Search results for " technology"
showing 10 items of 23337 documents
A Serendipity-Oriented Greedy Algorithm for Recommendations
2017
Most recommender systems suggest items to a user that are popular among all users and similar to items the user usually consumes. As a result, a user receives recommendations that she/he is already familiar with or would find anyway, leading to low satisfaction. To overcome this problem, a recommender system should suggest novel, relevant and unexpected, i.e. serendipitous items. In this paper, we propose a serendipity-oriented algorithm, which improves serendipity through feature diversification and helps overcome the overspecialization problem. To evaluate our algorithm and compare it with others, we employ a serendipity metric that captures each component of serendipity, unlike the most …
Consumers’ adoption of information services
2013
This paper reports on a design science research study that seeks to investigate how information service components affect consumers’ potential adoption of such services. More specifically, the paper develops a conceptual model that uses the theory of organizational information services (TOIS) and the unified theory of acceptance and use of technology (UTAUT) as a basis. The results indicate that individual constructs can be linked to service components. In turn, this result can potentially be instrumental in progress toward a deeper understanding of consumers’ adoption of information services and how this affects the development of such services and systems that support them.
Consumer Acceptance and Use of Instagram
2016
This study extends the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model to investigate factors affecting the acceptance and use of a social networking service (SNS) called Instagram. The UTAUT2 model is modified to better suit the context of SNSs by replacing the price value construct with self-congruence. Furthermore, we explore the effects of behavioral intention and use behavior on "user indegree" defined as the number of people who follow an SNS user. The results of the survey study largely support the hypothesized model in the context of Instagram. The findings contribute to previous knowledge by demonstrating the important roles of hedonic motivation and habit in co…
Domain Specific Case Tool for ICT-Enabled Service Design
2014
One major problem in service design is the limited availability of information gathered during the development process. In particular, information on end-user requirements is difficult for designers, developers, and maintainers to access. Here, we provide a mechanism that supports the gathering and modeling of various types of information throughout the service and software development life cycle. As various existing tools focus on a particular part of the life cycle, essential information is not available, or it is more difficult to obtain in later stages. The linkage between information collected in the different stages is often lost. The implemented tool support enables the modeling of r…
Flexible entity search on surfaces
2016
Surface computing allows flexible search interaction where users can manipulate the representation of entities recommended for them to create new queries or augment existing queries by taking advantage of increased screen estate and almost physical tactile interaction. We demonstrate a search system based on 1) Direct Manipulation of Entity Representation on Surfaces and 2) Entity Recommendation and Document Retrieval. Entities are modeled as a knowledge-graph and the relevances of entities are computed using the graph structure. Users can manipulate the representation of entities via spatial grouping and assigning preferences on entities. Our contribution can help to design effective infor…
A two-step, user-centered approach to personalized tourist recommendations
2017
Geo-localized, mobile applications can simplify a tourist visit, making the relevant Point of Interests more easily and promptly discernible to users. At the same time, such solutions must avoid creating unfitting or rigid user profiles that impoverish the users' options instead of refining them. Currently, user profiles in recommender systems rely on dimensions whose relevance to the user is more often presumed than empirically defined. To avoid this drawback, we build our recommendation system in a two-step process, where profile parameters are evaluated preliminarily and separately from the recommendations themselves. We describe this two-step evaluation process including an initial surv…
Semi-automatic literature mapping of participatory design studies 2006--2016
2018
The paper presents a process of semi-automatic literature mapping of a comprehensive set of participatory design studies between 2006--2016. The data of 2939 abstracts were collected from 14 academic search engines and databases. With the presented method, we were able to identify six education-related clusters of PD articles. Furthermore, we point out that the identified clusters cover the majority of education-related words in the whole data. This is the first attempt to systematically map the participatory design literature. We argue that by continuing our work, we can help to perceive a coherent structure in the body of PD research.
Social Collaborative Viewpoint Regression with Explainable Recommendations
2017
A recommendation is called explainable if it not only predicts a numerical rating for an item, but also generates explanations for users' preferences. Most existing methods for explainable recommendation apply topic models to analyze user reviews to provide descriptions along with the recommendations they produce. So far, such methods have neglected user opinions and influences from social relations as a source of information for recommendations, even though these are known to improve the rating prediction. In this paper, we propose a latent variable model, called social collaborative viewpoint regression (sCVR), for predicting item ratings based on user opinions and social relations. To th…
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…
Internet Adoption at the User Level: Empirical Evidence from The Gambia
2014
The unified theory of acceptance and use of technology (UTAUT) are used to investigate technology adoption. However, its application in Sub-Saharan Africa is rare and barely extended to the validation phase. In this paper, we introduce six new moderating factors for UTAUT core determinants and two other direct determinants of Internet adoption. The objective of this approach is to identify relevant elements of Internet adoption at the user level in The Gambia. Moderating factors are interacting terms used when the relationship between independent and dependent variable is weak, inconsistent or non-existent. A case study research design was employed and the data were gathered in Autumn of 20…