Error and optimism bias regularization (open access)

Error and optimism bias regularization

Article describes how in Machine Learning, prediction quality is usually measured using different techniques and evaluation methods. This paper will introduce a simple regularization term to manage the number of over-predicted/under-predicted instances in a regression model.
Date: January 28, 2023
Creator: Sohaee, Nassim
Object Type: Article
System: The UNT Digital Library
Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion (open access)

Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion

Article explores the importance of investigating the impact of trust on intention to purchase from both successful and unsuccessful purchase cases in order to provide a more balanced view of the critical role of trust in e-commerce transaction decisions.
Date: January 7, 2020
Creator: Kim, Dan J. & Ogbanufe, Obi
Object Type: Article
System: The UNT Digital Library
Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance (open access)

Introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance

This article is an introduction to the Minitrack on Artificial Intelligence and Big Data Analytics Management, Governance, and Compliance at the 53rd Hawaii International Conference on System Sciences.
Date: January 7, 2020
Creator: Sidorova, Anna; Saltz, Jeffrey & Goul, Michael
Object Type: Article
System: The UNT Digital Library
Continued Usage and Location Disclosure of Location-Based Applications: A Necessity for Location Intelligence (open access)

Continued Usage and Location Disclosure of Location-Based Applications: A Necessity for Location Intelligence

This article's research builds a continuance usage and location disclosure model from the expectation-confirmation perspective. The effect of benefit expectations on usefulness and satisfaction is hypothesized. In addition, the positive effect of usefulness on satisfaction and continuance intention is postulated. Findings contribute to the current literature in business intelligence by focusing on location disclosure behavior in the context of LBAs and the necessity of this type of information for location intelligence. This article was presented at the 52nd Hawaii International Conference on System Sciences.
Date: January 8, 2019
Creator: Peak, Daniel; Mousavizadeh, Mohammadreza & Koohikamali, Mehrdad
Object Type: Article
System: The UNT Digital Library
An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages (open access)

An Investigation of Predictors of Information Diffusion in Social Media: Evidence from Sentiment Mining of Twitter Messages

Article is a study examining how emotional arousal influences information diffusion in social media using a sentiment mining approach. The authors propose a research model and test it using data collected from Twitter.
Date: January 7, 2020
Creator: Kim, Dan J. & Salehan, Mohammad
Object Type: Article
System: The UNT Digital Library
AI Agency Risks and Their Mitigation Through Business Process Management: A Conceptual Framework (open access)

AI Agency Risks and Their Mitigation Through Business Process Management: A Conceptual Framework

This article builds on agency theory and identify factors that increase the risk of an agency problem between a principal (a human or an organization) and an AI agent and propose a framework for AI agency problem analysis. The framework is illustrated through AI use cases and industry examples. Implications for AI governance research and practice are discussed. It was presented at the 52nd Hawaii International Conference on System Sciences.
Date: January 8, 2019
Creator: Sidorova, Anna & Rafiee, Dana
Object Type: Article
System: The UNT Digital Library
Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies (open access)

Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies

This article uses the virtue (ethics) theory and cyber attribution to argue that there exists a dichotomy among offensive security engineers, one that appreciates organizational security practices, but at the same time violates ethics in how to retaliate against a malicious attacker.
Date: January 7, 2020
Creator: Parrish, James L.; Withers, Kim L.; Smith, James N. & Ellis, Timothy J.
Object Type: Article
System: The UNT Digital Library
Applying Game Theory for Improving and Optimizing the US Political Asylum Process (open access)

Applying Game Theory for Improving and Optimizing the US Political Asylum Process

Data management plan for the grant, "Applying Game Theory for Improving and Optimizing the US Political Asylum Process"
Date: 2024-01-01/2024-12-31
Creator: Fathi, Michel
Object Type: Text
System: The UNT Digital Library
Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem (open access)

Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem

Data management plan for the grant, "Exploiting machine learning for cybersecurity tasks to talent mapping and exploring credentialing ecosystem"
Date: 2024-01-01/2024-12-31
Creator: Pravin, Dipakkumar
Object Type: Text
System: The UNT Digital Library