Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 2309

Full-Text Articles in Business

Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke Nov 2024

Uncovering Merchants’ Willingness To Wait In On-Demand Food Delivery Markets, Jian Liang, Ya Zhao, Hai Wang, Zuopeng Xiao, Jintao Ke

Research Collection School Of Computing and Information Systems

While traditional on-demand food delivery services help restaurants reach more customers and enable doorstep deliveries, they also come with drawbacks, such as high commission fees and limited control over the delivery process. White-label food delivery services have emerged as an alternative, ready-to-use platform for restaurants to arrange delivery for customer orders received through their applications or websites, without the constraints imposed by traditional on-demand food delivery platforms or the need to develop an in-house delivery operation. Although several studies have investigated consumer behavior when using traditional on-demand food delivery services, there is limited research on merchants’ behavior when adopting white-label …


Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu Oct 2024

Does Ceo Agreeableness Personality Mitigate Real Earnings Management?, Shan Liu, Xingying Wu, Nan Hu

Research Collection School Of Computing and Information Systems

Despite efforts to mitigate aggressive financial reporting, earnings management remains challenging to parties interested in inhibiting its dysfunctional effects. Using linguistic algorithms to assess CEO agreeableness personality from their unscripted texts in conference calls, we find that it is a determinant that mitigates a firm's real earnings management. Furthermore, such an effect is more pronounced when firms confront intensive market competition and financial distress and have weaker managerial entrenchment or when CEOs face stronger internal governance. Our findings persist even after we utilize several alternative real earnings management metrics and control other confounding personalities in prior earnings management studies. The …


How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris Sep 2024

How State Universities Are Addressing The Shortage Of Cybersecurity Professionals In The United States, Gary Harris

Journal of Cybersecurity Education, Research and Practice

Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the shortage of cybersecurity professionals since higher education institutions are a primary source to the workforce pipeline. It is suggested that the number of cybersecurity professionals entering the workforce is related to the number of available programs. Thus increasing the number of programs will increase the number of …


Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison Sep 2024

Leveraging Propagation Delay For Wormhole Detection In Wireless Networks, Harry May, Travis Atkison

Journal of Cybersecurity Education, Research and Practice

Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based detection or specialized hardware, our method focuses on analyzing propagation delay timings to identify anomalous behavior indicative of wormhole attacks. The proposed methodology involves collecting propagation delay data in both normal network scenarios and scenarios with inserted malicious wormhole nodes. By comparing these delay timings, our approach aims to differentiate between legitimate network …


The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang Sep 2024

The Impact Of Managerial Myopia On Cybersecurity: Evidence From Data Breaches, Wen Chen, Xing Li, Haibin Wu, Liandong Zhang

Research Collection School Of Accountancy

Using a sample of U.S. firms for the period 2005–2017, we provide evidence that managerial myopic actions contribute to corporate cybersecurity risk. Specifically, we show that abnormal cuts in discretionary expenditures, our proxy for managerial myopia, are positively associated with the likelihood of data breaches. The association is largely driven by firms that appear to cut discretionary expenditures to meet short-term earnings targets. In addition, the association is stronger for firms with greater short-term equity incentives, higher earnings response coefficients, low levels of institutional block ownership, or large market shares. Finally, firms appear to increase discretionary expenditures upon the announcement …


Creating A Business In 50 Minutes With Ai, Mark A. Rider Vanarsdale Chair In Entrepreneurship, School Of Business Aug 2024

Creating A Business In 50 Minutes With Ai, Mark A. Rider Vanarsdale Chair In Entrepreneurship, School Of Business

Artificial Intelligence, 2024-25

This lesson plan explores using artificial intelligence (AI) to enhance the process of business idea generation and validation. Over a dynamic 50-minute workshop, students will engage with AI tools, particularly Microsoft's Copilot, to develop viable business concepts aligned with their personal interests and market needs.

The session begins with the Ikigai exercise, guiding students to identify their passions, strengths, and potential economic opportunities. Following this, students will use AI to engage in divergent thinking, generating a wide range of business ideas and refining them through iterative prompts until they find promising concepts.

In the validation phase, students will employ AI …


Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis Aug 2024

Exponential Qubit Reduction In Optimization For Financial Transaction Settlement, Elias X. Huber, Benjamin Y. L. Tan, Paul Robert Griffin, Dimitris G. Angelakis

Research Collection School Of Computing and Information Systems

We extend the qubit-efficient encoding presented in (Tan et al. in Quantum 5:454, 2021) and apply it to instances of the financial transaction settlement problem constructed from data provided by a regulated financial exchange. Our methods are directly applicable to any QUBO problem with linear inequality constraints. Our extension of previously proposed methods consists of a simplification in varying the number of qubits used to encode correlations as well as a new class of variational circuits which incorporate symmetries thereby reducing sampling overhead, improving numerical stability and recovering the expression of the cost objective as a Hermitian observable. We also …


Predicting Personality Or Prejudice? Facial Inference In The Age Of Artificial Intelligence, Shilpa Madan, Gayoung Park Aug 2024

Predicting Personality Or Prejudice? Facial Inference In The Age Of Artificial Intelligence, Shilpa Madan, Gayoung Park

Research Collection Lee Kong Chian School Of Business

Facial inference, a cornerstone of person perception, has traditionally been studied through human judgments about personality traits and abilities based on people's faces. Recent advances in artificial intelligence (AI) have introduced new dimensions to this field, employing machine learning algorithms to reveal people's character, capabilities, and social outcomes based just on their faces. This review examines recent research on human and AI-based facial inference across psychology, business, computer science, legal, and policy studies to highlight the need for scientific consensus on whether or not people's faces can reveal their inner traits, and urges researchers to address the critical concerns …


Maximizing Generative Ai Benefits With Task Creativity And Human Validation, Charu Sinha, Veselina P. Vracheva, Cristina Nistor Jul 2024

Maximizing Generative Ai Benefits With Task Creativity And Human Validation, Charu Sinha, Veselina P. Vracheva, Cristina Nistor

Business Faculty Articles and Research

Much of the existing literature on generative AI applications is conflicting, with findings suggesting that investing in AI will lead to better organizational outcomes but also pointing out that incorporating AI may be a wasteful even counterproductive initiative. We develop a conceptual frame-work to characterize generative AI benefits based on the types of tasks that generative AI may be used for in management. Our work suggests that task creativity plays a key role in successful generative AI outcomes, but human validation - the extent to which a human engages in a supervisory role - is required to reap the benefits. …


Empowering Traditional Industries With Digital Intelligence For Transformation And Upgrading, Jiyuan Zang, Huanyong Ji, Qingxue Huang Jul 2024

Empowering Traditional Industries With Digital Intelligence For Transformation And Upgrading, Jiyuan Zang, Huanyong Ji, Qingxue Huang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Traditional industries are the basic support and driving force for the high-quality development of the economy. Digital intelligence is an important lever for traditional industries to achieve the transformation of old and new kinetic energy and the leapfrogging of the global value chain. This study firstly deconstructs the rich connotations of digital intelligence from the perspectives of digitalization, networkization, and intelligentization. Secondly, it analyzes the transformation mechanism and various pathways through which digital intelligence impacts traditional industries. Thirdly, it analyzes the barriers faced by traditional industries in the process of adopting digital intelligence technologies. Finally, this study puts forward four …


Strategic Study On Leading Construction Of Modern Agricultural System By Technology Innovation, Yan Yan, Xurong Mei, Xiudong Wang Jul 2024

Strategic Study On Leading Construction Of Modern Agricultural System By Technology Innovation, Yan Yan, Xurong Mei, Xiudong Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Technology innovation is the fundamental solution to build a modern agricultural system, and it is also an important support for building the large base, large enterprise, and large industry of modern agriculture and achieving the modernization of material equipment, technology, management, agricultural informatization, and sustainable resource utilization of agriculture. This paper explains the scientific concepts and logical relationships of the agricultural production system, industrial system and management system, which are the main components of a modern agricultural system. It emphasizes that ensuring food security, promoting industrial integration and upgrading, and cultivating leading enterprises are current key tasks. Nevertheless, from the …


Using Gamification To Enhance Mastery Of Network Security Concepts, Kevin Hilliard, Xiaohong Yuan, Kelvin Bryant, Jinsheng Xu, Jinghua Zhang Jul 2024

Using Gamification To Enhance Mastery Of Network Security Concepts, Kevin Hilliard, Xiaohong Yuan, Kelvin Bryant, Jinsheng Xu, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Gamification has proven to be effective in engaging and encouraging people to work towards and achieve goals. Many students struggle to focus on schoolwork, due to a lack of interest, lack of understanding, or other factors unique to the student. Applying gamification elements to education can help engage these students in learning their course material and help them excel academically. This study examines the effectiveness of using gamification techniques to enhance the learning experience in college Computer Science courses. A video game application is utilized to review and reinforce cybersecurity concepts that students have already been taught in class. Previous …


Introduction To Programming And Applied Analytics Using Python, Matt Brown Jul 2024

Introduction To Programming And Applied Analytics Using Python, Matt Brown

ATU Faculty OER Books and Materials

This open electronic textbook is a collection of lecture notes, assignments, and additional background material for a junior level analytics course targeted for business students, it is free to use and copy. The text assumes readers have not had prior programming or computing courses, but have had at least one analytics course. The textbook differs from other textbooks because it serves a dual purpose, to first introduce to students the Python programming language and secondly to introduce analytics programming in Python. It is not meant to be a comprehensive book on the Python language or data analytics, rather a semester’s …


Green Finance Growth Prediction Model Based On Time-Series Conditional Generative Adversarial Networks, Aya Salama Abdelhady, Nadia Dahmani, Lobna M. Abouel-Magd, Ashraf Darwish, Aboul Ella Hassanien Jul 2024

Green Finance Growth Prediction Model Based On Time-Series Conditional Generative Adversarial Networks, Aya Salama Abdelhady, Nadia Dahmani, Lobna M. Abouel-Magd, Ashraf Darwish, Aboul Ella Hassanien

All Works

Climate change mitigation necessitates increased investment in green sectors. This study proposes a methodology to predict green finance growth across various countries, aiming to encourage such investments. Our approach leverages time-series Conditional Generative Adversarial Networks (CT-GANs) for data augmentation and Nonlinear Autoregressive Neural Networks (NARNNs) for prediction. The green finance growth predicting model was applied to datasets collected from forty countries across five continents. The Augmented Dickey-Fuller (ADF) test confirmed the non-stationary nature of the data, supporting the use of Nonlinear Autoregressive Neural Networks (NARNNs). CT-GANs were then employed to augment the data for improved prediction accuracy. Results demonstrate the …


Essays On Artificial Intelligence (Ai) In Management, Bowen Zhou Jul 2024

Essays On Artificial Intelligence (Ai) In Management, Bowen Zhou

Dissertations and Theses Collection (Open Access)

This dissertation comprises three essays that investigate the transformative potential of Artificial Intelligence (AI) in business.

Chapter 1 investigates the fundamental issue of how integrating AI within R&D activities influences a firm’s market value. We developed an "AI Index" using patent data and textual analysis. Interestingly, empirical results indicate a negative correlation between AI integration and market value. However, this does not suggest that AI is an unviable avenue for exploration. Further analysis of the boundary conditions reveals that complementary assets are crucial for successful commercialisation, highlighting that while AI adoption is costly, these assets significantly enhance its market value. …


The Confluence, Volume3, Issue 2, Full Issue Jun 2024

The Confluence, Volume3, Issue 2, Full Issue

The Confluence

No abstract provided.


Comparative Analysis And Insights Into R&D Mode Of Top Artificial Intelligence Companies In China And The Us, Xiyi Yang, Jia Jia, Xiaoyu Zhou, Shouyang Wang Jun 2024

Comparative Analysis And Insights Into R&D Mode Of Top Artificial Intelligence Companies In China And The Us, Xiyi Yang, Jia Jia, Xiaoyu Zhou, Shouyang Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Artificial intelligence (AI) is currently one of the most prominent fields in the technology industry, with China and the US being two global centers for AI research and development. However, the two countries differ in their development levels of the AI industry. In particular, the emergence of ChatGPT in 2022 has sparked extensive discussions regarding the capabilities and competitiveness of Chinese AI companies. This study analyzes over 120 000 AI invention patents approved in the past five years in both China and the US. Firstly, it constructs a multidimensional index based on AI patent features to identify the top 10 …


Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad Jun 2024

Development Of Cyber Security Platform For Experiential Learning, Abhishek Vaish, Ravindra Kumar, Samo Bobek, Simona Sternad

Journal of Cybersecurity Education, Research and Practice

The cyber security education market has grown-up exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Fo- rum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour. Cybersecurity as a field has evolved as a multi-discipline, multi-stakeholder and multi-role discipline. Therefore, the need to address formal education with an outcome-based philosophy is imperative to address for a wider audience with varied past training in their formal education. With the Internet …


Demystifying The "Social Media Algorithm": The Legacy Of Surveillance Advertising And Platformization, Garrett Crites Jun 2024

Demystifying The "Social Media Algorithm": The Legacy Of Surveillance Advertising And Platformization, Garrett Crites

Honors Projects

Recently, more individuals are becoming aware that they are being served content on social media platforms by automated means. Due to the lack of transparency, a colloquial understanding of the “social media algorithm” has emerged in popular discourse. To shed light on the real–world phenomena that these ideas surround, I look at the rise of surveillance advertising and the platformization of the internet in conjunction with the automated platform operations employed by large social media platforms like Facebook, YouTube, TikTok, and X. In doing so I provide a clearer idea of the colloquial “social media algorithm” to encourage the reader …


Experimental Methods In Predicting Market Drift And Other Portfolio Optimization Factors Using Graph Theory, Perry Harrison Zhang Jun 2024

Experimental Methods In Predicting Market Drift And Other Portfolio Optimization Factors Using Graph Theory, Perry Harrison Zhang

Computer Science Senior Theses

No abstract provided.


An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black Jun 2024

An Alternative Approach To Data Carving Portable Document Format (Pdf) Files, Kevin Hughes, Michael Black

Journal of Cybersecurity Education, Research and Practice

Traditional data carving relies on the successful identification of headers and trailers, unique hexadecimal signatures which are exclusive to specific file types. This can present a challenge for digital forensics examiners when pitted against modern anti-forensics techniques. The interest of this study is file signature obfuscation, a technique which alters headers and trailers. This research will focus on the development of a new, proof-of-concept algorithm that analyzes content in segments based on unique elements found within the body of a file. The file type being targeted is the Portable Document Format (PDF) and this research is built upon previously successful …


Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye Jun 2024

Dappscan: Building Large-Scale Datasets For Smart Contract Weaknesses In Dapp Projects, Zibin Zheng, Jianzhong Su, Jiachi Chen, David Lo, Zhijie Zhong, Mingxi Ye

Research Collection School Of Computing and Information Systems

The Smart Contract Weakness Classification Registry (SWC Registry) is a widely recognized list of smart contract weaknesses specific to the Ethereum platform. Despite the SWC Registry not being updated with new entries since 2020, the sustained development of smart contract analysis tools for detecting SWC-listed weaknesses highlights their ongoing significance in the field. However, evaluating these tools has proven challenging due to the absence of a large, unbiased, real-world dataset. To address this problem, we aim to build a large-scale SWC weakness dataset from real-world DApp projects. We recruited 22 participants and spent 44 person-months analyzing 1,199 open-source audit reports …


To Protect Or To Hide: An Investigation On Corporate Redacted Disclosure Motives Under New Fast Act Regulation, Yan Ma, Qian Mao, Nan Hu Jun 2024

To Protect Or To Hide: An Investigation On Corporate Redacted Disclosure Motives Under New Fast Act Regulation, Yan Ma, Qian Mao, Nan Hu

Research Collection School Of Computing and Information Systems

China adopted amendments allowing companies to redact filings without prior approval in 2016. Leveraging this change as a quasi-nature experiment, we explore whether managers utilize redacted information to withhold bad information in the more lenient regulatory environment. Our investigation uncovers a significant shift in managerial behavior: Since 2016, managers incline to employ redactions to obscure negative news rather than safeguarding proprietary data. Furthermore, we find that the poorer firm performance and a higher cost of equity are associated with the redacted disclosures after 2016, suggesting that investors perceive an increase in firm-specific risk attributed to withholding bad news through redactions.


Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg May 2024

Sensing With Integrity: Responsible Sensor Systems In An Era Of Ai, David Eisenberg

Dissertations

Deep and machine learning now offer immense benefits for consumer choice, decision-making, medicine, mental health and education, smart cities, and intelligent transportation and driver safety. However, as communication and Internet technology further advances, these benefits have the potential to be outweighed by compromises to privacy, personal freedom, consumer trust, and discrimination. While ethical consequences for personal freedom and equity rise from these technological advances, the issue may not be the technology itself but a lack of regulation and policy that allow abuses to occur. A first study examines how emerging sensor-based technologies, limited to only accelerometer and gyroscope data from …


Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga May 2024

Crisis Management: Unveiling Information And Communication Technologies’ Revamped Role Through The Lens Of Sub-Saharan African Countries During Covid-19, Ruthbetha Kateule, Egidius Kamanyi, Mahadia Tunga

The African Journal of Information Systems

The management of COVID-19 pandemic has revealed inefficiencies in coordinating global response, particularly in African countries. Therefore, creating an urgent need to examine the literature on Information and Communication Technologies (ICT) in crisis management to appreciate its contextual role. Employing a systematic review, using the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA), this paper critically assessed the extent of the use of ICT in crisis management in Africa’s response to COVID-19 to reconstruct its resilience against future crises. Findings indicate that while countries with limited ICT infrastructure faced considerable challenges in utilizing ICT solutions in COVID-19 management, countries …


Comparing And Assessing Four Ai Chatbots' Competence In Economics, Patrik T. Hultberg, David Santandreu Calonge, Firuz Kamalov, Linda Smail May 2024

Comparing And Assessing Four Ai Chatbots' Competence In Economics, Patrik T. Hultberg, David Santandreu Calonge, Firuz Kamalov, Linda Smail

All Works

Artificial Intelligence (AI) chatbots have emerged as powerful tools in modern academic endeavors, presenting both opportunities and challenges in the learning landscape. They can provide content information and analysis across most academic disciplines, but significant differences exist in terms of response accuracy for conclusions and explanations, as well as word counts. This study explores four distinct AI chatbots, GPT-3.5, GPT-4, Bard, and LLaMA 2, for accuracy of conclusions and quality of explanations in the context of university-level economics. Leveraging Bloom’s taxonomy of cognitive learning complexity as a guiding framework, the study confronts the four AI chatbots with a standard test …


Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes May 2024

Examining Outcomes Of Privacy Risk And Brand Trust On The Adoption Of Consumer Smart Devices, Marianne C. Loes

<strong> Theses and Dissertations </strong>

With more connected devices on earth than there are people, Internet of Things (IoT) is arguably just as innovative as the original introduction of the Internet. Though much of the research on technology acceptance and adoption has been conducted in organizational settings, the consumer use of IoT technologies, such as smart devices, is becoming a fertile field of research. The merger of these research streams is especially relevant from a societal perspective as smart devices become more embedded in consumer’s daily lives, particularly with the introduction of the “meta verse.” While original technology acceptance research is limited to two system-specific …


Reinforcement Learning With Maskable Stock Representation For Portfolio Management In Customizable Stock Pools, Wentao Zhang, Yilei Zhao, Shuo Sun, Jie Ying, Yonggang Xie, Zitao Song, Xinrun Wang, Bo An May 2024

Reinforcement Learning With Maskable Stock Representation For Portfolio Management In Customizable Stock Pools, Wentao Zhang, Yilei Zhao, Shuo Sun, Jie Ying, Yonggang Xie, Zitao Song, Xinrun Wang, Bo An

Research Collection School Of Computing and Information Systems

Portfolio management (PM) is a fundamental financial trading task, which explores the optimal periodical reallocation of capitals into different stocks to pursue long-term profits. Reinforcement learning (RL) has recently shown its potential to train profitable agents for PM through interacting with financial markets. However, existing work mostly focuses on fixed stock pools, which is inconsistent with investors’ practical demand. Specifically, the target stock pool of different investors varies dramatically due to their discrepancy on market states and individual investors may temporally adjust stocks they desire to trade (e.g., adding one popular stocks), which lead to customizable stock pools (CSPs). Existing …


Quantum Machine Learning For Credit Scoring, Nikolaos Schetakis, Davit Aghamalyan, Micheael Boguslavsky, Agnieszka Rees, Marc Rakotomalala, Paul Robert Griffin May 2024

Quantum Machine Learning For Credit Scoring, Nikolaos Schetakis, Davit Aghamalyan, Micheael Boguslavsky, Agnieszka Rees, Marc Rakotomalala, Paul Robert Griffin

Research Collection School Of Computing and Information Systems

This study investigates the integration of quantum circuits with classical neural networks for enhancing credit scoring for small- and medium-sized enterprises (SMEs). We introduce a hybrid quantum–classical model, focusing on the synergy between quantum and classical rather than comparing the performance of separate quantum and classical models. Our model incorporates a quantum layer into a traditional neural network, achieving notable reductions in training time. We apply this innovative framework to a binary classification task with a proprietary real-world classical credit default dataset for SMEs in Singapore. The results indicate that our hybrid model achieves efficient training, requiring significantly fewer epochs …


From Tweets To Token Sales: Assessing Ico Success Through Social Media Sentiments, Donghao Huang, S. Samuel, Quoc Toan Huynh, Zhaoxia Wang May 2024

From Tweets To Token Sales: Assessing Ico Success Through Social Media Sentiments, Donghao Huang, S. Samuel, Quoc Toan Huynh, Zhaoxia Wang

Research Collection School Of Computing and Information Systems

With the advent of social network technology, the influence of collective opinions has significantly impacted business, marketing, and fundraising. Particularly in the blockchain space, Initial Coin Offerings (ICOs) gain substantial exposure across various online platforms. Yet, the intricate relationships among these elements remain largely unexplored. This study aims to investigate the relationships between social media sentiment, engagement metrics, and ICO success. We hypothesize a positive correlation between favorable sentiment in ICO-related tweets and overall project success. Additionally, we recognize social media engagement indicators (mentions, retweets, likes, follower counts) as critical factors affecting ICO performance. Employing machine learning techniques, we conduct …