A Robust Collaborative Filtering Approach Based on User Relationships for Recommendation Systems

Total Page:16

File Type:pdf, Size:1020Kb

A Robust Collaborative Filtering Approach Based on User Relationships for Recommendation Systems Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2014, Article ID 162521, 8 pages http://dx.doi.org/10.1155/2014/162521 Research Article A Robust Collaborative Filtering Approach Based on User Relationships for Recommendation Systems Min Gao,1,2 Bin Ling,3 Quan Yuan,1 Qingyu Xiong,1,2 and Linda Yang3 1 School of Software Engineering, Chongqing University, Chongqing 400044, China 2 Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing 400044, China 3 School of Engineering, University of Portsmouth, Portsmouth PO1 3AH, UK Correspondence should be addressed to Min Gao; [email protected] Received 12 August 2013; Revised 10 December 2013; Accepted 30 December 2013; Published 19 February 2014 Academic Editor: Xing-Gang Yan Copyright © 2014 Min Gao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Personalized recommendation systems have been widely used as an effective way to deal with information overload. The common approach in the systems, item-based collaborative filtering (CF), has been identified to be vulnerable to “Shilling” attack. To improve the robustness of item-based CF, the authors propose a novel CF approach based on the mostly used relationships between users. In the paper, three most commonly used relationships between users are analyzed and applied to construct several user models at first. The DBSCAN clustering is then utilized to select the valid user model in accordance with how the models benefit detecting spam users. The selected model is used to detect spam user group. Finally, a detection-based CF method is proposed for the calculation of item-item similarities and rating prediction, by setting different weights for suspicious spam users and normal users. The experimental results demonstrate that the proposed approach provides a better robustness than the typical item-based kNN (k Nearest Neighbor) CF approach. 1. Introduction (orranks,weights)ofspamusers[15] made up by an attacker less than those of normal users, the antiattack ability of Nowadays, personalized recommendation systems have been recommendation systems would be improved. widely used as an effective way to help people cope with There are several kinds of relationships between the information overload [1, 2]. It automatically adjusts, restruc- users usually used in item-based CF, such as similarities tures, and presents tailored information for individuals by andcorrelations.Inthispaper,anapproachbasedonthese analyzing user information, creating one-to-one relationship, or understanding user needs in different contexts [3–6]. Until relationships is proposed to calculate the relative weights of now, CF is the most popular approach used in personalized users and to improve the attack resistant ability of typical recommendation systems. Approaches for CF recommenda- item-based CF approaches further. The proposed approach tioncanbegroupedintotwogeneralclasses[7–11]: user-based is constructed by the following four steps: three kinds of and item-based. relationships between users are selected to construct user Both the typical user-based and item-based CF approach- models; a density-based clustering algorithm is then used to es, however, suffer from “Shilling” attacks [12]becauseusers select the best user model; the model is then applied to detect of online systems can multiply their profiles and identities spam users; the detection results are incorporated into an nearly indefinitely. Thus, the systems that depend on such approach for the calculation of item-item similarities and rat- profiles would be subject to control by an attacker bent on ing prediction. Finally, the experimental results illustrate that making the system recommend as he or she desires [12– the proposed approach is able to provide a better robustness 17]. It is a common knowledge that some users’ ratings in (thestabilityofpredictionandhitratio)than(1)amostlyused recommendation systems are more valuable than those of item-based kNN CF (similarity-based CF) recommendation others. If there is an approach that makes the credit ratings approach and (2) other robust recommendation approaches. 2 Mathematical Problems in Engineering IF I0 IS IT characteristics: (1) :allitemsin are the most popular items that are assigned to max (()=max);(2) :allitems F F 0 0 S S T T i1 ···ik i1 ···il i1 ···im i1 ··· in in areassignedtorandom values that are in line with nor- F S mal distribution (( ) = V);(3) :allitems (i ) ···(iF) ···(iS) ···(i ) T ··· T 1 k Null Null 1 m (i1 ) (in ) in are assigned to max (( )=max). Thesegmentattackmodelisdesignedtopushanitemto Figure 1: The general form of an attack profile. a targeted group (segment) of users with known or easily pre- dicted preferences [22]. It has the following characteristics: (1) :allitemsin areassignedtomax (()=max);(2) : The rest of this paper is organized as follows: Section 2 all items in are assigned to min (( )=min);(3) :all presents the background of item-based CF approaches and items in are assigned to max (( )=max). their related problems. Section 3 presents the proposed Research in the area of shilling attacks has made sig- methods for how to select user models, how to detect and nificant advances in last years. User-based CF makes rec- mark suspicious spam users and normal users, and how to ommendations by finding peers with preference profiles; calculate item-item similarities and predictions according consequently, the profiles with biased data may result in to the detection. Section 4 presents experimental results of biased recommendations easily. Item-based CF looks for theproposedapproachonMovieLensdatasetandanalyzes items with similar profiles and makes predictions based on a if the approach is effective in comparison with the typical user’s own ratings of the peer items; therefore, the item-based item-based CF approach and other robust recommendation CF also suffers from the attacks. approaches. Section 5 draws conclusions. Random attack and average attack models are successful against the user-based CF algorithms; however, they fall short 2. Background and Associated Problem of of having a significant impact against the item-based CF Item-Based CF Approaches algorithms [13]. The newer models, bandwagon and segment model, are quite successful against item-based CF algorithms CF is the mostly used and most successful recommendation [22].Intheseattackmodels,randomandbandwagonattacks techniquetodate[18–20]. The traditional CF, user-based CF, belong to low knowledge attacks [13] which need minimal is to predict the rating of an item for a target user based on knowledge of recommendation systems and user profiles. the opinions of other like-minded users. It was remarkably For experimental purpose, the bandwagon attack is adopted successful in the past, but some potential challenges have inthepapersinceitisalowknowledgeattackandquite arisen [21]suchasproblemsinscalability,thatmeansthat successful against item-based CF. the computational complexity is growing rapidly with the number of users. The item-based CF has been proved to solve 2.2. Shilling Attack Resistant CF. A number of recent studies the problem [9]. Both the user-based and item-based CF have been focusing on the robust CF, due to the vulner- approaches, however, suffer from “Shilling” attacks. ability of the recommendation systems that are easily to be attacked. O’Donovan and Smyth [23]proposedthatthe 2.1. Shilling Attack Problem. An attack that influences a trustworthiness of users should be taken into consideration recommendation system is to arrange with a group of users, in recommendation systems. Their trust models can improve named shills [20]orspam users [14], to enter the system and the predictive accuracy. Massa and Avesani [24]proposed vouch for items in question. Their ratings are intended to a robust CF approach, also called trust-based CF, based mislead other users. The attacks are, therefore, called shilling on “web of trust.” The approach increases the coverage of attacks (or profile injection attacks [12]). recommendation systems while preserving the quality of An attack consists of a set of attack profiles (also named predictions, especially for new users. However, the predictive attack ratings). An attack model is an approach to construct accuracy and the coverage of recommendation systems are attack profiles. The general form of an attack profile is shown not the essential metrics for robust recommendation systems in Figure 1 [14]. [25]. Zhang [26] proposed a trust-aware CF based on users’ Suppose that there are items in total in a recommenda- multiple interests. He proposed a topic-level trust model and tion system; an attack profile consists of -dimensional vector a CF approach based on the model. The approach improves of ratings. The -dimensional vector can be divided into 4 the robustness of the recommendations. However, all those 0 0 threelevelsofthetrustmodelarebasedonthenumberof sets: , , ,and .Here,=| |+| |+| |+| |=+ user ratings. ++. (1∼ ) is a set of randomly selected filler items. 0 0 0 The relationships and weights among users are essential (1∼ )isasetofunrateditems. (1∼)isasetofselected to a recommendation system. Yu et al. [27]proposeda items which have some relationships with the target items. reputation-based approach for decoding information
Recommended publications
  • Critical Thinking STARS Handout Finalx
    Critical Thinking "It is the mark of an educated mind to be able to entertain a thought without accepting it." - Aristotle "The important thing is not to stop questioning." - Albert Einstein What is critical thinking? Critical thinking is the intellectually disciplined process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or evaluating information gathered from, or generated by, observation, experience, reflection, reasoning, or communication, as a guide to belief and action. In its exemplary form, it is based on universal intellectual values that transcend subject matter divisions: clarity, accuracy, precision, consistency, relevance, sound evidence, good reasons, depth, breadth, and fairness. A Critical Thinker: Asks pertinent questions Assess statements and arguments Is able to admit a lack of understanding or information Has a sense of curiosity Is interested in finding new solutions Examines beliefs, assumptions and opinions and weighs them against facts Listens carefully to others and can give effective feedback Suspends judgment until all facts have been gathered and considered Look for evidence to support assumptions or beliefs Is able to adjust beliefs when new information is found Examines problems closely Is able to reject information that is irrelevant or incorrect Critical Thinking Standards and Questions: The most significant thinking (intellectual) standards/questions: • Clarity o Could you elaborate further on that point? o Could you give me an example? o Could you express
    [Show full text]
  • Critical Thinking for the Military Professional
    Document created: 17 Jun 04 Critical Thinking For The Military Professional Col W. Michael Guillot “Any complex activity, if it is to be carried on with any degree of virtuosity, calls for appropriate gifts of intellect and temperament …Genius consists in a harmonious combination of elements, in which one or the other ability may predominate, but none may be in conflict with the rest.”1 In a previous article on Strategic leadership I described the strategic environment as volatile, uncertain, complex, and ambiguous (VUCA). Additionally, that writing introduced the concept of strategic competency.2 This article will discuss the most important essential skill for Strategic Leaders: critical thinking. It is hard to imagine a Strategic leader today who does not think critically or at least uses the concept in making decisions. Critical thinking helps the strategic leader master the challenges of the strategic environment. It helps one understand how to bring stability to a volatile world. Critical thinking leads to more certainty and confidence in an uncertain future. This skill helps simplify complex scenarios and brings clarity to the ambiguous lens. Critical thinking is the kind of mental attitude required for success in the strategic environment. In essence, critical thinking is about learning how to think and how to judge and improve the quality of thinking—yours and others. Lest you feel you are already a great critical thinker, consider this, in a recent study supported by the Kellogg Foundation, only four percent of the U.S. organizational
    [Show full text]
  • Recent Work in Relevant Logic
    Recent Work in Relevant Logic Mark Jago Forthcoming in Analysis. Draft of April 2013. 1 Introduction Relevant logics are a group of logics which attempt to block irrelevant conclusions being drawn from a set of premises. The following inferences are all valid in classical logic, where A and B are any sentences whatsoever: • from A, one may infer B → A, B → B and B ∨ ¬B; • from ¬A, one may infer A → B; and • from A ∧ ¬A, one may infer B. But if A and B are utterly irrelevant to one another, many feel reluctant to call these inferences acceptable. Similarly for the validity of the corresponding material implications, often called ‘paradoxes’ of material implication. Relevant logic can be seen as the attempt to avoid these ‘paradoxes’. Relevant logic has a long history. Key early works include Anderson and Belnap 1962; 1963; 1975, and many important results appear in Routley et al. 1982. Those looking for a short introduction to relevant logics might look at Mares 2012 or Priest 2008. For a more detailed but still accessible introduction, there’s Dunn and Restall 2002; Mares 2004b; Priest 2008 and Read 1988. The aim of this article is to survey some of the most important work in the eld in the past ten years, in a way that I hope will be of interest to a philosophical audience. Much of this recent work has been of a formal nature. I will try to outline these technical developments, and convey something of their importance, with the minimum of technical jargon. A good deal of this recent technical work concerns how quantiers should work in relevant logic.
    [Show full text]
  • Computational Advantages of Relevance Reasoning in Bayesian Belief Networks
    342 Computational Advantages of Relevance Reasoning in Bayesian Belief Networks Yan Lin Marek J. Druzdzel University of Pittsburgh University of Pittsburgh Intelligent Systems Program Department of Information Science Pittsburgh, PA 1.5260 and Intelligent Systems Program [email protected] Pittsburgh, PA 15260 marek@sis. pitt. edu Abstract reasoning, shown to be NP-hard both for exact infer­ ence [Cooper, 1990] and for approximate [Dagurn. and This paper introduces a computational Luby, 1993] inference. framework for reasoning in Bayesian belief The critical factor in exact inference schemes is the networks that derives significant advantages topology of the underlying graph and, more specifi­ from focused inference and relevance reason­ cally, its connectivity. The complexity of approximate ing. This framework is based on d-separation schemes may, in addition, depend on factors like the and other simple and computationally effi­ a-priori likelihood of the observed evidenee or asymme­ cient techniques for pruning irrelevant parts tries in probability distributions. There are a number of a network. Our main contribution is a of ingeniously efficient algorithms that allow for fast technique that we call relevance-based decom­ belief updating in moderately sized models.2 Still, position. Relevance-based decomposition ap­ eaeh of them is subject to the growth in complexity proaches belief updating in large networks that is generally exponential in the size of the model. by focusing on their parts and decompos­ Given the promise of the decision-theoretic approach ing them into partially overlapping subnet­ and an increasing number of its practical applications, works. This makes reasoning in some in­ it is important to develop schemes that will reduce the tractable networks possible and, in addition, computational complexity of inference.
    [Show full text]
  • John P. Burgess Department of Philosophy Princeton University Princeton, NJ 08544-1006, USA [email protected]
    John P. Burgess Department of Philosophy Princeton University Princeton, NJ 08544-1006, USA [email protected] LOGIC & PHILOSOPHICAL METHODOLOGY Introduction For present purposes “logic” will be understood to mean the subject whose development is described in Kneale & Kneale [1961] and of which a concise history is given in Scholz [1961]. As the terminological discussion at the beginning of the latter reference makes clear, this subject has at different times been known by different names, “analytics” and “organon” and “dialectic”, while inversely the name “logic” has at different times been applied much more broadly and loosely than it will be here. At certain times and in certain places — perhaps especially in Germany from the days of Kant through the days of Hegel — the label has come to be used so very broadly and loosely as to threaten to take in nearly the whole of metaphysics and epistemology. Logic in our sense has often been distinguished from “logic” in other, sometimes unmanageably broad and loose, senses by adding the adjectives “formal” or “deductive”. The scope of the art and science of logic, once one gets beyond elementary logic of the kind covered in introductory textbooks, is indicated by two other standard references, the Handbooks of mathematical and philosophical logic, Barwise [1977] and Gabbay & Guenthner [1983-89], though the latter includes also parts that are identified as applications of logic rather than logic proper. The term “philosophical logic” as currently used, for instance, in the Journal of Philosophical Logic, is a near-synonym for “nonclassical logic”. There is an older use of the term as a near-synonym for “philosophy of language”.
    [Show full text]
  • A Collaborative Filtering Approach for Recommending OLAP Sessions Julien Aligon, Enrico Gallinucci, Matteo Golfarelli, Patrick Marcel, Stefano Rizzi
    A collaborative filtering approach for recommending OLAP sessions Julien Aligon, Enrico Gallinucci, Matteo Golfarelli, Patrick Marcel, Stefano Rizzi To cite this version: Julien Aligon, Enrico Gallinucci, Matteo Golfarelli, Patrick Marcel, Stefano Rizzi. A collaborative filtering approach for recommending OLAP sessions. Decision Support Systems, Elsevier, 2015, pp.20. 10.1016/j.dss.2014.11.003. hal-01170959 HAL Id: hal-01170959 https://hal.archives-ouvertes.fr/hal-01170959 Submitted on 2 Jul 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Collaborative Filtering Approach for Recommending OLAP Sessions Julien Aligon a, Enrico Gallinucci b, Matteo Golfarelli b, Patrick Marcel a;∗, Stefano Rizzi b aLaboratoire d'Informatique { Universit´eFran¸coisRabelais Tours, France bDISI, University of Bologna, Italy Abstract While OLAP has a key role in supporting effective exploration of multidimensional cubes, the huge number of aggregations and selections that can be operated on data may make the user experience disorientating. To address this issue, in the paper we propose a recommendation approach stemming from collaborative filter- ing. We claim that the whole sequence of queries belonging to an OLAP session is valuable because it gives the user a compound and synergic view of data; for this reason, our goal is not to recommend single OLAP queries but OLAP sessions.
    [Show full text]
  • Respecting Relevance in Belief Change
    David C. Makinson and George Kourousias Respecting relevance in belief change Article (Accepted version) (Refereed) Original citation: Makinson, David C. and Kourousias, George (2006) Respecting relevance in belief change. Análisis Filosófico, 26 (1). pp. 53-61. ISSN 0326-1301 © 2006 Sociedad Argentina de Análisis Filosófico This version available at: http://eprints.lse.ac.uk/56812/ Available in LSE Research Online: May 2014 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Users may download and/or print one copy of any article(s) in LSE Research Online to facilitate their private study or for non-commercial research. You may not engage in further distribution of the material or use it for any profit-making activities or any commercial gain. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. This document is the author’s final accepted version of the journal article. There may be differences between this version and the published version. You are advised to consult the publisher’s version if you wish to cite from it. RESPECTING RELEVANCE IN BELIEF CHANGE DAVID MAKINSON AND GEORGE KOUROUSIAS Abstract. In this paper dedicated to Carlos Alchourr´on, we review an issue that emerged only after his death in 1996, but would have been of great interest to him: To what extent do the formal operations of AGM belief change respect criteria of relevance? A natural (but also debateable) criterion was proposed in 1999 by Rohit Parikh, who observed that the AGM model does not always respect it.
    [Show full text]
  • Ambiguity in Argument Jan Albert Van Laar*
    Argument and Computation Vol. 1, No. 2, June 2010, 125–146 Ambiguity in argument Jan Albert van Laar* Department of Theoretical Philosophy, University of Groningen, Groningen 9712 GL, The Netherlands (Received 8 September 2009; final version received 11 February 2010) The use of ambiguous expressions in argumentative dialogues can lead to misunderstanding and equivocation. Such ambiguities are here called active ambiguities. However, even a normative model of persuasion dialogue ought not to ban active ambiguities altogether, one reason being that it is not always possible to determine beforehand which expressions will prove to be actively ambiguous. Thus, it is proposed that argumentative norms should enable each participant to put forward ambiguity criticisms as well as self-critical ambiguity corrections, inducing them to improve their language if necessary. In order to discourage them from nitpicking and from arriving at excessively high levels of precision, the parties are also provided with devices with which to examine whether the ambiguity corrections or ambiguity criticisms have been appropriate. A formal dialectical system is proposed, in the Hamblin style, that satisfies these and some other philosophical desiderata. Keywords: active ambiguity; argument; critical discussion; equivocation; persuasion dialogue; pseudo-agreement; pseudo-disagreement 1. Introduction Argumentative types of dialogue can be hampered by expressions that are ambiguous or equivocal. A participant can show dissatisfaction with such ambiguities by disambiguating the formulations he has used or by inciting the other side to improve upon their formulations. A typical example can be found in the case where W.B. had been arrested both for drink and driving and for driving under suspension.
    [Show full text]
  • The Relevance of the Wrong Kind of Reasons
    THE RELEVANCE OF THE WRONG KIND OF REASONS ULRIKE HEUER UNIVERSITY OF LEEDS “Let us weigh the gain and the loss involved in wagering that God exists. Let us estimate these two probabilities; if you win, you win all; if you lose, you lose nothing. Wager then, without hesitation, that He does exist.” (Blaise Pascal, Pensées) That you win doesn’t seem the right kind of reason for believing that God exists, even if Pascal is right that you stand to lose nothing, but you may gain a lot.1 It seems to be a reason of the wrong kind. There is currently a wide-ranging philosophical discussion of two kinds of reasons for attitudes such as belief, which are sometimes called the right and wrong kinds of reasons for those attitudes. The question is what the distinction shows about the nature of the attitudes, and about reasons and normativity in general. The distinction is deemed to apply to reasons for different kinds of attitudes such as beliefs and intentions, as well as so-called pro- attitudes, e.g. admiration or desire. Wlodek Rabinowicz’s and Toni Rønnow-Rasmussen’s paper “The Strike of the Demon” (2004) forged the shape and structure of the current discussion. Their focus is on the fitting-attitude theory of value (henceforth: FA theory), a version of which is (as they see it) the so-called ‘buck-passing account’2, the view that the value of an object consists in the fact that it has properties other than that of being valuable which provide reasons for pro-attitudes.
    [Show full text]
  • THE LOOICAL ATOMISM J. D. MACKENZIE Date Submitted Thesis
    THE LOOICAL ATOMISM OF F. P. RAMSEY J. D. MACKENZIE Date submitted Thesis submitted for the Degree of Master of Arts in the School of Philosophy University of New South Wales (i) SYNOPSIS The first Chapter sets Ramsey in histor:iealperspective as a Logical Atomist. Chapter Two is concerned with the impasse in which Russell found himself ,d.th general propositions, Wittgenstein's putative solution in terms of his Doctrine of Showing, and Ramsey's "Wittgensteinian" solution, which is not satisfactory. An attempt is then ma.de to describe a Ramseian solution on the basis of what he says about the Axiom of Infi- nity, and to criticize this solution. In Chapter Three Ramsay's objections to the Pl4 definition of identity are considered, and consequences of his rejection of that definition for the Theory of Classes and the Axiom of Choice are drawn. In Chapter Four, Ramsey•s modifications to Russell's Theory of Types are discussed. His division of the Paradoxes into two groups is defended, but his redefinition of 'predicative' is rejected. Chapter Five deals with Ra.msey's analysis of propositional attitudes and negative propositions, and Chapter Six considers the dispute between Russell and Ramsey over the nature and status of universals. In Chapter Seven, the conclusions are summarized, and Ramsay's contribution to Logical Atom.ism are assessed. His main fail­ ing is found to be his lack of understanding of impossibility, especially with regard to the concept of infinity. (ii) PREFACE The thesis is divided into chapters, which are in turn divided into sections.
    [Show full text]
  • Relevance Models for Collaborative Filtering
    Relevance Models for Collaborative Filtering Relevance Models for Collaborative Filtering Proefschrift ter verkrijging van de graad van doctor aan de Technische Universiteit Delft, op gezag van de Rector Magnificus prof.dr.ir. J. T. Fokkema, voorzitter van het College voor Promoties, in het openbaar te verdedigen op maandag 7 april 2008 om 12:30 uur door Jun Wang MSc in Computer Science from National University of Singapore, Singapore, Bachelor in Electrical Engineering from Southeast University, China, geboren te Jiangsu, China. Dit proefschrift is goedgekeurd door de promotor: Prof.dr.ir. M.J.T. Reinders Toegevoegd promotor: Dr.ir. A.P. de Vries Samenstelling promotiecommissie: Rector Magnificus, voorzitter Prof.dr.ir. M.J.T. Reinders, Technische Universiteit Delft, promotor Dr.ir. A.P. de Vries, CWI, toegevoegd promotor Prof.dr.ir. G. Jongbloed, Technische Universiteit Delft Prof.dr. S.E. Robertson, Microsoft Research, Cambridge, UK Prof.dr.ir. M. van Steen, Vrije Universiteit Prof.dr. B. Berendt, Katholieke Universiteit Leuven, Belgium Dr.ir. D. Hiemstra, Universiteit Twente Advanced School for Computing and Imaging This work was carried out in the ASCI graduate school; ASCI dissertation series number 158. The research reported in this thesis was financed by the CACTUS and I-Share projects. ISBN 978-90-9022932-4 Copyright c 2007 by Jun Wang All rights reserved. No part of the material protected by this copyright notice may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the copyright owner. The Master said, “When I walk along with two others, they may serve me as my teachers.
    [Show full text]
  • The Effect of Usability and Information Quality on Decision Support
    ial Scien oc ce S s d J n o u a r s n t a r l Atta, Arts Social Sci J 2017, 8:2 A Arts and Social Sciences Journal DOI: 10.4172/2151-6200.1000257 ISSN: 2151-6200 Research Article OMICS International The Effect of Usability and Information Quality on Decision Support Information System (DSS) Atta MT* Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia *Corresponding author: Atta MT, Faculty of Computer System and Software Engineering, Universiti Malaysia Pahang, Kuantan, Pahang, Malaysia, Tel: +60-9-4245000; E-mail: [email protected] Received date: February 20, 2017; Accepted date: March 22, 2017; Published date: March 28, 2017 Copyright: © 2017 Atta MT. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Abstract Decision-making is complex process that involves people and information system. A Decision Support Systems (DSS) is a set of specific class of computerized information systems that support decision making activities of businesses and organizations. There are certain factors that affect the performance of DSS such as information quality and usability of these systems. This study aims to introduce the concept of usability and information quality in general and examining their effects on the DSS. The study found that both usability and information quality have strong effect on the output of any information system and in particular DSS. The study recommended that the developers of information systems must pay high attention to develop the content provided by IS before process them by DSS as well as they ensure DSS is easy to use and get required information to support decision making process, for example the developers should focus on easy navigation through the system, good interface and reaching information in proper time.
    [Show full text]