item: #1 of 55 id: cord-000332-u3f89kvg author: Broeck, Wouter Van den title: The GLEaMviz computational tool, a publicly available software to explore realistic epidemic spreading scenarios at the global scale date: 2011-02-02 words: 7460 flesch: 38 summary: The 2009 H1N1 influenza pandemic highlighted the importance of computational epidemic models for the real-time analysis of the health emergency related to the global spreading of new emerging infectious diseases [1] [2] [3] . The GLEaMviz proxy middleware is the server component that mediates between clients and simulation engines. keywords: client; data; disease; epidemic; gleamviz; influenza; mobility; model; pandemic; population; results; server; simulation; tool; user cache: cord-000332-u3f89kvg.txt plain text: cord-000332-u3f89kvg.txt item: #2 of 55 id: cord-000925-91fhb66m author: Hashemian, Mohammad R. title: Advanced Querying Features for Disease Surveillance Systems date: 2010-04-09 words: 4300 flesch: 55 summary: During the query building process the AQT automatically validates the logic of query expression as it is created, and the user has the option to conduct a final validation prior to executing the query. The AQT facilitates saving public queries by providing an interface similar to saving private queries ( Figure 11 ). keywords: aqt; data; expression; list; queries; query; surveillance; users cache: cord-000925-91fhb66m.txt plain text: cord-000925-91fhb66m.txt item: #3 of 55 id: cord-020200-g5hy5ncm author: Grobler, Chris D. title: Towards a Strategic Model for Safeguarding the Preservation of Business Value During Human Interactions with Information Systems date: 2020-03-06 words: 2527 flesch: 31 summary: The impact of information systems on organizations and markets The relationship of 'systems thinking' to action research A theoretical integration of user satisfaction and technology acceptance Researching Information Systems and Computing The updated DeLone and McLean model of information systems success How IT creates business value: a process theory synthesis Revisiting IS business value research: what we already know, what we still need to know, and how we can get there Measuring IT performance and communicating value The effects of technological and organizational innovations on business value in the context of a new product or service deployment Review: information technology and organizational performance: an integrative model of IT business value The new productivity paradox Managing for value: it's not just about the numbers Task-technology fit and individual performance Lazy user theory: a dynamic model to understand user selection of products and services keywords: business; model; technology; user; value cache: cord-020200-g5hy5ncm.txt plain text: cord-020200-g5hy5ncm.txt item: #4 of 55 id: cord-020820-cbikq0v0 author: Papadakos, Panagiotis title: Dualism in Topical Relevance date: 2020-03-24 words: 2469 flesch: 52 summary: Specifically, we sketch a method in which antonyms are used for producing dual queries, which can in turn be exploited for defining a multi-dimensional topical relevance based on the antonyms. We sketch a method in which antonyms are used for producing dual queries, which in turn can be exploited for defining a multi-dimensional topical relevance. keywords: antonyms; dual; query; results; users cache: cord-020820-cbikq0v0.txt plain text: cord-020820-cbikq0v0.txt item: #5 of 55 id: cord-020891-lt3m8h41 author: Witschel, Hans Friedrich title: KvGR: A Graph-Based Interface for Explorative Sequential Question Answering on Heterogeneous Information Sources date: 2020-03-17 words: 4927 flesch: 47 summary: Visualising graph query results is different from visualising graphs in general; the former resembles generation of results snippets in text retrieval [16] . This refinement in turn is based on the selection of subsets of nodes for context definition and natural language questions towards this context. keywords: context; graph; information; interaction; knowledge; participants; question; users cache: cord-020891-lt3m8h41.txt plain text: cord-020891-lt3m8h41.txt item: #6 of 55 id: cord-020901-aew8xr6n author: García-Durán, Alberto title: TransRev: Modeling Reviews as Translations from Users to Items date: 2020-03-17 words: 5042 flesch: 52 summary: In addition, the availability of product reviews allows users to make more informed purchasing choices and companies to analyze costumer sentiment towards their products. In recent years the availability of large corpora of product reviews has driven text-based research in the recommender system community (e.g. [3, 19, 21] ). keywords: data; embedding; item; learning; methods; product; review; transrev; user cache: cord-020901-aew8xr6n.txt plain text: cord-020901-aew8xr6n.txt item: #7 of 55 id: cord-020936-k1upc1xu author: Sanz-Cruzado, Javier title: Axiomatic Analysis of Contact Recommendation Methods in Social Networks: An IR Perspective date: 2020-03-17 words: 5657 flesch: 50 summary: However, the exact properties that make such adapted contact recommendation models effective at the task are as yet unknown. These ties have been materialized in the design and development of recommendation approaches based on IR models [2, 10, 39] . keywords: axioms; candidate; contact; models; recommendation; users cache: cord-020936-k1upc1xu.txt plain text: cord-020936-k1upc1xu.txt item: #8 of 55 id: cord-024430-r0gbw5j6 author: Wang, Hao title: Modeling Users’ Multifaceted Interest Correlation for Social Recommendation date: 2020-04-17 words: 3624 flesch: 45 summary: According to the nature of the existing social recommendation techniques, we classify them into two main categories: memory-based methods [1, 12, 14] which normally directly or indirectly recommend users items that their friends like, and model-based methods [4, 5, [9] [10] [11] 22, 27, 29, 31] use users' social relations to constrain that friends share similar embeddings. uv = 1(0) indicates whether there exists social relation between user u and user v. keywords: correlation; items; recommendation; social; users cache: cord-024430-r0gbw5j6.txt plain text: cord-024430-r0gbw5j6.txt item: #9 of 55 id: cord-024433-b4vw5r0o author: Morales, Alex title: CrowdQM: Learning Aspect-Level User Reliability and Comment Trustworthiness in Discussion Forums date: 2020-04-17 words: 4535 flesch: 50 summary: In the right-hand, we learn trustworthy comment embedding, a * m , such that it is similar to user comments, am,n which are, in turn, similar to the post context vc. The left-hand side details the user-post reliability score estimation, Rm,n, that is a function of similarity function s(.) between the user and post aspect distributions and user aspect reliabilities, rn. keywords: aspect; comment; community; embeddings; model; post; reliability; user cache: cord-024433-b4vw5r0o.txt plain text: cord-024433-b4vw5r0o.txt item: #10 of 55 id: cord-026948-jl3lj7yh author: Amini, Hessam title: Towards Explainability in Using Deep Learning for the Detection of Anorexia in Social Media date: 2020-05-26 words: 3282 flesch: 49 summary: The paper is organized as follows: Sect. 2 explains the two levels where the attention mechanism can be used (i.e. intra-document and inter-document), and describes the related work in validating explainability using attention mechanism. In text classification applications, such as the detection of mental health issues, attention mechanisms can be applied both at the intra and the inter-document levels [20] . keywords: attention; level; mechanism; posts; user cache: cord-026948-jl3lj7yh.txt plain text: cord-026948-jl3lj7yh.txt item: #11 of 55 id: cord-027078-i3a5jwck author: Jiang, Bo title: Social Recommendation in Heterogeneous Evolving Relation Network date: 2020-05-26 words: 3986 flesch: 47 summary: For two datasets, the user-user relations are constructed from following or bi-directional friendships between social network users, user-item relations are constructed from the user posting or listening behavior. Social users is suffering from information overload. keywords: model; network; order; recommendation; relation; time; user cache: cord-027078-i3a5jwck.txt plain text: cord-027078-i3a5jwck.txt item: #12 of 55 id: cord-027120-w6agcu63 author: Lago, André Sousa title: Conversational Interface for Managing Non-trivial Internet-of-Things Systems date: 2020-05-25 words: 5087 flesch: 50 summary: However, as the number of devices increases, along with the number of household members, the complexity of managing such systems becomes a problem, including finding out why something has happened. Visual programming solutions are usually deployed as centralized orchestrators, with access to the devices and components that comprise such systems. keywords: devices; iot; jarvis; light; queries; rules; system; turn; user cache: cord-027120-w6agcu63.txt plain text: cord-027120-w6agcu63.txt item: #13 of 55 id: cord-027346-ldfgi0vr author: Wen, Jie title: GCN-IA: User Profile Based on Graph Convolutional Network with Implicit Association Labels date: 2020-05-22 words: 3135 flesch: 46 summary: In this paper, a graph convolutional network with implicit associations (GCN-IA) method is proposed to obtain user profile. User profile, the actual representation to capture certain characteristics about an individual user [25] , is the basis of recommendation system [7] and exact-marketing [2, 3] . keywords: gcn; information; label; method; profile; propagation; user cache: cord-027346-ldfgi0vr.txt plain text: cord-027346-ldfgi0vr.txt item: #14 of 55 id: cord-027431-6twmcitu author: Mukhina, Ksenia title: Spatiotemporal Filtering Pipeline for Efficient Social Networks Data Processing Algorithms date: 2020-05-25 words: 5461 flesch: 59 summary: If we look into any popular LBSN, like Instagram or Twitter, location data contains a lot of errors [5] . After that, we calculate the difference between titles in social media data and data from OSM with the help of Damerau-Levenshtein distance. keywords: area; city; data; location; number; places; posts; tags; twitter; users cache: cord-027431-6twmcitu.txt plain text: cord-027431-6twmcitu.txt item: #15 of 55 id: cord-031614-l5seadro author: Heumader, Peter title: Adaptive User Interfaces for People with Cognitive Disabilities within the Easy Reading Framework date: 2020-08-12 words: 2245 flesch: 45 summary: System Adaptivity and the Modelling of Stereotypes Evaluating the utility and usability of an adaptive hypermedia system Benefits and costs of adaptive user interfaces From adaptive hypermedia to the adaptive web A design patterns approach to adaptive user interfaces for users with special needs A knowledge-based approach to user interface adaptation from preferences and for special needs MyUI: generating accessible user interfaces from multimodal design patterns WCAG2.1 -Web Content Accessibility Guidelines Cloud4all Priority applications and User Profile Ontology (D101.1). key: cord-031614-l5seadro authors: Heumader, Peter; Miesenberger, Klaus; Murillo-Morales, Tomas title: Adaptive User Interfaces for People with Cognitive Disabilities within the Easy Reading Framework date: 2020-08-12 journal: Computers Helping People with Special Needs DOI: 10.1007/978-3-030-58805-2_7 sha: doc_id: 31614 cord_uid: l5seadro Adaptive user interfaces are user interfaces that dynamically adapt to the users’ preferences and abilities. keywords: adaptive; framework; help; interfaces; user cache: cord-031614-l5seadro.txt plain text: cord-031614-l5seadro.txt item: #16 of 55 id: cord-031616-dckqb6er author: Murillo-Morales, Tomas title: Automatic Assistance to Cognitive Disabled Web Users via Reinforcement Learning on the Browser date: 2020-08-12 words: 4321 flesch: 52 summary: In order to detect whether the user is confused or mentally overwhelmed by the content he or she is visiting during an ordinary Web browsing activity, user data needs to be collected in a transparent, unobtrusive manner to the user. This state is an aggregation of user data representing the user's reaction to a t . keywords: action; data; learning; reading; reasoner; state; time; user; web cache: cord-031616-dckqb6er.txt plain text: cord-031616-dckqb6er.txt item: #17 of 55 id: cord-031617-l9iacaec author: Iwamura, Masakazu title: Suitable Camera and Rotation Navigation for People with Visual Impairment on Looking for Something Using Object Detection Technique date: 2020-08-10 words: 3939 flesch: 72 summary: Then, in looking for something as a representative task in a category, we argue suitable camera systems and rotation navigation methods. The second issue is about rotation navigation methods. keywords: camera; navigation; object; target; user cache: cord-031617-l9iacaec.txt plain text: cord-031617-l9iacaec.txt item: #18 of 55 id: cord-032466-1nfp1hcs author: Gong, Liang title: Interaction design for multi-user virtual reality systems: An automotive case study date: 2020-09-22 words: 3934 flesch: 46 summary: The usability related issues of VR systems is one of the most important to be addressed, as it would affect end users acceptance, which would ultimately affect the process of VR integration in manufacturing. Different from the window, icon, menu, and pointing device (WIMP) or Direct Manipulation interaction style, VR systems use handheld controllers, haptic devices or even voice and gesture recognition for users to interact with the systems. keywords: design; interaction; manufacturing; study; system; user; vr system cache: cord-032466-1nfp1hcs.txt plain text: cord-032466-1nfp1hcs.txt item: #19 of 55 id: cord-033725-rlzbznav author: Unnikrishnan, Vishnu title: Predicting the Health Condition of mHealth App Users with Large Differences in the Number of Recorded Observations - Where to Learn from? date: 2020-09-19 words: 5512 flesch: 57 summary: A major challenge of mobile health platforms that collect user inputs is that the amount of data users contribute can vary substantially. However, it is still possible that a model learned on those data points from long users bring a modest predictability to the disease development of users in U short . keywords: data; errors; model; observations; predictions; short; time; users cache: cord-033725-rlzbznav.txt plain text: cord-033725-rlzbznav.txt item: #20 of 55 id: cord-035285-dx5bbeqm author: Simmhan, Yogesh title: GoCoronaGo: Privacy Respecting Contact Tracing for COVID-19 Management date: 2020-11-11 words: 13696 flesch: 56 summary: A review of contact tracing apps can be found in 11, 15, 19, 41 , and their features are contrasted in Table 1 . However, the global adoption of contact tracing apps is low. keywords: analytics; app; apps; backend; bluetooth; contact; covid-19; data; device; digital; gcg; gcg app; location; network; number; proximity; rssi; service; time; users cache: cord-035285-dx5bbeqm.txt plain text: cord-035285-dx5bbeqm.txt item: #21 of 55 id: cord-102542-1mglhh41 author: Jovanovi'c, Mladjan title: Chatbots as conversational healthcare services date: 2020-11-08 words: 4473 flesch: 38 summary: The growing number of healthcare chatbots, partly due to the democratization of chatbot development, motivates a closer look at how the systems address aspects concerning user experience, adoption and trust in automation, and healthcare provision. While a recent literature review provides insights on general design considerations for healthcare chatbots [4] , we focus on publicly available chatbots and take a more domain-specific approach in identifying relevant design dimensions considering the specific role in healthcare provision. keywords: archetypes; chatbots; conversation; dialog; healthcare; information; provision; service; users cache: cord-102542-1mglhh41.txt plain text: cord-102542-1mglhh41.txt item: #22 of 55 id: cord-102738-e5zojanb author: Lieberoth, Andreas title: Getting Humans to do Quantum Optimization - User Acquisition, Engagement and Early Results from the Citizen Cyberscience Game Quantum Moves date: 2015-06-26 words: 11192 flesch: 48 summary: This is the premise of human-computer hybrid optimization: Helping AIs learn through real people's blooming buzzing mess of solutions, when problems can be represented as engaging game levels. In the end, we accept that the high level of cognitive complexity in Quantum Moves compared to citizen science games that rely on players as simple pattern-hunters or mules carrying data gathering devices into the real world , means that we will lose players at a higher rate due to the difficulty, but we believe that it is a viable strategy to work towards a game that is fun and learnable for everyone: On one hand to capitalize on each player's lifetime network value, and on the other in the hope of helping players hone the three skills central to succeed at the scientific levels, moving them beyond the user contribution threshold. keywords: atom; citizen; computer; data; design; game; gameplay; human; levels; motivation; moves; physics; players; quantum; quantum moves; science; score; time; tutorial; user cache: cord-102738-e5zojanb.txt plain text: cord-102738-e5zojanb.txt item: #23 of 55 id: cord-120017-vsoc9v85 author: Jiang, Helen title: Usable Security for ML Systems in Mental Health: A Framework date: 2020-08-18 words: 7360 flesch: 34 summary: When we speak of practitioners in the section above, in the specific context of ML systems for mental health, there are broadly two categories that we target: (1) Security practitioners: in general system security contexts, security mechanisms and policies are researched, designed, implemented, tested, maintained, and improved by security professionals. Justice Systems Development Life Cycle Guidance Document Usable Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity HCI and security systems keywords: behaviors; cases; computer; example; framework; health; ml systems; models; security; systems; trust; usability; users cache: cord-120017-vsoc9v85.txt plain text: cord-120017-vsoc9v85.txt item: #24 of 55 id: cord-120498-b1bla3fp author: McFate, Clifton title: SKATE: A Natural Language Interface for Encoding Structured Knowledge date: 2020-10-20 words: 3795 flesch: 49 summary: Interactive natural language applications typically require mapping spoken or written language to a semi-formal structure, often represented using semantic frames with fillable slots. The result is text annotated with semantic frames. keywords: frame; knowledge; language; model; rules; semantic; skate; text; user cache: cord-120498-b1bla3fp.txt plain text: cord-120498-b1bla3fp.txt item: #25 of 55 id: cord-121200-2qys8j4u author: Zogan, Hamad title: Depression Detection with Multi-Modalities Using a Hybrid Deep Learning Model on Social Media date: 2020-07-03 words: 10040 flesch: 46 summary: This motivates us to leverage the superior neural network learning capability with the rich and heterogeneous behavioural patterns of social media users. (3) We built a CNN network to classify user timeline posts concatenated with BiGRU network to identify social media users who suffer from depression. keywords: authors; data; depression; detection; features; information; learning; media; model; multi; tweets; user; word cache: cord-121200-2qys8j4u.txt plain text: cord-121200-2qys8j4u.txt item: #26 of 55 id: cord-122159-sp6o6h31 author: Raskar, Ramesh title: COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers date: 2020-06-04 words: 6032 flesch: 50 summary: Implementation and mapping of fair information practices COVID-19 dashboard Recommendation regarding the use of cloth face coverings Singapore says it will make its contact tracing tech freely available to developers 31% can't pay the rent: 'It's only going to get worse Fair information practice principles Clever cryptography could protect privacy in COVID-19 contact tracing apps COVID-19 contact tracing privacy principles Centre for the Mathematical Modelling of Infectious Diseases COVID-19 Working Group 2019 coronavirus: The Korean clusters. Turning app data over to law enforcement or other non-health actors, such as commercial entities seeking to target ads to potential customers, threatens users' rights and privacy. keywords: app; apps; contact; covid-19; data; health; location; person; privacy; users cache: cord-122159-sp6o6h31.txt plain text: cord-122159-sp6o6h31.txt item: #27 of 55 id: cord-124191-38i44n0m author: Okoshi, Tadashi title: NationalMood: Large-scale Estimation of People's Mood from Web Search Query and Mobile Sensor Data date: 2020-11-02 words: 6525 flesch: 60 summary: Here, there can be two different types of mood score, namely (a) the scores answered by the data collection participants with questionnaire and (b) the scores estimated by SMM based on the collected sensor data. Therefore, mood scores based on the users' raw survey response data have the challenge in their limited number of responses available for training. keywords: data; japan; model; mood; mood score; number; score; search; sensor; users; web cache: cord-124191-38i44n0m.txt plain text: cord-124191-38i44n0m.txt item: #28 of 55 id: cord-128041-vmmme94y author: Shen, Meng title: Bluetooth-based COVID-19 Proximity Tracing Proposals: An Overview date: 2020-08-28 words: 5814 flesch: 51 summary: Due to the inevitable need to collect certain user information, how to protect their security and privacy has become the focus of researchers. Then the server simply passes the keys of these positive users to other users, who regenerate anonymous IDs and analyze whether they are at risk of infection. keywords: anonymous; data; design; ids; information; privacy; proposals; proximity; users cache: cord-128041-vmmme94y.txt plain text: cord-128041-vmmme94y.txt item: #29 of 55 id: cord-130143-cqkpi32z author: Tajan, Louis title: Approach for GDPR Compliant Detection of COVID-19 Infection Chains date: 2020-07-16 words: 6059 flesch: 59 summary: Its objective here, is to identify all the possible paths which relies user A to user B and considers the case where infection of user B is a consequence of user A's infection. We show the content of connection logfiles from the three base stations and the proximity tree from user A to user B that has been generated by computing prox tree (A, A, B, 0) . keywords: agency; bloom; chain; data; infection; proximity; tree; users cache: cord-130143-cqkpi32z.txt plain text: cord-130143-cqkpi32z.txt item: #30 of 55 id: cord-139715-jyfmnnf5 author: Holzapfel, Kilian title: Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness date: 2020-06-29 words: 12270 flesch: 57 summary: Attackers can use received contact TCNs and rebroadcast them as their own. Using the latter method, the server gets no information whatsover about non-infected app users (except maybe their IP-address), however the user could identify infected people using an attack as described in Section 4.1. keywords: app; approach; contact; data; dcts; gdpr; information; order; person; privacy; sec; section; server; tcns; time; tracing; user cache: cord-139715-jyfmnnf5.txt plain text: cord-139715-jyfmnnf5.txt item: #31 of 55 id: cord-156676-wes5my9e author: Masud, Sarah title: Hate is the New Infodemic: A Topic-aware Modeling of Hate Speech Diffusion on Twitter date: 2020-10-09 words: 8730 flesch: 53 summary: However, they do not tackle the problem of modeling the diffusion and restrict themselves to identifying different characteristics of hate speech in Gab. Hate speech on Twitter: Twitter, as one of the largest micro-blogging platforms with a worldwide user base, has a long history of accommodating hate speech, cyberbullying, and toxic behavior. In this work, we choose to focus on the dynamics of hate speech on Twitter mainly due to two reasons: (i) the wide-spread usage of Twitter compared to other platforms provides scope to grasp the hate diffusion dynamics in a more realistic manifestation, and (ii) understanding how hate speech emerges and spreads even in the presence of some top-down checking measures, compared to unmoderated platforms like Gab. Diffusion patterns of hate vs. non-hate on Twitter: Hate speech is often characterized by the formation of echochambers, i.e., only a small group of people engaging with such contents repeatedly. keywords: diffusion; features; hate; hate speech; information; models; prediction; retina; retweet; speech; tweets; twitter; user cache: cord-156676-wes5my9e.txt plain text: cord-156676-wes5my9e.txt item: #32 of 55 id: cord-186031-b1f9wtfn author: Caldarelli, Guido title: Analysis of online misinformation during the peak of the COVID-19 pandemics in Italy date: 2020-10-05 words: 12581 flesch: 49 summary: It is interesting to see the relative importance of hashtags intended to encourage the population during the lockdown: it is the case of #celafaremo (we will make it), #iorestoacasa (I am staying home), #fermiamoloinsieme (Let's stop it together ): #iorestoacasa is present in every community, but it ranks 13th in the M5S verified user community, 29th in the FI-L-FdI community, 2nd in the Italia Viva community and 10th in the PD one. As a final task, over the whole set of tweets produced or shared by the users in the directed validated network, we counted the number of times a message containing a url was shared by users belonging to different political communities, although without considering the semantics of the tweets. keywords: accounts; bipartite; blue; case; center; communities; community; covid-19; domains; information; italian; network; news; non; number; right; table; tweets; twitter; users; wing cache: cord-186031-b1f9wtfn.txt plain text: cord-186031-b1f9wtfn.txt item: #33 of 55 id: cord-186764-qp4kq139 author: Klopfenstein, Lorenz Cuno title: Digital Ariadne: Citizen Empowerment for Epidemic Control date: 2020-04-16 words: 3111 flesch: 41 summary: The system must be designed to keep user data private at all times, ideally storing them exclusively on the user's device, and to make identification impossible a posteriori. User movements, known locations, and notes are shown on an interactive map like in Figure 2 . keywords: app; contact; containment; data; end; mobile; system; user cache: cord-186764-qp4kq139.txt plain text: cord-186764-qp4kq139.txt item: #34 of 55 id: cord-193856-6vs16mq3 author: Zhou, Tongxin title: Spoiled for Choice? Personalized Recommendation for Healthcare Decisions: A Multi-Armed Bandit Approach date: 2020-09-13 words: 12297 flesch: 36 summary: First, we design and implement two deeplearning models to extract user embeddings and item embeddings, which enables us to capture information that is critical to a healthcare decision-making context, such as users' health histories and health-behavior sequences (Johnson et al. 2002; Step 2 (Optimization): Solve the following optimization problem: Observe a new batch of data ( , ( , )), [ ], Update the posterior mean by: Update the posterior variance by: Recommendation size constraint Binary decision To improve the characterization of individuals' health-management contexts and enhance recommendation personalization, we design a deep-learning model to construct user embeddings. keywords: challenge; data; diversity; embeddings; framework; health; healthcare; individuals; learning; loss; mab; management; model; recommendation; users; weight cache: cord-193856-6vs16mq3.txt plain text: cord-193856-6vs16mq3.txt item: #35 of 55 id: cord-201675-3bvshhtn author: Ng, Pai Chet title: COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing date: 2020-05-28 words: 8260 flesch: 56 summary: We believe that the dataset will serve as an invaluable resource for researchers in this field, accelerating the development of contact tracing applications. LDA Next generation technology for epidemic prevention and control: Data-driven contact tracking Contact tracing and disease control Five things we need to do to make contact tracing really work Quantifying sars-cov-2 transmission suggests epidemic control with digital contact tracing Smartphones and ble services: Empirical insights Ble beacons for internet of things applications: Survey, challenges, and opportunities Improved distance estimation with ble beacon using kalman filter and svm Rss localization using unknown statistical path loss exponent model Body shadowing and furniture effects for accuracy improvement of indoor wave propagation models China launches coronavirus 'close contact detector' app Coronavirus mobile apps are surging in popularity in south korea Privacy guidelines for contact tracing applications Tracesecure: keywords: advertising; ble; contact; data; distance; packet; proximity; risk; rss; signature; smartphone; user cache: cord-201675-3bvshhtn.txt plain text: cord-201675-3bvshhtn.txt item: #36 of 55 id: cord-218383-t2lwqrpb author: Whaiduzzaman, Md title: A Privacy-preserving Mobile and Fog Computing Framework to Trace and Prevent COVID-19 Community Transmission date: 2020-06-23 words: 7004 flesch: 55 summary: We use personal mobile devices with contact tracing app and two types of stationary fog nodes, named Automatic Risk Checkers (ARC) and Suspected User Data Uploader Node (SUDUN), to trace community transmission alongside maintaining user data privacy. However, most of these applications and frameworks have failed to ensure user data privacy and suffer from other issues, such as mandatory use of apps, excessive data gathering, questionable transparency of source codes and data flow, unnecessary data usage or processing, and lack of user control in data deletion. keywords: application; cases; cloud; contact; data; device; fog; framework; mobile; privacy; ruerc; sudun; user cache: cord-218383-t2lwqrpb.txt plain text: cord-218383-t2lwqrpb.txt item: #37 of 55 id: cord-223669-hs5pfg4b author: Song, Jinyue title: Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System date: 2020-07-20 words: 8288 flesch: 53 summary: We propose a mathematical formula for the possibility of user infection, which quantifies the user's contact history and traveling history from multiple dimensions and thus provides a basis for the system's notification service. (a) Data Security: Our design guarantees that user data will not be manipulated. keywords: blockchain; bluetooth; contract; data; health; infection; location; service; status; system; tracing; user cache: cord-223669-hs5pfg4b.txt plain text: cord-223669-hs5pfg4b.txt item: #38 of 55 id: cord-227156-uy4dykhg author: Albanese, Federico title: Predicting Shifting Individuals Using Text Mining and Graph Machine Learning on Twitter date: 2020-08-24 words: 4943 flesch: 45 summary: This is also consistent with the fact that the model trained with network features gets a better AU C than the model trained with the texts of user tweets in all datasets. Some other works are focused in political analysis and the interaction between users, as for instance the one of Aruguete et al., which described how Twitter users frame political events by sharing content exclusively with likeminded users forming two well-defined communities [12] . keywords: communities; individuals; learning; machine; network; time; topics; tweets; twitter; users cache: cord-227156-uy4dykhg.txt plain text: cord-227156-uy4dykhg.txt item: #39 of 55 id: cord-227492-st2ebdah author: Raskar, Ramesh title: Apps Gone Rogue: Maintaining Personal Privacy in an Epidemic date: 2020-03-19 words: 4586 flesch: 41 summary: All containment strategies require analysis of diagnosed carrier location trails in order to identify other individuals at risk for infection. Thus, user location privacy is compromised. keywords: carrier; contact; data; disease; individuals; location; privacy; risk; users cache: cord-227492-st2ebdah.txt plain text: cord-227492-st2ebdah.txt item: #40 of 55 id: cord-236830-0y5yisfk author: Chan, Justin title: PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing date: 2020-04-07 words: 10787 flesch: 56 summary: If a user is both infected (we refer to such users as positive, and otherwise as negative) and willing to warn others who may have been at risk via proximity to the user, then de-identified information is uploaded to a server to warn other users of potential exposure. Note that the public lists can be either lists from hospitals, which have confirmed seeds from positive users, or they can be self-reports (see Section 2.3). keywords: approach; broadcast; contact; health; ids; information; privacy; protocol; public; risk; server; time; tracing; user cache: cord-236830-0y5yisfk.txt plain text: cord-236830-0y5yisfk.txt item: #41 of 55 id: cord-237721-rhcvsqtk author: Welch, Charles title: Expressive Interviewing: A Conversational System for Coping with COVID-19 date: 2020-07-07 words: 5046 flesch: 46 summary: We present relevant aspects of the system's design and implementation as well as quantitative and qualitative analyses of user interactions with the system. Then, based on users responses, the system provides feedback and asks additional questions whenever appropriate. keywords: expressive; health; interaction; interviewing; reflections; stress; system; users; writing cache: cord-237721-rhcvsqtk.txt plain text: cord-237721-rhcvsqtk.txt item: #42 of 55 id: cord-238444-v9gfh3m1 author: Maghdid, Halgurd S. title: A Smartphone enabled Approach to Manage COVID-19 Lockdown and Economic Crisis date: 2020-04-25 words: 3836 flesch: 56 summary: The more people register in the system, the better performance of the system in terms of both speed and coverage of contact tracing. However, manual contact tracing is time consuming and labor-intensive task which tremendously overload public health systems. keywords: area; cases; contact; covid-19; lockdown; people; system; users cache: cord-238444-v9gfh3m1.txt plain text: cord-238444-v9gfh3m1.txt item: #43 of 55 id: cord-243596-ryyokrdx author: Baron, Lauren title: When Virtual Therapy and Art Meet: A Case Study of Creative Drawing Game in Virtual Environments date: 2020-10-16 words: 4986 flesch: 50 summary: There are many numerous hardware and layout configurations for VR, and there is still a lot of progress to be made towards best practices of user comfort, and movement assessment of users in seated VR, particularly in virtual therapy. Investigating the best practices for VR therapy is in high demand. keywords: drawing; game; home; level; participants; standing; task; therapy; user cache: cord-243596-ryyokrdx.txt plain text: cord-243596-ryyokrdx.txt item: #44 of 55 id: cord-251676-m8f6de33 author: Trivedi, Amee title: WiFiTrace: Network-based Contact Tracing for Infectious Diseases Using Passive WiFi Sensing date: 2020-05-25 words: 9643 flesch: 56 summary: Our final tier ingests the data produced by the vendor-specific pre-processor and creates a graph structure that captures the trajectories of user devices. We note that such a client-centric approach requires a user to first download a mobile app before contact tracing data can be gathered-users who have not downloaded the app (or have opted in) are not visible to other phones that are actively listening for other devices in their proximity. keywords: approach; contact; data; device; graph; location; network; number; proximity; sensing; tool; users; wifi cache: cord-251676-m8f6de33.txt plain text: cord-251676-m8f6de33.txt item: #45 of 55 id: cord-267860-mc0xa5om author: Lam, Simon C. title: Evaluation of the user seal check on gross leakage detection of 3 different designs of N95 filtering facepiece respirators date: 2016-05-01 words: 4714 flesch: 43 summary: The results did not support user seal checks in detecting any actual gross leakage in the donning of N95 respirators. Among the participants, 25.7% (n = 164), 20.4% (n = 130), and 24.5% (n = 156) reported positive user seal checks regarding the 3M-A, 3M-B, and KC-C respirators, respectively. keywords: check; fit; leakage; respirator; seal; seal check; user; user seal cache: cord-267860-mc0xa5om.txt plain text: cord-267860-mc0xa5om.txt item: #46 of 55 id: cord-269850-5pidolqb author: Maghdid, Halgurd S. title: A Smartphone Enabled Approach to Manage COVID-19 Lockdown and Economic Crisis date: 2020-08-14 words: 5046 flesch: 54 summary: The approach is trying to preserve the privacy issue of the users (including public health users and infected users), since the system is exchanging data in a blind signature mechanism [16, 17] . For example, if the number of recorded of tracked users is wider and if the prediction model is intended to use for a bigger city includes New Work city in United State or London in United Kingdom; also, using deep learning algorithms rather than of using only K-Means algorithm. keywords: approach; area; contact; covid-19; lockdown; people; system; tracing; users cache: cord-269850-5pidolqb.txt plain text: cord-269850-5pidolqb.txt item: #47 of 55 id: cord-292065-3p4bf9ik author: Lai, Lucinda title: Usage Patterns of a Web-Based Palliative Care Content Platform (PalliCOVID) during the COVID-19 Pandemic date: 2020-07-27 words: 3232 flesch: 40 summary: 10 Evaluating Usage We evaluated usage data using Google Analytics (Google, LLC, Mountain View, CA), which was installed on PalliCOVID and used to track user data from April 7, 2020 through May 1, 2020). User access data was collected and summarized by Google Analytics software that had been integrated into the PalliCOVID web application. keywords: application; care; content; covid-19; data; palliative; pallicovid; users cache: cord-292065-3p4bf9ik.txt plain text: cord-292065-3p4bf9ik.txt item: #48 of 55 id: cord-302724-hu0raqyi author: Finazzi, Francesco title: The impact of the Covid‐19 pandemic on Italian mobility date: 2020-05-27 words: 1111 flesch: 54 summary: In order to provide real-time detection and alerts, the app collects phone location FIGURE 1 Mobility in Italy estimated through smartphone data collected by the Earthquake Network project. key: cord-302724-hu0raqyi authors: Finazzi, Francesco; Fassò, Alessandro title: The impact of the Covid‐19 pandemic on Italian mobility date: 2020-05-27 journal: Signif (Oxf) DOI: 10.1111/1740-9713.01400 sha: doc_id: 302724 cord_uid: hu0raqyi Francesco Finazzi and Alessandro Fassò use location data collected by an earthquake‐monitoring app to gauge compliance with lockdown measures in Italy keywords: app; data; growth; users cache: cord-302724-hu0raqyi.txt plain text: cord-302724-hu0raqyi.txt item: #49 of 55 id: cord-310272-utqyuy0n author: Zamani, Efpraxia D. title: Appropriating Information Technology Artefacts through Trial and Error: The Case of the Tablet date: 2020-09-18 words: 13983 flesch: 42 summary: In setting their goals, tablet users may be influenced by reviews, advertisements, others' experiences as well as their own past experience with similar or dissimilar devices. Trial and error is primarily based on exploitation; as our findings show, tablet users seek to implement tentative solutions based on what they know and their experiences. keywords: appropriation; data; device; disconfirmation; e.g.; error; et al; information; ipad; solution; tablet; technology; theory; trial; use; users; work cache: cord-310272-utqyuy0n.txt plain text: cord-310272-utqyuy0n.txt item: #50 of 55 id: cord-318195-38gu0yab author: Logeswaran, Abison title: The Electronic Health Record in Ophthalmology: Usability Evaluation Tools for Health Care Professionals date: 2020-10-26 words: 3441 flesch: 46 summary: Following on from the identification of end user usability issues, a low-fidelity prototype of an EHR can be created with a technique known as wireframing. UCD processes and usability testing methodology reports provided by vendors can be complex, making it difficult for HCPs who are not trained in usability science to understand the information. Fully developed and implemented EHRs should ideally be continuously and independently evaluated by end users, much like post market surveillance of a pharmaceutical drug or medical device. keywords: ehr; ehrs; end; health; information; testing; usability; user cache: cord-318195-38gu0yab.txt plain text: cord-318195-38gu0yab.txt item: #51 of 55 id: cord-323372-770sos8m author: Glenn, Jeffrey title: Considering the Potential Health Impacts of Electric Scooters: An Analysis of User Reported Behaviors in Provo, Utah date: 2020-08-31 words: 7626 flesch: 55 summary: While injury data from Provo has not yet been reported, previous studies in other cities found that the majority of e-scooter injuries were among male millennials, the same demographic group who make up the majority of e-scooter users in Provo The aim of this study is to explore the health-related behaviors of e-scooter users and to discuss their implications for public health. keywords: city; health; injuries; provo; ride; riding; scooter; sidewalk; study; users cache: cord-323372-770sos8m.txt plain text: cord-323372-770sos8m.txt item: #52 of 55 id: cord-347144-rj76i40v author: Wang, Jiexiang title: Closed or open platform? The nature of platform and a qualitative comparative analysis of the performance effect of platform openness date: 2020-09-23 words: 6819 flesch: 43 summary: Despite the strategically crucial role that openness decision plays for Internet platform enterprises, the results of existing research on the relationship between platform openness and platform performance are not conclusive. Through decomposing platform openness into supply-side openness and demand-side openness, as well as introducing demand diversity and knowledge complexity as contextual variables, this study attempts to understand the impact of both types of attributes on performance by considering their configuration. keywords: demand; innovation; knowledge; openness; performance; platform; platform openness; platform performance; research; study; supply; users cache: cord-347144-rj76i40v.txt plain text: cord-347144-rj76i40v.txt item: #53 of 55 id: cord-350000-eqn3kl5p author: Drissi, Nidal title: An Analysis on Self-Management and Treatment-related Functionality and Characteristics of Highly Rated Anxiety Apps date: 2020-07-30 words: 6911 flesch: 51 summary: Anxiety apps incorporate various mental health care management methods and approaches. Google Play repository and the App Store were used as sources to select anxiety apps. keywords: anxiety; anxiety apps; apps; care; covid-19; depression; disorders; features; functionality; health; management; stress; study; user cache: cord-350000-eqn3kl5p.txt plain text: cord-350000-eqn3kl5p.txt item: #54 of 55 id: cord-355513-vgs96w3b author: Ma, Rongyang title: Effects of Health Information Dissemination on User Follows and Likes during COVID-19 Outbreak in China: Data and Content Analysis date: 2020-07-14 words: 6053 flesch: 46 summary: Thus, we selected 21 January 2020, and 27 January 2020, as two time nodes to collect and classify account information, including the name, rank, operator, and number of followers. Articles were posted on many official WeChat accounts to transmit health information about this pandemic. keywords: accounts; articles; behavior; health; information; likes; number; public; types; users cache: cord-355513-vgs96w3b.txt plain text: cord-355513-vgs96w3b.txt item: #55 of 55 id: cord-355789-x449xflm author: Frauenstein, Edwin Donald title: Susceptibility to phishing on social network sites: A personality information processing model date: 2020-05-01 words: 13157 flesch: 40 summary: Phishing programmes and the literature focus on training users to identify phishing emails and spoofed websites, but little attention has been given to social network phishing and other influential factors and their effects on user information processing ( Vishwanath, 2015b ) . This is because phishers are able to use similar methods to entice social network users to click on malicious links masquerading as fake news, controversial videos and other opportunities thought to be attractive or beneficial to the victim. keywords: attacks; effect; et al; facebook; influence; information; message; model; network; personality; personality traits; persuasion; phishing; processing; security; snss; study; susceptibility; traits; users cache: cord-355789-x449xflm.txt plain text: cord-355789-x449xflm.txt