Using Natural Language Processing Techniques to Tackle the Construct Identity Problem in Information Systems Research

Publikation: Beiträge in SammelwerkenAufsätze in KonferenzbändenForschungbegutachtet

Authors

The growing number of constructs in behavioral research presents a problem to theory integration, since constructs cannot clearly be discriminated from each other. Recently there have been efforts to employ natural language processing techniques to tackle the construct identity problem. This paper compares the performance of the novel word-embedding model GloVe and different document projection methods with a latent semantic analysis (LSA) used in recent literature. The results show that making use of an advantage in document projection that LSA has over GloVe, performance can be improved. Even against this advantage of LSA, GloVe reaches comparable performance, and adjusted word embedding models can make up for this advantage. The proposed approach therefore presents a promising pathway for theory integration in behavioral research.

OriginalspracheEnglisch
TitelProceedings of the 53rd Annual Hawaii International Conference on System Sciences, HICSS 2020 : Knowing What We Know: Theory, Meta-analysis, and Review
HerausgeberTung X. Bui
Anzahl der Seiten10
ErscheinungsortHonolulu
VerlagUniversity of Hawaii at Manoa
Erscheinungsdatum07.01.2020
Seiten5675-5684
ISBN (elektronisch)978-0-9981331-3-3
DOIs
PublikationsstatusErschienen - 07.01.2020
VeranstaltungHawaii International Conference on System Sciences - HICSS 2020 - University of Hawai'i at Manoa, Hawai, USA / Vereinigte Staaten
Dauer: 07.01.202010.01.2020
Konferenznummer: 53
https://scholarspace.manoa.hawaii.edu/handle/10125/63576

Bibliographische Notiz

Publisher Copyright:
© 2020 IEEE Computer Society. All rights reserved.

    Fachgebiete

  • Informatik - construct identity fallacy, global vectors for word representation (glove), jingle jangle, latent semantic analysis (lsa), word embeddings

Links

DOI

Zuletzt angesehen

Publikationen

  1. Modeling Effective and Ineffective Knowledge Communication and Learning Discourses in CSCL with Hidden Markov Models
  2. Algebraic combinatorics in mathematical chemistry. Methods and algorithms. I. Permutation groups and coherent (cellular) algebras.
  3. Supervised clustering of streaming data for email batch detection
  4. Ant colony optimization algorithm and artificial immune system applied to a robot route
  5. Development of a Didactic Graphical Simulation Interface on MATLAB for Systems Control
  6. Detection and mapping of water pollution variation in the Nile Delta using multivariate clustering and GIS techniques
  7. Multidimensional Cross-Recurrence Quantification Analysis (MdCRQA)–A Method for Quantifying Correlation between Multivariate Time-Series
  8. Data-Generating Mechanisms Versus Constructively Defined Latent Variables in Multitrait–Multimethod Analysis:
  9. Graph Conditional Variational Models: Too Complex for Multiagent Trajectories?
  10. Using learning protocols for knowledge acquisition and problem solving with individual and group incentives
  11. Modeling and simulation of deformation behavior, orientation gradient development and heterogeneous hardening in thin sheets with coarse texture
  12. A geometric algorithm for the output functional controllability in general manipulation systems and mechanisms
  13. Contributions of declarative and procedural memory to accuracy and automatization during second language practice
  14. Towards a Dynamic Interpretation of Subjective and Objective Values
  15. Analysis of priority rule-based scheduling in dual-resource-constrained shop-floor scenarios
  16. Discourse Analyses in Chat-based CSCL with Learning Protocols
  17. Modeling precipitation kinetics for multi-phase and multi-component systems using particle size distributions via a moving grid technique
  18. Using haar wavelets for fault detection in technical processes
  19. A Quadrant Approach of Camera Calibration Method for Depth Estimation Using a Stereo Vision System