Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Engineering (2)
- Agent-based modeling (1)
- Algorithms (1)
- And security (1)
- Attitudes (1)
-
- Automation (1)
- Behavior (1)
- Blockchain (1)
- Classification (1)
- Compliance (1)
- Compliance research (1)
- Computer security (1)
- Computerized simulations (1)
- Cyber systems: Their science (1)
- Data collection (1)
- Data driven (1)
- Data sources (1)
- Decision making (1)
- Digital libraries (1)
- Economic agents (1)
- Electronic mail (1)
- Engineering-- Industrial engineering (1)
- Evaluation (1)
- Experimental design (1)
- Feature extraction (1)
- Game theory (1)
- Games (1)
- Graphical user interfaces (1)
- Human (1)
- Human factors (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Machine Learning In Requirements Elicitation: A Literature Review, Cheligeer Cheligeer, Jingwei Huang, Guosong Wu, Nadia Bhuiyan, Yuan Xu, Yong Zeng
Engineering Management & Systems Engineering Faculty Publications
A growing trend in requirements elicitation is the use of machine learning (ML) techniques to automate the cumbersome requirement handling process. This literature review summarizes and analyzes studies that incorporate ML and natural language processing (NLP) into demand elicitation. We answer the following research questions: (1) What requirement elicitation activities are supported by ML? (2) What data sources are used to build ML-based requirement solutions? (3) What technologies, algorithms, and tools are used to build ML-based requirement elicitation? (4) How to construct an ML-based requirements elicitation method? (5) What are the available tools to support ML-based requirements elicitation methodology? Keywords …
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Precursors Of Email Response To Cybersecurity Scenarios: Factor Exploration And Scale Development, Miguel A. Toro-Jarrin, Pilar Pazos-Lago, Miguel Padilla
Engineering Management & Systems Engineering Faculty Publications
In the last decade, information security research has further expanded to include human factors as key elements of the organization's cybersecurity infrastructure. Numerous factors from several theories have been explored to explain and predict the multitude of information security-related behaviors in organizations. Lately, there has been a call for the study of specific cybersecurity behaviors in contextualized scenarios that reflect specific and realistic situations of a potential cyber-attack. This paper focuses on precursors of email response in situations that can be the origin of cybersecurity incidents in organizations (i.e., phishing attacks, ransomware, etc.). This study explores participants' intentions to follow …
A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic
A Probabilistic Perspective Of Human-Machine Interaction, Mustafa Canan, Mustafa Demir, Samuel Kovacic
Engineering Management & Systems Engineering Faculty Publications
Human-machine interaction (HMI) has become an essential part of the daily routine in organizations. Although the machines are designed with state-of-the-art Artificial Intelligence applications, they are limited in their ability to mimic human behavior. The human-human interaction occurs between two or more humans; when a machine replaces a human, the interaction dynamics are not the same. The results indicate that a machine that interacts with a human can increase the mental uncertainty that a human experiences. Developments in decision sciences indicate that using quantum probability theory (QPT) improves the understanding of human decision-making than merely using classical probability theory (CPT). …
Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan
Humans And The Core Partition: An Agent-Based Modeling Experiment, Andrew J. Collins, Sheida Etemadidavan
Engineering Management & Systems Engineering Faculty Publications
Although strategic coalition formation is traditionally modeled using cooperative game theory, behavioral game theorists have repeatedly shown that outcomes predicted by game theory are different from those generated by actual human behavior. To further explore these differences, in a cooperative game theory context, we experiment to compare the outcomes resulting from human participants’ behavior to those generated by a cooperative game theory solution mechanism called the core partition. Our experiment uses an interactive simulation of a glove game, a particular type of cooperative game, to collect the participant’s decision choices and their resultant outcomes. Two different glove games are considered, …
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Engineering Management & Systems Engineering Faculty Publications
In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …