contribution of Jacques Derrida , 1989 .

[622]  Kevin Gimpel,et al.  Pushing the Limits of Paraphrastic Sentence Embeddings with Millions of Machine Translations , 2017, ArXiv.

[623]  Ilia Bider,et al.  Defining Transformational Patterns for Business Model Innovation , 2018, BIR.

[624]  Ali H. Mirza,et al.  Computer network intrusion detection using sequential LSTM Neural Networks autoencoders , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).

[625]  Slim Abdennadher,et al.  Character computing: challenges and opportunities , 2017, MUM.

[626]  Andrew Georgiou,et al.  Consumer E-Health: An Overview of Research Evidence and Implications for Future Policy , 2011, Health information management : journal of the Health Information Management Association of Australia.

[627]  Tanja E. J. Vos,et al.  Aplib: Tactical Agents for Testing Computer Games , 2020, EMAS@AAMAS.

[628]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[629]  Cirano Iochpe,et al.  An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems , 2010, 2010 14th IEEE International Enterprise Distributed Object Computing Conference.

[630]  Roland Bader,et al.  Designing an Explanation Interface for Proactive Recommendations in Automotive Scenarios , 2011, UMAP Workshops.

[631]  Dietmar Jannach,et al.  A systematic review and taxonomy of explanations in decision support and recommender systems , 2017, User Modeling and User-Adapted Interaction.

[632]  Tanel Alumäe,et al.  Bidirectional Recurrent Neural Network with Attention Mechanism for Punctuation Restoration , 2016, INTERSPEECH.

[633]  Dhananjay Kumar,et al.  An efficient system for anomaly detection using deep learning classifier , 2017, Signal Image Video Process..

[634]  Elena Kornyshova,et al.  Decision-making method family MADISE: Validation within the requirements engineering domain , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[635]  Jun Zhao,et al.  'It's Reducing a Human Being to a Percentage': Perceptions of Justice in Algorithmic Decisions , 2018, CHI.

[636]  A. S. Roa,et al.  AgentSpeak(L): BDI agents speak out in a logical computable language , 1996 .

[637]  Maher Alharby,et al.  Blockchain-based Smart Contracts: A Systematic Mapping Study , 2017, ICAISC 2017.

[638]  Marten Schönherr,et al.  Artifact Types in Information Systems Design Science - A Literature Review , 2010, DESRIST.

[639]  Alan R. Hevner,et al.  Design Science in Information Systems Research , 2004, MIS Q..

[640]  Tanja E. J. Vos,et al.  Evaluating rogue user testing in industry: An experience report , 2014, 2014 IEEE Eighth International Conference on Research Challenges in Information Science (RCIS).

[641]  Raian Ali,et al.  Explainable Recommendations in Intelligent Systems: Delivery Methods, Modalities and Risks , 2020, RCIS.

[642]  Peter A. Flach,et al.  Explainability fact sheets: a framework for systematic assessment of explainable approaches , 2019, FAT*.

[643]  Marten van Sinderen,et al.  Mapping the business model canvas to ArchiMate , 2012, SAC '12.

[644]  Sharlene Hesse-Biber,et al.  Handbook of emergent methods , 2008 .

[645]  Mohsen Guizani,et al.  MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain , 2017, IEEE Access.

[646]  Benoît Depaire,et al.  Retrieving the resource availability calendars of a process from an event log , 2020, Inf. Syst..

[647]  Dario Colazzo,et al.  Schema Inference for Massive JSON Datasets , 2017, EDBT.

[648]  E. Lazear,et al.  Rank-Order Tournaments as Optimum Labor Contracts , 1979, Journal of Political Economy.

[649]  Alexander Maedche,et al.  Configurations of User Involvement and Participation in Relation to Information System Project Success , 2018, CAiSE.

[650]  Alexandros André Chaaraoui,et al.  Visual privacy protection methods: A survey , 2015, Expert Syst. Appl..

[651]  W. Gregory Voss European Union Data Privacy Law Reform: General Data Protection Regulation, Privacy Shield, and the Right to Delisting , 2017 .

[652]  Yoshua Bengio,et al.  Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.

[653]  Siobhán Clarke,et al.  Middleware for Internet of Things: A Survey , 2016, IEEE Internet of Things Journal.

[654]  Josep Domingo-Ferrer,et al.  Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges , 2019, Comput. Commun..

[655]  Tao Li,et al.  Incremental Workflow Mining with Optional Patterns and Its Application to Production Printing Process , 2007 .

[656]  Mirella Lapata,et al.  Text Summarization with Pretrained Encoders , 2019, EMNLP.

[657]  Chien-Hung Chen,et al.  Domain Ontology As Conceptual Model for Big Data Management: Application in Biomedical Informatics , 2014, ER.

[658]  Guy Doumeingts,et al.  GRAI Grid Decisional Modelling , 1998 .

[659]  Ming-Wei Chang,et al.  BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.

[660]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[661]  Peter M. Kruse,et al.  Development and maintenance efforts testing graphical user interfaces: a comparison , 2016, A-TEST@SIGSOFT FSE.

[662]  Alexandra Martínez,et al.  Use of JiTT in a Graduate Software Testing Course: An Experience Report , 2018, 2018 IEEE/ACM 40th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET).

[663]  Imed Romdhani,et al.  Architecting the Internet of Things: State of the Art , 2016 .

[664]  James J. Heckman,et al.  New Methods for Analyzing Individual Event Histories , 1982 .

[665]  Jeffrey Dean,et al.  Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.

[666]  Jean Scholtz,et al.  How do visual explanations foster end users' appropriate trust in machine learning? , 2020, IUI.

[667]  Sooyong Park,et al.  A Reference Model for Big Data Analytics , 2018, 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON).

[668]  Bilal Khan,et al.  Effectiveness of information security awareness methods based on psychological theories , 2011 .

[669]  Wil M. P. van der Aalst,et al.  Ensuring Confidentiality in Process Mining , 2018, SIMPDA.

[670]  Slim Abdennadher,et al.  Applications of Character Computing From Psychology to Computer Science , 2020 .

[671]  Jonathan Eldredge,et al.  Evidence-based librarianship: the EBL process , 2006, Libr. Hi Tech.

[672]  Konstantinos Kalpakis,et al.  Adaptive Methods for Activity Monitoring of Streaming Data , 2002, ICMLA.

[673]  Mikko Peltola,et al.  Työmarkkinasiirtymät Suomessa: Työllisyyden päättymisen jälkeinen työmarkkinasiirtymien dynamiikka vuosina 1995–1999 , 2004 .

[674]  Heinrich Hußmann,et al.  The Impact of Placebic Explanations on Trust in Intelligent Systems , 2019, CHI Extended Abstracts.

[675]  Jean Carletta,et al.  The AMI Meeting Corpus: A Pre-announcement , 2005, MLMI.

[676]  Stefano Borgo,et al.  Foundational Choices in DOLCE , 2009, Handbook on Ontologies.

[677]  Fabian Prasser,et al.  Putting Statistical Disclosure Control into Practice: The ARX Data Anonymization Tool , 2015, Medical Data Privacy Handbook.

[678]  Kai Fan,et al.  MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain , 2018, Journal of Medical Systems.

[679]  Stephen Smith,et al.  Emerald 110k: A Multidisciplinary Dataset for Abstract Sentence Classification , 2019, ALTA.

[680]  Virve Ollikainen,et al.  The Determinants of Unemployment Duration by Gender in Finland , 2003 .

[681]  Tanja E. J. Vos,et al.  Evaluating the TESTAR tool in an industrial case study , 2014, ESEM '14.

[682]  Per Runeson,et al.  Guidelines for conducting and reporting case study research in software engineering , 2009, Empirical Software Engineering.

[683]  Wil M. P. van der Aalst,et al.  Workflow Resource Patterns: Identification, Representation and Tool Support , 2005, CAiSE.

[684]  Stephen Platt,et al.  Disaster Recovery Indicators: guidelines for monitoring and evaluation , 2010 .

[685]  Lorrie Faith Cranor,et al.  Security and Usability: Designing Secure Systems that People Can Use , 2005 .

[686]  Bruno Dumas,et al.  Evoq: a Visualization Tool to Support Structural Analysis of Text Documents , 2018, DocEng.

[687]  Fiaz Hussain,et al.  Video Indexing: A Survey , 2014 .

[688]  Olga De Troyer,et al.  Ontology Change Detection Using a Version Log , 2005, SEMWEB.

[689]  Dario Colazzo,et al.  Parametric schema inference for massive JSON datasets , 2019, The VLDB Journal.

[690]  Dongqing Xie,et al.  Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges , 2017, IEEE Network.

[691]  Boguslaw Cyganek Hybrid ensemble of classifiers for logo and trademark symbols recognition , 2015, Soft Comput..

[692]  Yann LeCun,et al.  Learning a similarity metric discriminatively, with application to face verification , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).

[693]  Frank Rudzicz,et al.  A survey of word embeddings for clinical text , 2019, J. Biomed. Informatics X.

[694]  Douglas C. Schmidt,et al.  FHIRChain: Applying Blockchain to Securely and Scalably Share Clinical Data , 2018, Computational and structural biotechnology journal.

[695]  D. Lawrence,et al.  Assurances and Machine Self-Confidence for Enhanced Trust in Autonomous Systems , 2016 .

[696]  Dirk Fahland,et al.  Model repair - aligning process models to reality , 2015, Inf. Syst..

[697]  Ravikiran Vatrapu,et al.  BPDIMS: A Blockchain-based Personal Data and Identity Management System , 2019, HICSS.

[698]  Ana Alice Baptista,et al.  Interfaces for Science: Conceptualizing an Interactive Graphical Interface , 2018, ArtsIT/DLI.

[699]  Dade Nurjanah,et al.  LifeOn, a ubiquitous lifelong learner model ontology supporting adaptive learning , 2018, 2018 IEEE Global Engineering Education Conference (EDUCON).

[700]  Duane T. Wegener,et al.  Attitudes and attitude change. , 1997, Annual review of psychology.

[701]  César A. Collazos,et al.  EmotionsOnto: an Ontology for Developing Affective Applications , 2014, J. Univers. Comput. Sci..

[702]  Alex Bassi,et al.  IoT Challenges , 2012, Communications in Mobile Computing.

[703]  Ian A. Kash,et al.  Market manipulation with outside incentives , 2011, Autonomous Agents and Multi-Agent Systems.

[704]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[705]  Alistair Cockburn,et al.  Structuring Use Cases with Goals , 2000 .

[706]  F. Grabowski,et al.  Simple, complicated and complex systems — the brief introduction , 2008, 2008 Conference on Human System Interactions.

[707]  J. Heckman,et al.  Does Unemployment Cause Future Unemployment? Definitions, Questions and Answers from a Continuous Time Model of Heterogeneity and State Dependence. , 1980 .

[708]  Jeasik Cho,et al.  Validity in qualitative research revisited , 2006 .

[709]  J. M. Eklund,et al.  Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.

[710]  Udo Kelter,et al.  Adaptability of model comparison tools , 2012, 2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering.

[711]  Keng Siau,et al.  Identifying Difficulties in Learning Uml , 2006, Inf. Syst. Manag..

[712]  J. Galán-Mena,et al.  Creating an Ontological Networks to Support the Inference of Personality Traits and Facets , 2018, 2018 IEEE XXV International Conference on Electronics, Electrical Engineering and Computing (INTERCON).

[713]  Monique Snoeck,et al.  Enterprise Information Systems Engineering , 2014, The Enterprise Engineering Series.

[714]  César A. Hidalgo,et al.  Disconnected, fragmented, or united? a trans-disciplinary review of network science , 2015, Appl. Netw. Sci..

[715]  Marta Indulska,et al.  How good is BPMN really? Insights from theory and practice , 2006, ECIS.

[716]  Jan Jürjens,et al.  Secure systems development with UML , 2004 .

[717]  Bowen Zhou,et al.  Abstractive Text Summarization using Sequence-to-sequence RNNs and Beyond , 2016, CoNLL.

[718]  Nancy Grudens-Schuck,et al.  Methodology Brief: Can You Call It a Focus Group? , 2004 .

[719]  Ronald L. Akers,et al.  Rational Choice, Deterrence, and Social Learning Theory in Criminology: The Path Not Taken , 1990 .

[720]  O. Robinson Sampling in Interview-Based Qualitative Research: A Theoretical and Practical Guide , 2014 .

[721]  Ben Shneiderman,et al.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World , 2010 .

[722]  Rashmi Raj,et al.  Web Spam Detection with Anti-Trust Rank , 2006, AIRWeb.

[723]  Besnik Selimi,et al.  Systematic Literature Review of Blockchain Applications: Smart Contracts , 2019, 2019 International Conference on Information Technologies (InfoTech).

[724]  Peter Brusilovsky,et al.  Explaining Need-based Educational Recommendations Using Interactive Open Learner Models , 2019, UMAP.

[725]  Bernhard Rumpe,et al.  User-Centered and Privacy-Driven Process Mining System Design for IoT , 2019, CAiSE Forum.

[726]  Cécile Manaouil Le dossier médical personnel (DMP) : « autopsie » d’un projet ambitieux ? , 2009 .

[727]  Nour Ali,et al.  Self-adaptive quality requirement elicitation process for legacy systems: a case study in healthcare , 2017, SAC.

[728]  K. Witte Putting the fear back into fear appeals: The extended parallel process model , 1992 .

[729]  J. Aken Management Research as a Design Science: Articulating the Research Products of Mode 2 Knowledge Production in Management , 2005 .

[730]  Anja Krajnc Postavljanje vejic v slovenščini s pomočjo strojnega učenja , 2015 .

[731]  Srinath Perera,et al.  Big Data Analytics Platforms for Real-Time Applications in IoT , 2016 .

[732]  Balbir S. Barn,et al.  Human and Value Sensitive Aspects of Mobile App Design: A Foucauldian Perspective , 2018, CAiSE.

[733]  Hermann Astleitner,et al.  An Integrated Model of Multimedia Learning and Motivation , 2004 .

[734]  Boris Motik,et al.  Managing Multiple Ontologies and Ontology Evolution in Ontologging , 2002, Intelligent Information Processing.

[735]  Bhavana Dalvi,et al.  Pretrained Language Models for Sequential Sentence Classification , 2019, EMNLP/IJCNLP.

[736]  Sander J. J. Leemans,et al.  Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour , 2013, Business Process Management Workshops.

[737]  Gökhan Tür,et al.  Automatic detection of sentence boundaries and disfluencies based on recognized words , 1998, ICSLP.

[738]  Matthias Weidlich,et al.  PRETSA: Event Log Sanitization for Privacy-aware Process Discovery , 2019, 2019 International Conference on Process Mining (ICPM).

[739]  Ana Alice Baptista,et al.  Information visualization: Conceptualizing new paths for filtering and navigate in scientific knowledge objects , 2017, 2017 24º Encontro Português de Computação Gráfica e Interação (EPCGI).

[740]  James D. Hamilton,et al.  Heterogeneity and Unemployment Dynamics , 2016 .

[741]  S. Fortunato,et al.  Statistical physics of social dynamics , 2007, 0710.3256.

[742]  Stefano Borgo,et al.  Artefacts in Formal Ontology , 2009 .

[743]  Gerald Kotonya,et al.  Developing IoT applications: challenges and frameworks , 2017, IET Cyper-Phys. Syst.: Theory & Appl..

[744]  Daniel L. Moody,et al.  The method evaluation model: a theoretical model for validating information systems design methods , 2003, ECIS.

[745]  P. S. Lewis,et al.  Function approximation and time series prediction with neural networks , 1990, 1990 IJCNN International Joint Conference on Neural Networks.

[746]  Juhani Iivari,et al.  A Paradigmatic Analysis of Information Systems As a Design Science , 2007, Scand. J. Inf. Syst..

[747]  Ian Horrocks,et al.  Handbook of Knowledge Representation Edited Description Logics 3.1 Introduction , 2022 .

[748]  Ilia Bider,et al.  Using Structural Coupling Approach for Defining and Maintaining Identity of an Educational Institution. Experience Report , 2018, STPIS@CAiSE.