Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

What Machines Can't Do (Yet) In Real Work Settings, Thomas H. Davenport, Steven M. Miller Oct 2022

What Machines Can't Do (Yet) In Real Work Settings, Thomas H. Davenport, Steven M. Miller

Research Collection School Of Computing and Information Systems

AI systems may perform well in the research lab or under highly controlled application settings, but they still needed human help in the types of real world work settings we researched for a new book, Working With AI: Real Stories of Human-Machine Collaboration. Human workers were very much in evidence across our 30 case studies. In this article, we use those examples to illustrate our list of AI-enabled activities that still require human assistance. These are activities where organizations need to continue to invest in human capital, and where practitioners can expect job continuity for the immediate future


Artificial Intelligence And Human Employment, Singapore Management University Sep 2022

Artificial Intelligence And Human Employment, Singapore Management University

Perspectives@SMU

AI will replace humans in repetitive tasks. Greater value can be created when it augments and complements the jobs people do


Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven M. Miller Sep 2022

Singapore Public Sector Ai Applications Emphasizing Public Engagement: Six Examples, Steven M. Miller

Research Collection School Of Computing and Information Systems

This article provides an overview of six examples of public sector AI applications in Singapore that illustrate different ways of enhancing engagement with the public. These applications demonstrate ways of enhancing engagement with the public by providing greater accessibility to government services (access anywhere, anytime) and speedier responses to public processes and feedback. Some applications make it substantially easier for members of the public to do things or make choices, while others reduce waiting time, either across an entire public infrastructure, or for an individual transaction. Some provide highly individualized coaching to guide a person through the process of doing …


Renewable Energy Legislation In Nevada: 2017 - 2021, Peter Grema, Zachary Walusek, Caitlin J. Saladino, William E. Brown Jr. Aug 2022

Renewable Energy Legislation In Nevada: 2017 - 2021, Peter Grema, Zachary Walusek, Caitlin J. Saladino, William E. Brown Jr.

Environment

The purpose of this fact sheet is to summarize legislative actions from the biennial 79th, 80th, and 81st Nevada Legislative Sessions (2017, 2019, and 2021) regarding solar energy production and state efforts to reach 50 percent energy production from renewable sources by 2030. By 2050, Nevada has a statutorily mandated obligation to be a net-zero carbon producer in fulfilling energy production needs from large scale utility services.


Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang Aug 2022

Smart Manufacturing—Theories, Methods, And Applications, Zhuming Bi, Lida Xu, Puren Ouyang

Information Technology & Decision Sciences Faculty Publications

(First paragraph) Smart manufacturing (SM) distinguishes itself from other system paradigms by introducing ‘smartness’ as a measure to a manufacturing system; however, researchers in different domains have different expectations of system smartness from their own perspectives. In this Special Issue (SI), SM refers to a system paradigm where digital technologies are deployed to enhance system smartness by (1) empowering physical resources in production, (2) utilizing virtual and dynamic assets over the internet to expand system capabilities, (3) supporting data-driven decision making at all domains and levels of businesses, or (4) reconfiguring systems to adapt changes and uncertainties in dynamic environments. …


Active Learning With Cybersecurity, Carole Shook May 2022

Active Learning With Cybersecurity, Carole Shook

TFSC Publications and Presentations

A global campus grant was obtained in Spring 2020 to develop modules for Cybersecurity. This presentation encompasses the use of Cyberciege and case studies that require active learning of students.


How Apis Create Growth By Inverting The Firm, Seth G. Benzell, Jonathan Hersh, Marshall Van Alstyne Mar 2022

How Apis Create Growth By Inverting The Firm, Seth G. Benzell, Jonathan Hersh, Marshall Van Alstyne

Economics Faculty Articles and Research

Traditional asset management strategy has emphasized building barriers to entry or closely guarding unique assets to maintain a firm’s comparative advantage. A new “Inverted Firm” paradigm, however, has emerged. Under this strategy, firms share data seeking to become platforms by opening digital services to third-parties and capturing part of their external surplus. This contrasts with a “pipeline” strategy where the firm itself creates value. This paper quantitatively estimates the effect of adopting an inverted firm strategy through the lens of Application Programming Interfaces (APIs), a key enabling technology. Using both public data and that of a private API development firm, …


Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan Mar 2022

Analyzing The Impact Of Digital Payment On Efficiency And Productivity Of Commercial Banks: A Case Study In China, Haopeng Wang, Aldy Gunawan

Research Collection School Of Computing and Information Systems

Digital payment has become one of the most popular payment methods all around the world, especially in countries that witnessed the rapid development of internet. As a traditional financial institution, commercial banks have been impacted by newly developed payment technology since third payment platforms have attracted customers to use the digital payment for daily consumption, transferring, and even investment. This paper focuses on analyzing whether and how the commercial banks in China have been affected by digital payment by using empirical methods. Systematic Generalized Method of Moments (SYS-GMM) is used to test the relationship between the productivity of commercial banks …


Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan Jan 2022

Machine Infelicity In A Poignant Visitor Setting: Comparing Human And Ai’S Ability To Analyze Discourse, Martin Maccarthy, Hairong Shan

Research outputs 2014 to 2021

This study compares the efficacy of computer and human analytics in a commemorative setting. Both deductive and inductive reasoning are compared using the same data across both methods. The data comprises 2490 non-repeated, non-dialogical social media comments from the popular touristic site Tripadvisor. Included in the analysis is participant observation at two Anzac commemorative sites, one in Western Australia and one in Northern France. The data is then processed using both Leximancer V4.51 and Dialectic Thematic Analysis. The findings demonstrate artificial intelligence (AI) was incapable of insight beyond metric-driven content analysis. While fully deduced by human analysis the metamodel was …


Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen Jan 2022

Development Of A Framework To Support Informed Shipbuilding Based On Supply Chain Disruptions, Katherine Smith, Rafael Diaz, Yuzhong Shen

VMASC Publications

In addition to stresses induced by the Covid-19 pandemic, supply chains worldwide have been growing more complex while facing a continuous onslaught of disruptions. This paper presents an analysis and extension of a graph based model for modeling and simulating the effects of such disruptions. The graph based model combines a Bayesian network approach for simulating risks with a network dependency analysis approach for simulating the propagation of disruptions through the network over time. The initial analysis provides evidence supporting extension to for using a multi-layered approach allowing for the inclusion of cyclic features in supply chain models. Initial results …


Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna Jan 2022

Customer Gaze Estimation In Retail Using Deep Learning, Shashimal Senarath, Primesh Pathirana, Dulani Meedeniya, Sampath Jayarathna

Computer Science Faculty Publications

At present, intelligent computing applications are widely used in different domains, including retail stores. The analysis of customer behaviour has become crucial for the benefit of both customers and retailers. In this regard, the concept of remote gaze estimation using deep learning has shown promising results in analyzing customer behaviour in retail due to its scalability, robustness, low cost, and uninterrupted nature. This study presents a three-stage, three-attention-based deep convolutional neural network for remote gaze estimation in retail using image data. In the first stage, we design a mechanism to estimate the 3D gaze of the subject using image data …


Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao Jan 2022

Estimating Efforts For Various Activities In Agile Software Development: An Empirical Study, Lan Cao

Information Technology & Decision Sciences Faculty Publications

Effort estimation is an important practice in agile software development. The agile community believes that developers’ estimates get more accurate over time due to the cumulative effect of learning from short and frequent feedback. However, there is no empirical evidence of an improvement in estimation accuracy over time, nor have prior studies examined effort estimation in different development activities, which are associated with substantial costs. This study fills the knowledge gap in the field of software estimation in agile software development by investigating estimations across time and different development activities based on data collected from a large agile project. This …


Can I Touch The Clothes On The Screen? The Touch Effect In Online Shopping, Ha Kyung Lee, Dooyoung Choi Jan 2022

Can I Touch The Clothes On The Screen? The Touch Effect In Online Shopping, Ha Kyung Lee, Dooyoung Choi

STEMPS Faculty Publications

We examined the interplay effects of device types (touch vs. non-touch) and the tactile sensitivity (fur vs. woven) on the product attitudes mediated by the mental simulation for touch. The participants from MTurk were randomly assigned to one of two tactile conditions. Responses from those who used tablets (n=83, touch device) and laptops (n=96, non-touch device) were included in the analysis. The main effects of device types and tactile-sensitivity on the mental simulation for touch were significant. The interaction effect of device types and tactile sensitivity was also significant. Those participants seeing the less tactile-sensitive product showed greater mental simulation …


The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He Jan 2022

The Effects Of Antecedents And Mediating Factors On Cybersecurity Protection Behavior, Ling Li, Li Xu, Wu He

Information Technology & Decision Sciences Faculty Publications

This paper identifies opportunities for potential theoretical and practical improvements in employees' awareness of cybersecurity and their motivational behavior to protect themselves and their organizations from cyberattacks using the protection motivation theory. In addition, it contributes to the literature by examining additional variables and mediators besides the core constructs of the Protection Motivation Model (PMT). This article uses empirical data and structural equation modeling to test the antecedents and mediators of employees' cybersecurity motivational behavior. The study offers theoretical and pragmatic guidance for cybersecurity programs. First, the model developed in this study can partially explain how people may change their …


Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade Jan 2022

Climate Change And Cop26: Are Digital Technologies And Information Management Part Of The Problem Or The Solution? An Editorial Reflection And Call To Action, Yogesh K. Dwivedi, Laurie Hughes, Arpan Kumar Kar, Abdullah M. Baabdullah, Purva Grover, Roba Abbas, Daniela Andreini, Iyad Abumoghli, Yves Barlette, Deborah Bunker, Leona Chandra Kruse, Ioanna Constantiou, Robert M. Davison, Rahul De', Rameshwar Dubey, Henry Fenby-Taylor, Babita Gupta, Wu He, Mitsuru Kodama, Matti Mäntymäki, Bhimaraya Metri, Katina Michael, Johan Olaisen, Niki Panteli, Samuli Pekkola, Rohit Nishant, Ramakrishnan Raman, Nripendra P. Rana, Frantz Rowe, Suprateek Sarker, Brenda Scholtz, Maung Sein, Jeel Dharmeshkumar Shah, Thompson S.H. Teo, Manoj Kumar Tiwari, Morten Thanning Vendelø, Michael Wade

Information Technology & Decision Sciences Faculty Publications

The UN COP26 2021 conference on climate change offers the chance for world leaders to take action and make urgent and meaningful commitments to reducing emissions and limit global temperatures to 1.5 °C above pre-industrial levels by 2050. Whilst the political aspects and subsequent ramifications of these fundamental and critical decisions cannot be underestimated, there exists a technical perspective where digital and IS technology has a role to play in the monitoring of potential solutions, but also an integral element of climate change solutions. We explore these aspects in this editorial article, offering a comprehensive opinion based insight to a …


Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh Jan 2022

Why Do Family Members Reject Ai In Health Care? Competing Effects Of Emotions, Eun Hee Park, Karl Werder, Lan Cao, Balasubramaniam Ramesh

Information Technology & Decision Sciences Faculty Publications

Artificial intelligence (AI) enables continuous monitoring of patients’ health, thus improving the quality of their health care. However, prior studies suggest that individuals resist such innovative technology. In contrast to prior studies that investigate individuals’ decisions for themselves, we focus on family members’ rejection of AI monitoring, as family members play a significant role in health care decisions. Our research investigates competing effects of emotions toward the rejection of AI monitoring for health care. Based on two scenario-based experiments, our study reveals that emotions play a decisive role in family members’ decision making on behalf of their parents. We find …


The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu Jan 2022

The State Of The Art Of Information Integration In Space Applications, Zhuming Bi, K. L. Yung, Andrew W.H. Ip., Yuk Ming Tang, Chris W.J. Zhang, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

This paper aims to present a comprehensive survey on information integration (II) in space informatics. With an ever-increasing scale and dynamics of complex space systems, II has become essential in dealing with the complexity, changes, dynamics, and uncertainties of space systems. The applications of space II (SII) require addressing some distinctive functional requirements (FRs) of heterogeneity, networking, communication, security, latency, and resilience; while limited works are available to examine recent advances of SII thoroughly. This survey helps to gain the understanding of the state of the art of SII in sense that (1) technical drivers for SII are discussed and …


Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu Jan 2022

Bitcoin Selfish Mining Modeling And Dependability Analysis, Chencheng Zhou, Liudong Xing, Jun Guo, Qisi Liu

Electrical & Computer Engineering Faculty Publications

Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critical and security-critical nature of their uses, it is pivotal to model the dependability of blockchain-based systems. In this study, we focus on Bitcoin, a blockchain-based peer-to-peer cryptocurrency system. A continuous-time Markov chain-based analytical method is put forward to model and quantify the dependability of the Bitcoin system under selfish mining attacks. Numerical results are provided to examine the influences of several key parameters related to …