From the article: Abstract The Information Axiom in axiomatic design states that minimising information is always desirable. Information in design may be considered to be a form of chaos and therefore is unwanted. Chaos leads to a lack of regularities in the design and unregulated issues tend to behave stochastically. Obviously, it is hard to satisfy the FRs of a design when it behaves stochastically. Following a recently presented and somewhat broader categorization of information, it appears to cause the most complication when information moves from the unrecognised to the recognised. The paper investigates how unrecognised information may be found and if it is found, how it can be addressed. Best practices for these investigations are derived from the Cynefin methodology. The Axiomatic Maturity Diagram is applied to address unrecognised information and to investigate how order can be restored. Two cases are applied as examples to explain the vexatious behaviour of unrecognised information.
MULTIFILE
Background: Although physical activity (PA) has positive effects on health and well-being, physical inactivity is a worldwide problem. Mobile health interventions have been shown to be effective in promoting PA. Personalizing persuasive strategies improves intervention success and can be conducted using machine learning (ML). For PA, several studies have addressed personalized persuasive strategies without ML, whereas others have included personalization using ML without focusing on persuasive strategies. An overview of studies discussing ML to personalize persuasive strategies in PA-promoting interventions and corresponding categorizations could be helpful for such interventions to be designed in the future but is still missing. Objective: First, we aimed to provide an overview of implemented ML techniques to personalize persuasive strategies in mobile health interventions promoting PA. Moreover, we aimed to present a categorization overview as a starting point for applying ML techniques in this field. Methods: A scoping review was conducted based on the framework by Arksey and O’Malley and the PRISMA-ScR (Preferred Reporting Items for Systematic Reviews and Meta-Analyses extension for Scoping Reviews) criteria. Scopus, Web of Science, and PubMed were searched for studies that included ML to personalize persuasive strategies in interventions promoting PA. Papers were screened using the ASReview software. From the included papers, categorized by the research project they belonged to, we extracted data regarding general study information, target group, PA intervention, implemented technology, and study details. On the basis of the analysis of these data, a categorization overview was given. Results: In total, 40 papers belonging to 27 different projects were included. These papers could be categorized in 4 groups based on their dimension of personalization. Then, for each dimension, 1 or 2 persuasive strategy categories were found together with a type of ML. The overview resulted in a categorization consisting of 3 levels: dimension of personalization, persuasive strategy, and type of ML. When personalizing the timing of the messages, most projects implemented reinforcement learning to personalize the timing of reminders and supervised learning (SL) to personalize the timing of feedback, monitoring, and goal-setting messages. Regarding the content of the messages, most projects implemented SL to personalize PA suggestions and feedback or educational messages. For personalizing PA suggestions, SL can be implemented either alone or combined with a recommender system. Finally, reinforcement learning was mostly used to personalize the type of feedback messages. Conclusions: The overview of all implemented persuasive strategies and their corresponding ML methods is insightful for this interdisciplinary field. Moreover, it led to a categorization overview that provides insights into the design and development of personalized persuasive strategies to promote PA. In future papers, the categorization overview might be expanded with additional layers to specify ML methods or additional dimensions of personalization and persuasive strategies.
DOCUMENT
The presentation of management information on screens and paper is aimed at the initiation of control actions in order to bring about predefinied goals. The terms and concepts used in this control information can be interptreted in different ways. It is of vital importance that adequate definitions for these terms and concepts are provided, because of the area of tension betrween those that control and those being controlled. The creation of a common conceptual framework and the maintenance of concepts and definitions can be supported by the construction of an organization-specific lexicon and the use of modern IT tools.
DOCUMENT
In the digital age, information problem solving (IPS) competence is essential for professionals to use online information effectively. Despite its importance, starting professionals often struggle with processing and presenting information, which are critical phases during authentic IPS tasks. Therefore, higher education institutions are tasked with preparing students to navigate these complex phases of IPS after graduation. However, most previous studies have focused on the “search” and “select” phases of simple, short-duration IPS tasks, which do not reflect the complex information challenges faced in professional settings. To address this gap, this study aimed to identify and categorize the strategies higher education students currently use to process and present information for a semester-long authentic professional task. A thematic analysis of cued retrospective reporting sessions was conducted with 24 senior students while they created a website for professional practice. Students demonstrated 49 IPS strategies, which were categorized into twelve IPS activities across three generic activity phases: “process,” “synthesize,” and “create.” Within these phases, three patterns of co-occurring strategies were observed: reproductive, arranging, and elaborative. Based on these findings, existing IPS process models were empirically refined. The observed variation in strategies highlights the importance of building on students’ strengths when teaching IPS. Teaching them to adapt the strategies to various authentic task contexts could help enhance students’ IPS competence and strategic flexibility in real-world settings. Future research should explore the applicability of the updated IPS model across different authentic task contexts to refine instructional approaches further.
MULTIFILE
With the development of Enterprise Architecture (EA) as a discipline, measuring and understanding its value for business and IT has become relevant. In this paper a framework for categorizing the benefits of EA, the Enterprise Architecture Value Framework (EAVF), is presented and based on this framework, a measurability maturity scale is introduced. In the EAVF the value aspects of EA are expressed using the four perspectives of the Balanced Scorecard with regard to the development of these aspects over time, defining sixteen key areas in which EA may provide value. In its current form the framework can support architects and researchers in describing and categorizing the benefits of EA. As part of our ongoing research on the value of EA, two pilots using the framework have been carried out at large financial institutions. These pilots illustrate how to use the EAVF as a tool in measuring the benefits of EA.
DOCUMENT
In the following paper I investigate the use of Facebook and the purpose of its use by first year students, in the Department of Media, Communication and Information at the Amsterdam University of Applied Sciences, with a limited enrolment of 960 students (2011-2012). Differences in whether or not students use self-created Facebook-groups will be measured against the differences in utilization of various activities on Facebook. According to a previous study, these activities are categorized by the motives for using Facebook; 1) for information sharing, 2) for educational purposes, 3) for social purposes and 4) for leisure. Furthermore, this study is part of a broader (PhD) research where I investigate the influence of media literacy and its possible effect on students’ success. The aspects of media literacy I focus on are better known as information problem solving skills (IPS-skills). These IPS-skills are also measured against the different activities conducted on Facebook. All variables are measured using digital surveys and analysed with the help of statistical tests. This will ultimately provide a valuable insight into how and if there is a relation between the differences of the students’ use of Facebook and their IPS-skills.
LINK
In the digital age, information problem solving (IPS) competence is essential for professionals to use online information effectively. Despite its importance, starting professionals often struggle with processing and presenting information, which are critical phases during authentic IPS tasks. Therefore, higher education institutions are tasked with preparing students to navigate these complex phases of IPS after graduation. However, most previous studies have focused on the “search” and “select” phases of simple, short-duration IPS tasks, which do not reflect the complex information challenges faced in professional settings. To address this gap, this study aimed to identify and categorize the strategies higher education students currently use to process and present information for a semester-long authentic professional task. A thematic analysis of cued retrospective reporting sessions was conducted with 24 senior students while they created a website for professional practice. Students demonstrated 49 IPS strategies, which were categorized into twelve IPS activities across three generic activity phases: “process,” “synthesize,” and “create.” Within these phases, three patterns of co-occurring strategies were observed: reproductive, arranging, and elaborative. Based on these findings, existing IPS process models were empirically refined. The observed variation in strategies highlights the importance of building on students’ strengths when teaching IPS. Teaching them to adapt the strategies to various authentic task contexts could help enhance students’ IPS competence and strategic flexibility in real-world settings. Future research should explore the applicability of the updated IPS model across different authentic task contexts to refine instructional approaches further.
LINK
Business rule models are widely applied, standalone and embedded in smart objects. They have become segregated from information technology and they are now a valuable asset in their own right. As more business rule models are becoming assets, business models to monetize these assets are designed. The goal of this work is to present a step towards business model classification for organizations for which its value position is characterized by business rule models. Based on a survey we propose a business model categorization that is aligned to different types of assets and business model archetypes. The results show five main categories of business models: The value adding business rule model, the ‘create me a business rule model’ business model, the KAAS business model, the bait and hook business model and the market place business model.
DOCUMENT
People tend to disclose personal identifiable information (PII) that could be used by cybercriminals against them. Often, persuasion techniques are used by cybercriminals to trick people to disclose PII. This research investigates whether people can be made less susceptible to persuasion by reciprocation (i.e., making people feel obligated to return a favour) and authority, particularly in regard to whether information security knowledge and positive affect moderate the relation between susceptibility to persuasion and disclosing PII. Data are used from a population-based survey experiment that measured the actual disclosure of PII in an experimental setting (N = 2426). The results demonstrate a persuasion–disclosure link, indicating that people disclose more PII when persuaded by reciprocation, but not by authority. Knowledge of information security was also found to relate to disclosure. People disclosed less PII when they possessed more knowledge of information security. Positive affect was not related to the disclosure of PII. And contrary to expectations, no moderating effects were found of information security knowledge nor positive affect on the persuasion–disclosure link. Possible explanations are discussed, as well as limitations and future research directions. Uitgegeven door Sage, APA beschrijving: van der Kleij, R., van ‘t Hoff—De Goede, S., van de Weijer, S., & Leukfeldt, R. (2023). Social engineering and the disclosure of personal identifiable information: Examining the relationship and moderating factors using a population-based survey experiment. Journal of Criminology, 56(2-3), 278-293. https://doi.org/10.1177/26338076231162660
DOCUMENT
Forensic and behavioural science are often seen as two different disciplines. However, there is a growing realization that the two disciplines should be more strongly integrated. Incorporating psychological theories on human behaviour in forensic science could help solving investigative problems, especially at the crime scene. At the crime scene it is not just about applying scientific methods to analyse traces; these traces must first be perceived and categorized as relevant. At the crime scene, the behavioural perspective of an investigative psychologist could play an important role. In this study, we examine to what extent (1) investigative psychologists detect deviant behavioural cues compared to forensic examiners when investigating a crime scene, (2) forensic examiners can find the relevant traces that can be associated with this behaviour and (3) the availability of a psychological report highlighting these behavioural cues helps forensic examiners in finding more relevant traces. To this end, a total of 14 investigative psychologists and 40 forensic examiners investigated a virtual 3D mock crime scene. The results of this study show that investigative psychologists see significantly more deviant behavioural cues than forensic examiners, and that forensic examiners who receive a psychological report on these cues recognize and collect significantly more traces that can be linked to deviant behaviour and have a high evidential value than examiners who did not receive this information. However, the study also demonstrates that behavioural information is likely to be ignored when it contradicts existing beliefs.
DOCUMENT