Active learning has become an increasingly popular method for screening large amounts of data in systematic reviews and meta-analyses. The active learning process continually improves its predictions on the remaining unlabeled records, with the goal of identifying all relevant records as early as possible. However, determining the optimal point at which to stop the active learning process is a challenge. The cost of additional labeling of records by the reviewer must be balanced against the cost of erroneous exclusions. This paper introduces the SAFE procedure, a practical and conservative set of stopping heuristics that offers a clear guideline for determining when to end the active learning process in screening software like ASReview. The eclectic mix of stopping heuristics helps to minimize the risk of missing relevant papers in the screening process. The proposed stopping heuristic balances the costs of continued screening with the risk of missing relevant records, providing a practical solution for reviewers to make informed decisions on when to stop screening. Although active learning can significantly enhance the quality and efficiency of screening, this method may be more applicable to certain types of datasets and problems. Ultimately, the decision to stop the active learning process depends on careful consideration of the trade-off between the costs of additional record labeling against the potential errors of the current model for the specific dataset and context.
LINK
Active learning has become an increasingly popular method for screening large amounts of data in systematic reviews and meta-analyses. The active learning process continually improves its predictions on the remaining unlabeled records, with the goal of identifying all relevant records as early as possible. However, determining the optimal point at which to stop the active learning process is a challenge. The cost of additional labeling of records by the reviewer must be balanced against the cost of erroneous exclusions. This paper introduces the SAFE procedure, a practical and conservative set of stopping heuristics that offers a clear guideline for determining when to end the active learning process in screening software like ASReview. The eclectic mix of stopping heuristics helps to minimize the risk of missing relevant papers in the screening process. The proposed stopping heuristic balances the costs of continued screening with the risk of missing relevant records, providing a practical solution for reviewers to make informed decisions on when to stop screening. Although active learning can significantly enhance the quality and efficiency of screening, this method may be more applicable to certain types of datasets and problems. Ultimately, the decision to stop the active learning process depends on careful consideration of the trade-off between the costs of additional record labeling against the potential errors of the current model for the specific dataset and context.
MULTIFILE
Het doen van onderzoek is een tijdrovend en inspannend proces. Dat is enerzijds heel goed, als we die tijd besteden aan het diep verwerken en nadenken over de onderzoeksinhoud. Maar bij andere aspecten van onderzoek zoals het eindeloos verdwalen in de literatuur of het verwerken van data kunnen we wel wat hulp van AI gebruiken. Gelukkig zijn er allerlei tools die ons hierbij kunnen ondersteunen in de verschillende fases van het onderzoeksproces.
LINK
Purpose: The aims of this study were to investigate how a variety of research methods is commonly employed to study technology and practitioner cognition. User-interface issues with infusion pumps were selected as a case because of its relevance to patient safety. Methods: Starting from a Cognitive Systems Engineering perspective, we developed an Impact Flow Diagram showing the relationship of computer technology, cognition, practitioner behavior, and system failure in the area of medical infusion devices. We subsequently conducted a systematic literature review on user-interface issues with infusion pumps, categorized the studies in terms of methods employed, and noted the usability problems found with particular methods. Next, we assigned usability problems and related methods to the levels in the Impact Flow Diagram. Results: Most study methods used to find user interface issues with infusion pumps focused on observable behavior rather than on how artifacts shape cognition and collaboration. A concerted and theorydriven application of these methods when testing infusion pumps is lacking in the literature. Detailed analysis of one case study provided an illustration of how to apply the Impact Flow Diagram, as well as how the scope of analysis may be broadened to include organizational and regulatory factors. Conclusion: Research methods to uncover use problems with technology may be used in many ways, with many different foci. We advocate the adoption of an Impact Flow Diagram perspective rather than merely focusing on usability issues in isolation. Truly advancing patient safety requires the systematic adoption of a systems perspective viewing people and technology as an ensemble, also in the design of medical device technology.
DOCUMENT
Social and Emotional Learning programs, designed to enhance adolescents’ social and emotional skills, are implemented in schools worldwide. One of these programs is Skills4Life (S4L), for students in Dutch secondary education. To strengthen this program and adapt it to students’ needs, we conducted an exploratory study on their perspectives on their own social-emotional development, focusing on low-achieving students in prevocational education. We interviewed eleven boys and eleven girls in five focus groups on (1) their general school life experiences, (2) their perceptions and experiences regarding interactions with peers, the problems they encountered in these interactions, and (3) the strategies and skills they used to solve these problems. Driven by findings in related studies initial thematic analyzes were extended using a three-step approach: an inductive, data-driven process of open coding; axial coding; and selective coding, using the social-emotional skills comprised in an often-used SEL framework as sensitizing concepts. Overall, students were satisfied with their relationships with classmates and teachers and their ability to manage their daily interaction struggles. Their reflections on their interactions indicate that the skills they preferred to use mirror the social-emotional skills taught in many school programs. However, they also indicated that they did not apply these skills in situations they experienced as unsafe and uncontrollable, e.g., bullying and harassment. The insights into adolescents’ social-emotional skills perceptions and the problems they encountered with peers at school presented here can contribute to customizing school-based skills enhancement programs to their needs. Teacher training is required to help teachers gain insight into students’ perspectives and to use this insight to implement SEL programs tailored to their needs.
MULTIFILE
People tend to disclose personal identifiable information (PII) that could be used by cybercriminals against them. Often, persuasion techniques are used by cybercriminals to trick people to disclose PII. This research investigates whether people can be made less susceptible to persuasion by reciprocation (i.e., making people feel obligated to return a favour) and authority, particularly in regard to whether information security knowledge and positive affect moderate the relation between susceptibility to persuasion and disclosing PII. Data are used from a population-based survey experiment that measured the actual disclosure of PII in an experimental setting (N = 2426). The results demonstrate a persuasion–disclosure link, indicating that people disclose more PII when persuaded by reciprocation, but not by authority. Knowledge of information security was also found to relate to disclosure. People disclosed less PII when they possessed more knowledge of information security. Positive affect was not related to the disclosure of PII. And contrary to expectations, no moderating effects were found of information security knowledge nor positive affect on the persuasion–disclosure link. Possible explanations are discussed, as well as limitations and future research directions. Uitgegeven door Sage, APA beschrijving: van der Kleij, R., van ‘t Hoff—De Goede, S., van de Weijer, S., & Leukfeldt, R. (2023). Social engineering and the disclosure of personal identifiable information: Examining the relationship and moderating factors using a population-based survey experiment. Journal of Criminology, 56(2-3), 278-293. https://doi.org/10.1177/26338076231162660
DOCUMENT
Stakeholders must purposely reflect on the suitability of process models for designing tourism experience systems. Specific characteristics of these models relate to developing tourism experience systems as integral parts of wider socio-technical systems. Choices made in crafting such models need to address three reflexivity mechanisms: problem, stakeholder and method definition. We systematically evaluate application of these mechanisms in a living lab experiment, by developing evaluation episodes using the framework for evaluation in design science research. We outline (i) the development of these evaluation episodes and (ii) how executing them influenced the process and outcomes of co-crafting the process model. We highlight both the benefits of and an approach to incorporate reflexivity in developing process models for designing tourism experience systems.
MULTIFILE
Our approach builds on both the design traditions of participatory design and embodiment. We attempt to connect these traditions to the existing body of knowledge on persuasion. First we describe some basic theoretical concepts and infer how they influence persuasive design. Then we present a basic framework with which we intend to address the different abstraction layers involved. Finally, we discuss the principal differences and meeting areas between the disciplines of design and communication, ending up with some considerations for a persuasion toolbox that is intended to help communication professionals and designers effectively design behavior change interventions that fit the messy lives of people in the real world
DOCUMENT
Pressure on natural resources, unsustainable production and consumption, inequality and a growing global population lie at the base of the big challenges that people face. This chapter investigates how businesses can take responsibility in dealing with these challenges by means of frugal business model innovation. The notion of ‘frugal innovation’ was first introduced in the context of emerging markets, giving non-affluent customers opportunities to consume affordable products and services suited to their needs. Business modelling with a frugal mindset opens up a path that provides significant value while minimizing the use of resources such as energy, capital and time. Business models require intentional design if they are to deliver aspired sustainability impacts. Diminish or simplify resources can be described as the means to remove or reduce features, resources, required activities and/or waste streams. Decompose can be described as the removal of resources from the commercial value proposition and replacing them with resources the user/consumer already can access or uses. This is an Accepted Manuscript of a book chapter published by Routledge/CRC Press in Circular Economy : Challenges and Opportunities for Ethical and Sustainable Business on 2021, available online: https://doi.org/10.4324/9780367816650
DOCUMENT
In this article, we elaborate on the role of dialogical learning in identity formation in the context of environmental education. First, we distinguish this kind of learning from conditioning and reproductive learning. We also show that identity learning is not self-evident and we point out the role of emotions. Using Dialogical Self Theory, we then suggest that individuals do not have an “identity hierarchy” but a dialogical self that attaches meaning to experiences in both conscious and unconscious ways. We describe the learning process that enables the dialogical self to develop itself, and we elaborate on the characteristics of a good dialogue. We conclude with some remarks expanding room for a dialogue that would foster identity learning. https://doi.org/10.3390/resources5010011 https://www.linkedin.com/in/helenkopnina/
MULTIFILE