Open Access. Powered by Scholars. Published by Universities.®
Operations Research, Systems Engineering and Industrial Engineering Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Agent-based modeling (1)
- Algorithms (1)
- Attitudes (1)
- Automation (1)
- Behavior (1)
-
- Classification (1)
- Compliance (1)
- Compliance research (1)
- Computer security (1)
- Computerized simulations (1)
- Data collection (1)
- Data driven (1)
- Data sources (1)
- Decision making (1)
- Digital libraries (1)
- Economic agents (1)
- Electronic mail (1)
- Engineering (1)
- Engineering-- Industrial engineering (1)
- Evaluation (1)
- Experimental design (1)
- Feature extraction (1)
- Game theory (1)
- Games (1)
- Graphical user interfaces (1)
- Human factors (1)
- Hypothesis testing (1)
- Information security (1)
- Literature reviews (1)
- Machine learning (1)
Articles 1 - 3 of 3
Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering
Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan
Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan
Engineering Management & Systems Engineering Faculty Publications
Although strategic coalition formation is traditionally modeled using cooperative game theory, behavioral game theorists have repeatedly shown that outcomes predicted by game theory are different from those generated by actual human behavior. To further explore these differences, in a cooperative game theory context, we experiment to compare the outcomes resulting from human participants’ behavior to those generated by a cooperative game theory solution mechanism called the core partition. Our experiment uses an interactive simulation of a glove game, a particular type of cooperative game, to collect the participant’s decision choices and their resultant outcomes. Two different glove games are considered, …
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Engineering Management & Systems Engineering Faculty Publications
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Engineering Management & Systems Engineering Faculty Publications
In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …