Journal Description
Information
Information
is a scientific, peer-reviewed, open access journal of information science and technology, data, knowledge, and communication, and is published monthly online by MDPI. The International Society for Information Studies (IS4SI) is affiliated with Information and its members receive discounts on the article processing charges.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within Scopus, ESCI (Web of Science), Ei Compendex, dblp, and other databases.
- Journal Rank: CiteScore - Q2 (Information Systems)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 21.8 days after submission; acceptance to publication is undertaken in 3.9 days (median values for papers published in this journal in the second half of 2022).
- Recognition of Reviewers: reviewers who provide timely, thorough peer-review reports receive vouchers entitling them to a discount on the APC of their next publication in any MDPI journal, in appreciation of the work done.
Latest Articles
Trend Analysis of Decentralized Autonomous Organization Using Big Data Analytics
Information 2023, 14(6), 326; https://doi.org/10.3390/info14060326 - 09 Jun 2023
Abstract
Decentralized Autonomous Organizations (DAOs) have gained widespread attention in academia and industry as potential future models for decentralized governance and organization. In order to understand the trends and future potential of this rapidly growing technology, it is crucial to conduct research in the
[...] Read more.
Decentralized Autonomous Organizations (DAOs) have gained widespread attention in academia and industry as potential future models for decentralized governance and organization. In order to understand the trends and future potential of this rapidly growing technology, it is crucial to conduct research in the field. This research aims at a data-driven approach for the objective content analysis of big data related to DAOs, using text mining and Latent Dirichlet Allocation (LDA)-based topic modeling. The study analyzed tweets with the hashtag #DAO and all Reddit data with “DAO”. The results were from the identification of the top 100 frequently appearing keywords, as well as the top 20 keywords with high network centrality, and key topics related to finance, gaming, and fundraising, from both Twitter and Reddit. The analysis revealed twelve topics from Twitter and eight topics from Reddit, with the term “community” frequently appearing across many of these topics. The findings provide valuable insights into the current trend and future potential of DAOs, and should be used by researchers to guide further research in the field and by decision makers to explore innovative ways to govern the organizations.
Full article
(This article belongs to the Special Issue Advances in Data and Network Sciences Applied to Computational Social Science)
Open AccessArticle
Monetary Compensation and Private Information Sharing in Augmented Reality Applications
Information 2023, 14(6), 325; https://doi.org/10.3390/info14060325 - 08 Jun 2023
Abstract
This research studied people’s responses to requests that ask for accessing their personal information when using augmented reality (AR) technology. AR is a new technology that superimposes digital information onto the real world, creating a unique user experience. As such, AR is often
[...] Read more.
This research studied people’s responses to requests that ask for accessing their personal information when using augmented reality (AR) technology. AR is a new technology that superimposes digital information onto the real world, creating a unique user experience. As such, AR is often associated with the collection and use of personal information, which may lead to significant privacy concerns. To investigate these potential concerns, we adopted an experimental approach and examined people’s actual responses to real-world requests for various types of personal information while using a designated AR application on their personal smartphones. Our results indicate that the majority (57%) of people are willing to share sensitive personal information with an unknown third party without any compensation other than using the application. Moreover, there is variability in the individuals’ willingness to allow access to various kinds of personal information. For example, while 75% of participants were open to granting access to their microphone, only 35% of participants agreed to allow access to their contacts. Lastly, monetary compensation is linked with an increased willingness to share personal information. When no compensation was offered, only of the participants agreed to grant access to their contacts, but when a low compensation was offered, of the participants agreed. These findings combine to suggest several practical implications for the development and distribution of AR technologies.
Full article
(This article belongs to the Special Issue Addressing Privacy and Data Protection in New Technological Trends)
►▼
Show Figures

Figure 1
Open AccessArticle
Corporate Responsibility in the Digital Era
by
and
Information 2023, 14(6), 324; https://doi.org/10.3390/info14060324 - 08 Jun 2023
Abstract
As the digital era advances, many industries continue to expand their use of digital technologies to support company operations, notably at the customer interface, bringing new commercial opportunities and increased efficiencies. However, there are new sets of responsibilities associated with the deployment of
[...] Read more.
As the digital era advances, many industries continue to expand their use of digital technologies to support company operations, notably at the customer interface, bringing new commercial opportunities and increased efficiencies. However, there are new sets of responsibilities associated with the deployment of these technologies, encompassed within the emerging concept of corporate digital responsibility (CDR), which to date has received little attention in the academic literature. This exploratory paper thus looks to make a small contribution to addressing this gap in the literature. The paper adopts a qualitative, inductive research method, employing an initial scoping literature review followed by two case studies. Based on the research findings, a simple model of CDR parameters is put forward. The article includes a discussion of a number of emergent issues—fair and equitable access, personal and social well-being, environmental implications, and cross-supply chain complexities—and a conclusion that summarises the main findings and suggests possible directions for future research.
Full article
(This article belongs to the Special Issue New Information Communication Technologies in the Digital Era)
►▼
Show Figures

Figure 1
Open AccessArticle
M-Ary Direct Modulation Chirp Spread Spectrum for Spectrally Efficient Communications
Information 2023, 14(6), 323; https://doi.org/10.3390/info14060323 - 06 Jun 2023
Abstract
Spread spectrum techniques, such as the Chirp Spread Spectrum (CSS) used by LoRa technology, are important for machine-to-machine communication in the context of the Internet of Things. They offer high processing gain, reliable communication over long ranges, robustness to interference and noise in
[...] Read more.
Spread spectrum techniques, such as the Chirp Spread Spectrum (CSS) used by LoRa technology, are important for machine-to-machine communication in the context of the Internet of Things. They offer high processing gain, reliable communication over long ranges, robustness to interference and noise in harsh environments, etc. However, these features are compromised by their poor spectral efficiency, resulting in a very low data transmission rate. This paper deals with a spectrally efficient variant of CSS. The system uses M-ary phase keying to modulate the data and exploits CSS’s properties to transmit the modulated symbols as overlapping chirps. The overlapping of chirp signals may affect the system performance due to inter-symbol interference. Therefore, we analyse the relationship between the number of overlaps and the effect of inter-symbol interference (ISI), and we also determine the BER expression as a function of the number of overlaps. Finally, we derive the optimal number of overlapping symbols that corresponds to the minimum error probability.
Full article
(This article belongs to the Special Issue Advances in Wireless Communications Systems)
►▼
Show Figures

Figure 1
Open AccessSystematic Review
Agile Software Requirements Engineering Challenges-Solutions—A Conceptual Framework from Systematic Literature Review
Information 2023, 14(6), 322; https://doi.org/10.3390/info14060322 - 06 Jun 2023
Abstract
Agile software requirements engineering processes enable quick responses to reflect changes in the client’s software requirements. However, there are challenges associated with agile requirements engineering processes, which hinder fast, sustainable software development. Research addressing the challenges with available solutions is patchy, diverse and
[...] Read more.
Agile software requirements engineering processes enable quick responses to reflect changes in the client’s software requirements. However, there are challenges associated with agile requirements engineering processes, which hinder fast, sustainable software development. Research addressing the challenges with available solutions is patchy, diverse and inclusive. In this study, we use a systematic literature review coupled with thematic classification and gap mapping analysis to examine extant solutions against challenges; the typologies/classifications of challenges faced with agile software development in general and specifically in requirements engineering and how the solutions address the challenges. Our study covers the period from 2009 to 2023. Scopus—the largest database for credible academic publications was searched. Using the exclusion criteria to filter the articles, a total of 78 valid papers were selected and reviewed. Following our investigation, we develop a framework that takes a three-dimensional view of agile requirements engineering solutions and suggest an orchestrated approach balancing the focus between the business context, project management and agile techniques. This study contributes to the theoretical frontier of agile software requirement engineering approaches and guidelines for practice.
Full article
(This article belongs to the Special Issue Optimization and Methodology in Software Engineering)
►▼
Show Figures

Figure 1
Open AccessArticle
Multi-Task Romanian Email Classification in a Business Context
Information 2023, 14(6), 321; https://doi.org/10.3390/info14060321 - 03 Jun 2023
Abstract
Email classification systems are essential for handling and organizing the massive flow of communication, especially in a business context. Although many solutions exist, the lack of standardized classification categories limits their applicability. Furthermore, the lack of Romanian language business-oriented public datasets makes the
[...] Read more.
Email classification systems are essential for handling and organizing the massive flow of communication, especially in a business context. Although many solutions exist, the lack of standardized classification categories limits their applicability. Furthermore, the lack of Romanian language business-oriented public datasets makes the development of such solutions difficult. To this end, we introduce a versatile automated email classification system based on a novel public dataset of 1447 manually annotated Romanian business-oriented emails. Our corpus is annotated with 5 token-related labels, as well as 5 sequence-related classes. We establish a strong baseline using pre-trained Transformer models for token classification and multi-task classification, achieving an F1-score of 0.752 and 0.764, respectively. We publicly release our code together with the dataset of labeled emails.
Full article
(This article belongs to the Special Issue Novel Methods and Applications in Natural Language Processing)
►▼
Show Figures

Figure 1
Open AccessArticle
IoT Device Identification Using Unsupervised Machine Learning
Information 2023, 14(6), 320; https://doi.org/10.3390/info14060320 - 31 May 2023
Abstract
Device identification is a fundamental issue in the Internet of Things (IoT). Many critical services, including access control and intrusion prevention, are built on correctly identifying each unique device in a network. However, device identification faces many challenges in the IoT. For example,
[...] Read more.
Device identification is a fundamental issue in the Internet of Things (IoT). Many critical services, including access control and intrusion prevention, are built on correctly identifying each unique device in a network. However, device identification faces many challenges in the IoT. For example, a common technique to identify a device in a network is using the device’s MAC address. However, MAC addresses can be easily spoofed. On the other hand, IoT devices also include dynamic characteristics such as traffic patterns which could be used for device identification. Machine-learning-assisted approaches are promising for device identification since they can capture dynamic device behaviors and have automation capabilities. Supervised machine-learning-assisted techniques demonstrate high accuracies for device identification. However, they require a large number of labeled datasets, which can be a challenge. On the other hand, unsupervised machine learning can also reach good accuracies without requiring labeled datasets. This paper presents an unsupervised machine-learning approach for IoT device identification.
Full article
(This article belongs to the Special Issue Pervasive Computing in IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
Interpretation of Bahasa Isyarat Malaysia (BIM) Using SSD-MobileNet-V2 FPNLite and COCO mAP
by
, , , , , and
Information 2023, 14(6), 319; https://doi.org/10.3390/info14060319 - 31 May 2023
Abstract
This research proposes a study on two-way communication between deaf/mute and normal people using an Android application. Despite advancements in technology, there is still a lack of mobile applications that facilitate two-way communication between deaf/mute and normal people, especially by using Bahasa Isyarat
[...] Read more.
This research proposes a study on two-way communication between deaf/mute and normal people using an Android application. Despite advancements in technology, there is still a lack of mobile applications that facilitate two-way communication between deaf/mute and normal people, especially by using Bahasa Isyarat Malaysia (BIM). This project consists of three parts: First, we use BIM letters, which enables the recognition of BIM letters and BIM combined letters to form a word. In this part, a MobileNet pre-trained model is implemented to train the model with a total of 87,000 images for 29 classes, with a 10% test size and a 90% training size. The second part is BIM word hand gestures, which consists of five classes that are trained with the SSD-MobileNet-V2 FPNLite 320 × 320 pre-trained model with a speed of 22 s/frame rate and COCO mAP of 22.2, with a total of 500 images for all five classes and first-time training set to 2000 steps, while the second- and third-time training are set to 2500 steps. The third part is Android application development using Android Studio, which contains the features of the BIM letters and BIM word hand gestures, with the trained models converted into TensorFlow Lite. This feature also includes the conversion of speech to text, whereby this feature allows converting speech to text through the Android application. Thus, BIM letters obtain 99.75% accuracy after training the models, while BIM word hand gestures obtain 61.60% accuracy. The suggested system is validated as a result of these simulations and tests.
Full article
(This article belongs to the Section Information and Communications Technology)
►▼
Show Figures

Figure 1
Open AccessArticle
Federated Blockchain Learning at the Edge
by
and
Information 2023, 14(6), 318; https://doi.org/10.3390/info14060318 - 30 May 2023
Abstract
Machine learning, particularly using neural networks, is now widely adopted in practice even with the IoT paradigm; however, training neural networks at the edge, on IoT devices, remains elusive, mainly due to computational requirements. Furthermore, effective training requires large quantities of data and
[...] Read more.
Machine learning, particularly using neural networks, is now widely adopted in practice even with the IoT paradigm; however, training neural networks at the edge, on IoT devices, remains elusive, mainly due to computational requirements. Furthermore, effective training requires large quantities of data and privacy concerns restrict accessible data. Therefore, in this paper, we propose a method leveraging a blockchain and federated learning to train neural networks at the edge effectively bypassing these issues and providing additional benefits such as distributing training across multiple devices. Federated learning trains networks without storing any data and aggregates multiple networks, trained on unique data, forming a global network via a centralized server. By leveraging the decentralized nature of a blockchain, this centralized server is replaced by a P2P network, removing the need for a trusted centralized server and enabling the learning process to be distributed across participating devices. Our results show that networks trained in such a manner have negligible differences in accuracy compared to traditionally trained networks on IoT devices and are less prone to overfitting. We conclude that not only is this a viable alternative to traditional paradigms but is an improvement that contains a wealth of benefits in an ecosystem such as a hospital.
Full article
(This article belongs to the Special Issue Pervasive Computing in IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
An Intelligent Boosting and Decision-Tree-Regression-Based Score Prediction (BDTR-SP) Method in the Reform of Tertiary Education Teaching
Information 2023, 14(6), 317; https://doi.org/10.3390/info14060317 - 30 May 2023
Abstract
The reform of tertiary education teaching promotes teachers to adjust timely teaching plans based on students’ learning feedback in order to improve teaching performance. Thefore, learning score prediction is a key issue in process of the reform of tertiary education teaching. With the
[...] Read more.
The reform of tertiary education teaching promotes teachers to adjust timely teaching plans based on students’ learning feedback in order to improve teaching performance. Thefore, learning score prediction is a key issue in process of the reform of tertiary education teaching. With the development of information and management technologies, a lot of teaching data are generated as the scale of online and offline education expands. However, a teacher or educator does not have a comprehensive dataset in practice, which challenges his/her ability to predict the students’ learning performance from the individual’s viewpoint. How to overcome the drawbacks of small samples is an open issue. To this end, it is desirable that an effective artificial intelligent tool is designed to help teachers or educators predict students’ scores well. We propose a boosting and decision-tree-regression-based score prediction (BDTR-SP) model, which relies on an ensemble learning structure with base learners of decision tree regression (DTR) to improve the prediction accuracy. Experiments on small samples are conducted to examine the important features that affect students’ scores. The results show that the proposed model has advantages over its peer in terms of prediction correctness. Moreover, the predicted results are consistent with the actual facts implied in the original dataset. The proposed BDTR-SP method aids teachers and students to predict students’ performance in the on-going courses in order to adjust the teaching and learning strategies, plans and practices in advance, enhancing the teaching and learning quality. Therefore, the integration of information technology and artificial intelligence into teaching and learning practices is able to push forward the reform of tertiary education teaching.
Full article
(This article belongs to the Special Issue Predictive Analytics and Data Science)
►▼
Show Figures

Figure 1
Open AccessArticle
Irradiance Non-Uniformity in LED Light Simulators
Information 2023, 14(6), 316; https://doi.org/10.3390/info14060316 - 30 May 2023
Abstract
Photovoltaic (PV) cells are a technology of choice for providing power to self-sufficient Internet of Things (IoT) devices. These devices’ declining power demands can now be met even in indoor environments with low light intensity. Correspondingly, light simulation systems need to cover a
[...] Read more.
Photovoltaic (PV) cells are a technology of choice for providing power to self-sufficient Internet of Things (IoT) devices. These devices’ declining power demands can now be met even in indoor environments with low light intensity. Correspondingly, light simulation systems need to cover a wide spectrum of irradiance intensity to emulate a PV cell’s working conditions while meeting cost targets. In this paper, we propose a method for calculating the irradiance distribution for a given number and position of LED sources to meet irradiance and uniformity requirements in LED-based light simulators. In addition, we establish design guidelines for minimizing non-uniformity under specific constraints and utilize a function to evaluate the degree of non-uniformity and determine the optimal distance from the illuminated surface. We demonstrate that even with a small number of low-cost LED sources, high levels of irradiance can be achieved with bounded non-uniformities. The presented guidelines serve as a resource for designing tailored, low-cost light simulators that meet users’ area/intensity/uniformity specifications.
Full article
(This article belongs to the Special Issue Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2022))
►▼
Show Figures

Figure 1
Open AccessArticle
Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
Information 2023, 14(6), 315; https://doi.org/10.3390/info14060315 - 30 May 2023
Abstract
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem
[...] Read more.
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and are a vibrant academic research area. Although they are adopted in many fields, such as the environment, agriculture, and healthcare and they are considered assistive technology, they seem to neglect the aspects of security and privacy. This problem occurs due to the pervasive nature of sensor-based HARSs. Sensors are devices with low power and computational capabilities, joining a machine learning application that lies in a dynamic and heterogeneous communication environment, and there is no generalized unified approach to evaluate their security/privacy, but rather only individual solutions. In this work, we studied HARSs in particular and tried to extend existing techniques for these systems considering the security/privacy of all participating components. Initially, in this work, we present the architecture of a real-life medical IoT application and the data flow across the participating entities. Then, we briefly review security and privacy issues and present possible vulnerabilities of each system layer. We introduce an architecture over the communication layer that offers mutual authentication, solving many security and privacy issues, particularly the man-in-the-middle attack (MitM). Relying on the proposed solutions, we manage to prevent unauthorized access to critical information by providing a trustworthy application.
Full article
(This article belongs to the Special Issue Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM 2022))
►▼
Show Figures

Figure 1
Open AccessArticle
METRIC—Multi-Eye to Robot Indoor Calibration Dataset
Information 2023, 14(6), 314; https://doi.org/10.3390/info14060314 - 29 May 2023
Abstract
Multi-camera systems are an effective solution for perceiving large areas or complex scenarios with many occlusions. In such a setup, an accurate camera network calibration is crucial in order to localize scene elements with respect to a single reference frame shared by all
[...] Read more.
Multi-camera systems are an effective solution for perceiving large areas or complex scenarios with many occlusions. In such a setup, an accurate camera network calibration is crucial in order to localize scene elements with respect to a single reference frame shared by all the viewpoints of the network. This is particularly important in applications such as object detection and people tracking. Multi-camera calibration is a critical requirement also in several robotics scenarios, particularly those involving a robotic workcell equipped with a manipulator surrounded by multiple sensors. Within this scenario, the robot-world hand-eye calibration is an additional crucial element for determining the exact position of each camera with respect to the robot, in order to provide information about the surrounding workspace directly to the manipulator. Despite the importance of the calibration process in the two scenarios outlined above, namely (i) a camera network, and (ii) a camera network with a robot, there is a lack of standard datasets available in the literature to evaluate and compare calibration methods. Moreover they are usually treated separately and tested on dedicated setups. In this paper, we propose a general standard dataset acquired in a robotic workcell where calibration methods can be evaluated in two use cases: camera network calibration and robot-world hand-eye calibration. The Multi-Eye To Robot Indoor Calibration (METRIC) dataset consists of over 10,000 synthetic and real images of ChAruCo and checkerboard patterns, each one rigidly attached to the robot end-effector, which was moved in front of four cameras surrounding the manipulator from different viewpoints during the image acquisition. The real images in the dataset includes several multi-view image sets captured by three different types of sensor networks: Microsoft Kinect V2, Intel RealSense Depth D455 and Intel RealSense Lidar L515, to evaluate their advantages and disadvantages for calibration. Furthermore, in order to accurately analyze the effect of camera-robot distance on calibration, we acquired a comprehensive synthetic dataset, with related ground truth, with three different camera network setups corresponding to three levels of calibration difficulty depending on the cell size. An additional contribution of this work is to provide a comprehensive evaluation of state-of-the-art calibration methods using our dataset, highlighting their strengths and weaknesses, in order to outline two benchmarks for the two aforementioned use cases.
Full article
(This article belongs to the Special Issue Computer Vision, Pattern Recognition and Machine Learning in Italy)
►▼
Show Figures

Figure 1
Open AccessArticle
Matrices Based on Descriptors for Analyzing the Interactions between Agents and Humans
Information 2023, 14(6), 313; https://doi.org/10.3390/info14060313 - 29 May 2023
Abstract
The design of agents interacting with human beings is becoming a crucial problem in many real-life applications. Different methods have been proposed in the research areas of human–computer interaction (HCI) and multi-agent systems (MAS) to model teams of participants (agents and humans). It
[...] Read more.
The design of agents interacting with human beings is becoming a crucial problem in many real-life applications. Different methods have been proposed in the research areas of human–computer interaction (HCI) and multi-agent systems (MAS) to model teams of participants (agents and humans). It is then necessary to build models analyzing their decisions when interacting, while taking into account the specificities of these interactions. This paper, therefore, aimed to propose an explicit model of such interactions based on game theory, taking into account, not only environmental characteristics (e.g., criticality), but also human characteristics (e.g., workload and experience level) for the intervention (or not) of agents, to help the latter. Game theory is a well-known approach to studying such social interactions between different participants. Existing works on the construction of game matrices required different ad hoc descriptors, depending on the application studied. Moreover, they generally focused on the interactions between agents, without considering human beings in the analysis. We show that these descriptors can be classified into two categories, related to their effect on the interactions. The set of descriptors to use is thus based on an explicit combination of all interactions between agents and humans (a weighted sum of 2-player matrices). We propose a general model for the construction of game matrices based on any number of participants and descriptors. It is then possible to determine using Nash equilibria whether agents decide (or not) to intervene during the tasks concerned. The model is also evaluated through the determination of the gains obtained by the different participants. Finally, we illustrate and validate the proposed model using a typical scenario (involving two agents and two humans), while describing the corresponding equilibria.
Full article
(This article belongs to the Special Issue Feature Papers in Information in 2023)
►▼
Show Figures

Figure 1
Open AccessArticle
An Edge Device Framework in SEMAR IoT Application Server Platform
by
, , , , , , and
Information 2023, 14(6), 312; https://doi.org/10.3390/info14060312 - 29 May 2023
Abstract
Nowadays, the Internet of Things (IoT) has become widely used at various places and for various applications. To facilitate this trend, we have developed the IoT application server platform called SEMAR (Smart Environmental Monitoring and Analytical in Real-Time), which offers standard features
[...] Read more.
Nowadays, the Internet of Things (IoT) has become widely used at various places and for various applications. To facilitate this trend, we have developed the IoT application server platform called SEMAR (Smart Environmental Monitoring and Analytical in Real-Time), which offers standard features for collecting, displaying, and analyzing sensor data. An edge device is usually installed to connect sensors with the server, where the interface configuration, the data processing, the communication protocol, and the transmission interval need to be defined by the user. In this paper, we proposed an edge device framework for SEMAR to remotely optimize the edge device utilization with three phases. In the initialization phase, it automatically downloads the configuration file to the device through HTTP communications. In the service phase, it converts data from various sensors into the standard data format and sends it to the server periodically. In the update phase, it remotely updates the configuration through MQTT communications. For evaluations, we applied the proposal to the fingerprint-based indoor localization system (FILS15.4) and the data logging system. The results confirm the effectiveness in utilizing SEMAR to develop IoT application systems.
Full article
(This article belongs to the Special Issue Pervasive Computing in IoT)
►▼
Show Figures

Figure 1
Open AccessArticle
A Jigsaw Puzzle Solver-Based Attack on Image Encryption Using Vision Transformer for Privacy-Preserving DNNs
by
and
Information 2023, 14(6), 311; https://doi.org/10.3390/info14060311 - 29 May 2023
Abstract
In this paper, we propose a novel attack on image encryption for privacy-preserving deep neural networks (DNNs). Although several encryption schemes have been proposed for privacy-preserving DNNs, existing cipher-text-only attacks (COAs) have succeeded in restoring visual information from encrypted images. Image encryption using
[...] Read more.
In this paper, we propose a novel attack on image encryption for privacy-preserving deep neural networks (DNNs). Although several encryption schemes have been proposed for privacy-preserving DNNs, existing cipher-text-only attacks (COAs) have succeeded in restoring visual information from encrypted images. Image encryption using the Vision Transformer (ViT) is known to be robust against existing COAs due to the operations of block scrambling and pixel shuffling, which permute divided blocks and pixels in an encrypted image. However, the correlation between blocks in the encrypted image can still be exploited for reconstruction. Therefore, in this paper, a novel jigsaw puzzle solver-based attack that utilizes block correlation is proposed to restore visual information from encrypted images. In the experiments, we evaluated the security of image encryption for privacy-preserving deep neural networks using both conventional and proposed COAs. The experimental results demonstrate that the proposed attack is able to restore almost all visual information from images encrypted for being applied to ViTs.
Full article
(This article belongs to the Special Issue Addressing Privacy and Data Protection in New Technological Trends)
►▼
Show Figures

Figure 1
Open AccessArticle
A Robust Hybrid Deep Convolutional Neural Network for COVID-19 Disease Identification from Chest X-ray Images
by
, , , and
Information 2023, 14(6), 310; https://doi.org/10.3390/info14060310 - 29 May 2023
Abstract
The prompt and accurate identification of the causes of pneumonia is necessary to implement rapid treatment and preventative approaches, reduce the burden of infections, and develop more successful intervention strategies. There has been an increase in the number of new pneumonia cases and
[...] Read more.
The prompt and accurate identification of the causes of pneumonia is necessary to implement rapid treatment and preventative approaches, reduce the burden of infections, and develop more successful intervention strategies. There has been an increase in the number of new pneumonia cases and diseases known as acute respiratory distress syndrome (ARDS) as a direct consequence of the spread of COVID-19. Chest radiography has evolved to the point that it is now an indispensable diagnostic tool for COVID-19 infection pneumonia in hospitals. To fully exploit the technique, it is crucial to design a computer-aided diagnostic (CAD) system to assist doctors and other medical professionals in establishing an accurate and rapid diagnosis of pneumonia. This article presents a robust hybrid deep convolutional neural network (DCNN) for rapidly identifying three categories (normal, COVID-19 and pneumonia (viral or bacterial)) using X-ray image data sourced from the COVID-QU-Ex dataset. The proposed approach on the test set achieved a rate of 99.25% accuracy, 99.10% Kappa-score, 99.43% AUC, 99.24% F1-score, 99.25% recall, and 99.23% precision, respectively. The outcomes of the experiments demonstrate that the presented hybrid DCNN mechanism for identifying three categories utilising X-ray images is robust and effective.
Full article
(This article belongs to the Special Issue Artificial Intelligence and Big Data Applications)
►▼
Show Figures

Figure 1
Open AccessArticle
Fermatean Fuzzy-Based Personalized Prioritization of Barriers to IoT Adoption within the Clean Energy Context
by
, , , , and
Information 2023, 14(6), 309; https://doi.org/10.3390/info14060309 - 29 May 2023
Abstract
Globally, industries are focusing on green habits, with world leaders demanding net zero carbon; clean energy is considered an attractive and viable option. The Internet of things (IoT) is an emerging technology with potential opportunities in the clean energy domain for quality improvement
[...] Read more.
Globally, industries are focusing on green habits, with world leaders demanding net zero carbon; clean energy is considered an attractive and viable option. The Internet of things (IoT) is an emerging technology with potential opportunities in the clean energy domain for quality improvement in production and management. Earlier studies on IoTs show evidence that direct adoption of such digital technology is an ordeal and incurs adoption barriers that must be prioritized for effective management. Motivated by the claim, in this paper, the authors attempt to prioritize the diverse adoption barriers with the support of the newly proposed Fermatean fuzzy-based decision framework. Initially, qualitative rating information is collected via questionnaires on barriers and criteria from the circular economy (CE). Later, these are converted to Fermatean fuzzy numbers used by integrated approaches for decision processes. A regret scheme is put forward for determining CE criteria importance, and the barriers are prioritized by using a novel ranking algorithm that incorporates the WASPAS formulation and experts’ personal choices during rank estimation. The applicability of the developed framework is testified via a case example. Sensitivity analysis and comparison reveal the merits and limitations of the developed decision model. Results show that labor/workforce skill insufficiency, an ineffective framework for performance, a technology divide, insufficient legislation and control, and lack of time for training and skill practice are the top five barriers that hinder IoT adoption, based on the rating data. Additionally, the criteria such as cost cutting via a reuse scheme, resource circularity, emission control, and scaling profit with green habits are the top four criteria for their relative importance values. From these inferences, the respective authorities in the clean energy sector could effectively plan their strategies for addressing these barriers to promote IoT adoption in the clean energy sector.
Full article
(This article belongs to the Special Issue New Trend on Fuzzy Systems and Intelligent Decision Making Theory: A Themed Issue Dedicated to Dr. Ronald R. Yager)
►▼
Show Figures

Figure 1
Open AccessArticle
Empower Psychotherapy with mHealth Apps: The Design of “Safer”, an Emotion Regulation Application
Information 2023, 14(6), 308; https://doi.org/10.3390/info14060308 - 27 May 2023
Abstract
In the past decade, technological advancements in mental health care have resulted in new approaches and techniques. The proliferation of mobile apps and smartphones has significantly improved access to psychological self-help resources for individuals. In this paper, a narrative review offers a comprehensive
[...] Read more.
In the past decade, technological advancements in mental health care have resulted in new approaches and techniques. The proliferation of mobile apps and smartphones has significantly improved access to psychological self-help resources for individuals. In this paper, a narrative review offers a comprehensive overview of recent developments in mental health mobile apps, serving as a foundation to introduce the design and development of “Safer”. Safer is a mobile application that targets the transdiagnostic process of emotion dysregulation. The review outlines the theoretical framework and design of Safer, an mHealth app grounded in the Dialectical Behavior Therapy (DBT) model, aimed at fostering emotion regulation skills.
Full article
(This article belongs to the Special Issue eXtended Reality for Social Inclusion and Educational Purpose)
►▼
Show Figures

Figure 1
Open AccessArticle
An Intelligent Conversational Agent for the Legal Domain
Information 2023, 14(6), 307; https://doi.org/10.3390/info14060307 - 27 May 2023
Abstract
An intelligent conversational agent for the legal domain is an AI-powered system that can communicate with users in natural language and provide legal advice or assistance. In this paper, we present CREA2, an agent designed to process legal concepts and be able to
[...] Read more.
An intelligent conversational agent for the legal domain is an AI-powered system that can communicate with users in natural language and provide legal advice or assistance. In this paper, we present CREA2, an agent designed to process legal concepts and be able to guide users on legal matters. The conversational agent can help users navigate legal procedures, understand legal jargon, and provide recommendations for legal action. The agent can also give suggestions helpful in drafting legal documents, such as contracts, leases, and notices. Additionally, conversational agents can help reduce the workload of legal professionals by handling routine legal tasks. CREA2, in particular, will guide the user in resolving disputes between people residing within the European Union, proposing solutions in controversies between two or more people who are contending over assets in a divorce, an inheritance, or the division of a company. The conversational agent can later be accessed through various channels, including messaging platforms, websites, and mobile applications. This paper presents a retrieval system that evaluates the similarity between a user’s query and a given question. The system uses natural language processing (NLP) algorithms to interpret user input and associate responses by addressing the problem as a semantic search similar question retrieval. Although a common approach to question and answer (Q&A) retrieval is to create labelled Q&A pairs for training, we exploit an unsupervised information retrieval system in order to evaluate the similarity degree between a given query and a set of questions contained in the knowledge base. We used the recently proposed SBERT model for the evaluation of relevance. In the paper, we illustrate the effective design principles, the implemented details and the results of the conversational system and describe the experimental campaign carried out on it.
Full article
(This article belongs to the Collection Natural Language Processing and Applications: Challenges and Perspectives)
►▼
Show Figures

Figure 1

Journal Menu
► ▼ Journal Menu-
- Information Home
- Aims & Scope
- Editorial Board
- Reviewer Board
- Topical Advisory Panel
- Instructions for Authors
- Special Issues
- Topics
- Sections & Collections
- Article Processing Charge
- Indexing & Archiving
- Editor’s Choice Articles
- Most Cited & Viewed
- Journal Statistics
- Journal History
- Journal Awards
- Society Collaborations
- Conferences
- Editorial Office
Journal Browser
► ▼ Journal BrowserHighly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Education Sciences, Future Internet, Information, J. Intell., Sustainability
Advances in Online and Distance Learning
Topic Editors: Neil Gordon, Han ReichgeltDeadline: 31 July 2023
Topic in
Applied Sciences, Electronics, Informatics, Information, Software
Software Engineering and Applications
Topic Editors: Sanjay Misra, Robertas Damaševičius, Bharti SuriDeadline: 31 October 2023
Topic in
Algorithms, Axioms, Information, Mathematics, Symmetry
Fuzzy Number, Fuzzy Difference, Fuzzy Differential: Theory and Applications
Topic Editors: Changyou Wang, Dong Qiu, Yonghong ShenDeadline: 20 December 2023
Topic in
AI, Algorithms, Applied Sciences, Information, Mathematics
Advances in Artificial Neural Networks
Topic Editors: Krzysztof Ejsmont, Aamer Bilal Asghar, Yong Wang, Rodolfo HaberDeadline: 31 December 2023

Conferences
Special Issues
Special Issue in
Information
Big Data, IoT and Cloud Computing
Guest Editor: Habtamu AbieDeadline: 14 June 2023
Special Issue in
Information
Security and Privacy in IoT Systems (SPIoTS)
Guest Editors: Habtamu Abie, Stefan Poslad, John SoldatosDeadline: 30 June 2023
Special Issue in
Information
Models for Blockchain Systems: Analysis and Simulation
Guest Editors: Sabina Rossi, Andrea Marin, Marco BernardoDeadline: 15 July 2023
Special Issue in
Information
Information Technologies in Education, Research and Innovation
Guest Editors: Beng Soo Ong, Tianchong Wang, Eric C. K. ChengDeadline: 18 July 2023
Topical Collections
Topical Collection in
Information
Natural Language Processing and Applications: Challenges and Perspectives
Collection Editor: Diego Reforgiato Recupero
Topical Collection in
Information
Knowledge Graphs for Search and Recommendation
Collection Editors: Pierpaolo Basile, Annalina Caputo
Topical Collection in
Information
Augmented Reality Technologies, Systems and Applications
Collection Editors: Ramon Fabregat, Jorge Bacca-Acosta, N.D. Duque-Mendez
Topical Collection in
Information
Pervasive Intelligent Data Systems
Collection Editors: Filipe Portela, Manuel Filipe Santos, Kolomvatsos Kostas