Paweł Weichbroth

Paweł Weichbroth
Gdansk University of Technology · Department of Software Engineering

PhD

About

108
Publications
110,800
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
945
Citations

Publications

Publications (108)
Preprint
Full-text available
Usability evaluation has received considerable attention from both the research and practice communities. While there are many evaluation tools available, the Software Usability Scale (SUS) is the most widely used. In this paper, we introduce and describe the SUS-Lib software package, which aims to compute SUS scores and generate graphical figures...
Preprint
Full-text available
This paper introduces Mov-Avg, the Python software package for time series analysis that requires little computer programming experience from the user. The package allows the identification of trends, patterns, and the prediction of future events based on data collected over time. In this regard, the Mov-Avg implementation provides three indicators...
Article
Full-text available
The complexity and number of data streams generated by internal processes exceed the capabilities of most current simulation environments. Consequently, there is a need for the development of more advanced solutions that can handle any number of simultaneous simulations. One of the most promising ideas to address these and other challenges is the c...
Book
Full-text available
Report of the Greencoin project identification and implementation strategy, preliminary study, project results, implementation guidelines directed to the European city representatives, educators, urban activists. The Greencoin project benefited from a grant of €2,05 million received from Iceland, Liechtenstein and Norway under the EEA Funds and th...
Article
Full-text available
According to the European Society of Cardiology, globally the number of patients with heart failure nearly doubled from 33.5 million in 1990 to 64.3 million in 2017, and is further projected to increase dramatically in this decade, still remaining a leading cause of morbidity and mortality. One of the most frequently applied heart failure classific...
Article
Full-text available
To date, significant progress has been made in the field of railway anomaly detection using technologies such as real-time data analytics, the Internet of Things, and machine learning. As technology continues to evolve, the ability to detect and respond to anomalies in railway systems is once again in the spotlight. However, railway anomaly detecti...
Article
Full-text available
Less than five percent of all mobile applications have become successful throughout 2023. The success of a new mobile application depends on a variety of factors ranging from business understanding, customer value, and perceived quality of use. In this sense, the topic of usability testing of mobile applications is relevant from the point of view o...
Article
Full-text available
The construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole. The existing research on construction accidents heavily relies on expert evaluations, which often suffer from issues such as low efficiency, insuffici...
Article
Full-text available
Mobile devices have become an integral part of the digital ecosystem, connecting people, businesses, and information around the world in ways never before possible. In particular, smartphones, tablets and other handheld devices equipped with mobile applications have changed every aspect of our lives. Today, a user can choose from nearly five millio...
Conference Paper
Full-text available
In traditional business intelligence (BI) settings, the collective decision-making process is often hindered by the absence of knowledge and expertise exchange among various stakeholders, as well as lack of information sharing. The study delves into the concept of Collaborative BI, which aims to overcome these limitations by promoting collaboration...
Article
Full-text available
Cognitive bias is a phenomenon that has been extensively studied in stock trading and many other fields. This paper presents a framework for a Mobile Stock Trading Simulator (MSTS) that facilitates automatic investment in stocks with minimal human influence, by investigating the behavioral patterns and cognitive errors of stock market investors. Th...
Article
Full-text available
For a growing number of software projects, continuous integration (CI) techniques are becoming an essential part of the process. However, the maturity of their adoption in open source projects varies. In this paper, we present an empirical study on GitHub repositories to explore the use of continuous integration techniques in open source projects....
Conference Paper
Full-text available
The paper presents a survey-based study that aimed to determine the prevalence of anti-patterns in the Scrum software development methodology. A total of 35 anti-patterns were selected from the literature review, and 42 respondents working in software development organizations located in Poland indicated whether they had encountered each anti-patte...
Article
Full-text available
Background: In the context of Warehouse Management Systems, knowledge related to motion trajectory prediction methods utilizing machine learning techniques seems to be scattered and fragmented. Objective: This study seeks to fill this research gap by using a systematic literature review approach. Methods: Based on the data collected from Google Sch...
Article
Full-text available
The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-...
Article
Full-text available
Railways deliver a safe and sustainable form of transport and are typically pointed as one the safest form of transportation. Nevertheless, train accidents still happen, and when they happen, the consequences concern serious fatalities and injuries. Since every case is unique, the most frequent causes of train accidents are mechanical derailments,...
Book
Full-text available
This conference aims to broaden our understanding of various aspects of information and communication technologies (ICT) and information systems (IS) in the context of innovations in sustainable development. The primary focus is on emerging age-based digital divides that are also detectable in the labor market, violated – due to broad technology de...
Article
Full-text available
Research, development and innovation (RDI) projects are undertaken in order to improve existing, or develop new, more efficient products and services. Moreover, the goal of innovation is to produce new knowledge through research, and disseminating it through education and training. In this line of thinking, this paper reports and discusses the less...
Article
Full-text available
In the area of broadband wireless Internet, mobile applications have already replaced their desktop equivalents and are recognized as valuable tools for any size of businesses and for private use. With the emergence of millions of apps, the quality of their interaction with the user remains an open question for software vendors. While female and ma...
Poster
Full-text available
The importance of social media is continuously growing, demonstrating its reputation for human development, especially during local and worldwide crises. Social media applications have created new opportunities and challenges concerning their design, usage, and impact on society, organizations, and individuals. The successful application of social...
Article
Full-text available
This study compares the results of two completely different models: statistical one (ARIMA) and deep learning one (LSTM) based on a chosen set of NASDAQ data. Both models are used to predict daily or monthly average prices of chosen companies listed on the NASDAQ stock exchange. Research shows which model performs better in terms of the chosen inpu...
Article
Full-text available
Affective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a...
Article
Full-text available
Agile methodologies, along with the corresponding tools and practices, are claimed to facilitate teams in managing their work more effectively and conducting their work more efficiently while fostering the highest quality product within the constraints of the budget. Therefore, the rate of awareness and adoption of Agile frameworks both within and...
Research Proposal
Full-text available
The significance of the “human factor” is beginning to dawn on so􀀶ware vendors, and though difficult and intangible to measure by nature, the human factor is starting to be seen for what it is: the core of an information system (IS). Yet, in many cases, the collaboration and communication with the users is still ineffective or simply neglected. No...
Chapter
Based on literature review, we introduce an acceptance model (m-BIAM) on behavioral intention and use mobile Business Intelligence solutions. We identified a set of five factors, namely: Perceived Value, Perceived Ease of Use, Managerial Attitudes, Facilitating Conditions and Quality of Information, and specified their inter-relationships. Full tex...
Poster
Full-text available
This conference aims to broaden our understanding of various aspects of information and communication technologies (ICT) and information systems (IS) in the context of innovations in sustainable development. The primary focus is on emerging age-based digital divides that are also detectable in the labor market, violated – due to broad technology de...
Conference Paper
Full-text available
Factors affecting mobile business intelligence (m-BI) acceptance and use have become an increasingly important topic in practice due to the growing complexity of organizations, and their underlying information systems (IS). Since, one can notice considerable interest in m-BI, however, to the best of our knowledge few studies (if any) aim to synthes...
Preprint
Factors affecting mobile business intelligence (m-BI) acceptance and use have become an increasingly important topic in practice due to the growing complexity of organizations, and their underlying information systems (IS). Since, one can notice considerable interest in m-BI, however, to the best of our knowledge few studies (if any) aim to synthes...
Conference Paper
Full-text available
A worker's performance and productivity depend on a variety of factors including knowledge, to be essential for self-effectiveness and self-efficacy. In the literature, knowledge transfer is argued to enhance the quality of work, and therefore, its value. When addressing this issue, the latest studies have considered and evaluated the use of mobile...
Chapter
Full-text available
Since the education sector is associated with highly dynamic business environments which are controlled and maintained by information systems, recent technological advancements and the increasing pace of adopting artificial intelligence (AI) technologies constitute a need to identify and analyze the issues regarding their implementation in educatio...
Conference Paper
Full-text available
The massive destruction of the natural environment is rapidly eroding the world's capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles-understood in terms of both proenvironmental behaviors and green selfimage on the one hand, and to build sustain able local and global communiti...
Chapter
Leading technologies are very attractive for students preparing their theses as the completion of their studies. Such an orientation of students connected with professional experiences seems to be a crucial motivator in the research in the management and business areas where these technologies condition the development of professional activities. T...
Article
Full-text available
Context: Widespread use of agile software development (ASD) methods can be observed nowadays. Non-functional requirements (NFRs) are often reported to be a problematic issue for agile projects, since ASD methods tend to neglect NFRs while focusing on incremental delivery of functional features. Despite that, only very few studies have explored the...
Preprint
Full-text available
Since the education sector is associated with highly dynamic business environments which are controlled and maintained by information systems, recent technological advancements and the increasing pace of adopting artificial intelligence (AI) technologies constitute a need to identify and analyze the issues regarding their implementation in educatio...
Chapter
Full-text available
Agile Software Development methods have become a widespread approach used by the software industry. Non-functional requirements (NFRs) are often reported to be a problematic issue for such methods. We aimed to identify (within the context of Agile projects): (1) the issues (challenges and problems) reported as affecting the implementation of NFRs;...
Article
Full-text available
Intelligent technologies are widely implemented in different areas of modern society but specific approaches should be applied in services. Basic relationships refer to supporting customers and people responsible for services offering for these customers. The aim of the paper is to analyze and evaluate the state-of-the art of artificial intelligenc...
Article
Full-text available
Among many global challenges, climate change is one of the biggest challenges of our times. While it is one of the most devastating problems humanity has ever faced, one question naturally arises: can individuals make a difference? We believe that everyone can contribute and make a difference to the community and lives of others. However, there is...
Article
Full-text available
Communicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a lit...
Book
Full-text available
Nowadays, information and communication technologies (ICT) are a significant part of the modern economy, especially in countries in the process of political and economic transition. However, socioeconomic development is not possible without digital innovation. Novel ICT-solutions support different countries to improve their business competitiveness...
Chapter
Knowledge Management as an area of education is still a big challenge for teachers and practitioners. Nevertheless, there are several useful teaching methods in active education, especially oriented towards courses where innovation and delivering dynamic knowledge are critical. The goal of the paper is to present and discuss criteria relevant in th...
Article
Full-text available
Since the release of the first mobile devices, the usability of on-board applications has been the concern not only of software vendors but hardware manufacturers as well. The academia community later willingly joined the discussion on usability in terms of theory and empirical measurement, having experience and knowledge in desktop settings. At fi...
Conference Paper
Full-text available
The variety of hardware devices and the diversity of their users imposes new requirements and expectations on designers and developers of mobile applications (apps). While the Internet has enabled new forms of communication platform, online stores provide the ability to review apps. These informal online app reviews have become a viral form of elec...
Chapter
Undeniably, in this rapidly changing world some knowledge granules change over time. Tracking these changes seems to be one of the most crucial processes in knowledge management. Every potential change is a result of knowledge adoption and application to solve a given problem or task in particular domains. However, there is a lack of a model that p...
Chapter
In this paper, we raise a discussion on the results of an empirical study of the impact of internal and external usability on knowledge transfer by the means of mobile technologies. Firstly, based on an extensive literature review and analysis, we have identified both technology acceptance and usability models with their associated variables, along...
Conference Paper
Full-text available
Researchers in subject matter literature present a significant number of factors influencing on intention to use particular technologies. The vast number of technology acceptance determinants highlights that it is important to classify and group them and indicate existing interrelations. Many articles prove that variables connected with usability a...
Conference Paper
Full-text available
Mobile applications design and development have brought a new setting of requirements expected by their users. Among them usability plays a major role in their perception of the quality of use. However, the majority of studies conceptualize usability attributes for mobile applications by only providing formal definitions, neglecting explicit qualit...
Article
Ontologies facilitate concise communication across applications and people, by means of precisely defined terms that provide a shared and common understanding. However, typically, the development of an ontology entails the commitment of multiple users and requires significant skills and knowledge in this area. To face this problem, in this paper we...
Article
Full-text available
Researchers in subject matter literature present a significant number of factors influencing on intention to use particular technologies. The vast number of technology acceptance determinants highlights that it is important to classify and group them and indicate existing interrelations. Many articles prove that variables connected with usability a...
Conference Paper
The amount of information available even on a single web server can be huge. On the other hand, the amount of visitors (users) can often reach a number of at least six digits. Users vary in gender, age and education, and in consequence their information needs are different. Moreover, they subconsciously expect to get more adequate content after vis...
Conference Paper
Full-text available
Communication by electronic mail (e-mail), onceextravagant, is now the usual way to exchange data and in-formation. Widely accepted by Internet users, business andgovernments, it is claimed to be the key part of the e-revolution.E-mail systems have been successfully implemented in almost allcomputer-aided domains of human interest, providing effici...
Conference Paper
Full-text available
Software usability plays a major role in the quality perceived by its users. However, a variety of definitions and associated attributes shows that there is still no consensus in this area. The overall purpose of this paper is to present the results of a critical and rigorous literature review, the aim of which is to demonstrate all the relevant us...
Article
On the surface, one might think that revealing the factors that impact on software product usability and the success of an entire project would be relatively simple; however, reported evidence from practitioners and scholars frequently shows the opposite. The aim of this study was to determine factors with a positive (negative) impact on delivering...
Chapter
At any point of human activity, knowledge and expertise are a key factors in understanding and solving any given problem. In present days, computer systems have the ability to support their users in an efficient and reliable way in gathering and processing knowledge. In this chapter we show how to use Cognitum Ontorion system in this areas. In firs...
Article
Full-text available
The amount of information available even on a single web server can be huge. On the other hand, the amount of visitors (users) can often reach a number of at least six digits. Users vary in gender, age and education, and in consequence their information needs are different. Moreover, they subconsciously expect to get more adequate content after vis...
Article
Full-text available
Knowledge is still considered to be power and its externalization makes it possible for others to use that power. In this paper, we examine the theory of brainstorm-ing, and the claim by father Alex Osborn that in a group session an individual can think of twice as many ideas than working alone. In the context of requirements elicitation, we perfor...
Conference Paper
Effective user requirements elicitation is a key factor for the success of software development projects. There are many qualitative and quantitative research studies that promulgate particular methods and show the application of user requirements elicitation in particular domains. However, few try to eliminate the burden of ambiguity in gathered d...
Conference Paper
Full-text available
Effective project management requires the development of a realistic plan which aims to ensure the success of the project and ultimately deliver a high quality product to customers. However, experience shows that the majority of software vendors managing projects suffer from numerous problems to provide usability in IT solutions and complete a proj...
Conference Paper
Full-text available
In this paper we present the results of a study that aims to evaluate the usability of three selected web services, based on eye–tracking and thinking aloud techniques. The gathered comments and observations, recapitulated and supported by particular measures, allow us to discover and describe typical user behavior pertaining to given tasks to solv...
Conference Paper
Nowadays, we face a huge amount of data and information sharing on the Web by different users worldwide. A multidimensional perspective in describing a university ontology seems to be very important for the modelling of higher education resources. This paper proposes a multi-dimensional knowledge model, designed to distribute and manage knowledge r...
Research
Full-text available
Niniejszy artykuł to przegląd dostępnych technik eksploracji danych w Microsoft SQL 2005. Został opublikowany na stronach Technet dostawcy ww. oprogramowania w 2008 roku.
Article
Full-text available
Currently, forinteractive applications their usability and ergonomics of the user interface(UI)arecritical factorsfor achieving users’ acceptance. Thus, from the perspective of the end-user,success of the entire software development project depends on the quality of the interactionbetween user and system. Therefore, it is necessary to involveprojec...
Chapter
Niniejszy rozdział to analiza (studium) przypadku linii lotniczych Continental Airlines w kontekście wdrożenia hurtowni danych.
Chapter
Niniejszy rozdział to analiza (studium) przypadku linii lotniczych Continental Airlines w kontekście wdrożenia systemu zarządzania relacjami z klientami.
Chapter
Niniejszy rozdział to analiza (studium) przypadku linii lotniczych Continental Airlines w kontekście zbioru funkcjonalności technologii informatycznych dedykowanych zarządzaniu wiedzą.
Chapter
Full-text available
Streszczenie: Wraz ze wzrostem populacji miasta dotykają złożone problemy. Skalę problemu ilustrują liczby: w 2008 r. na terenach zurbanizowanych żyło ponad 50% światowej populacji, czyli ok. 3,3 mld ludzi, zaś do 2030 r. prognozuje się wzrost liczby ich mieszkańców do ok. 5 mld. Jedną z koncepcji poprawy warunków życia jest koncepcja smart city (S...
Conference Paper
Full-text available
If knowledge can create problems, it is not through ignorance that we can solve them. " (Isaac Asimov). Nevertheless, at any point of human activity, knowledge (besides practice) is a key factor in understanding and solving any given problem. Nowadays, computer systems have the ability to support their users in an efficient and reliable way. In thi...
Conference Paper
Full-text available
Nowadays we face a huge amount of data and information sharing on the Web by different users worldwide. For example, the academic environment is one of such places where teachers share and manage knowledge for groups of students. This paper proposes a multi-dimensional knowledge space model, designed to distribute and manage knowledge resources eff...
Chapter
Full-text available
Idea jaką jest SmartCity jest na tyle nowa, iż trudno znaleźć kompleksowy i w pełni działający system obejmujący wszystkich jego interesariuszy oraz ich wymagania względem niego – rozumianego jako przedsięwzięcie, a nie system informatyczny. Obecnie prowadzonych jest wiele projektów o których można powiedzieć, iż są to projekty „wyspowe” - obejmują...
Conference Paper
Full-text available
Współczesne instytucje korzystają z zasobów informacyjnych i szeroko pojmowanej wiedzy w sposób naturalny, traktując je jako kategorie globalne i powszechnie dostępne. W tym kontekście istotna dla rozwoju cywilizacyjnego wydaje się być koncepcja tzw. wiedzy sieciowej (ang. knowledge grid), która integrując odpowiednie zasoby, pogłębia szansę na aut...
Chapter
Information society with huge number of everyday acting participants becomes valuable source of surfer behavior research. Especially web server logs can be used for discovering knowledge useful in different areas. Knowledge acquired from web server logs in order to generate solutions has to be validated. The aim of this paper is presentation of web...
Conference Paper
Full-text available
Information society with huge number of everyday acting participants becomes valuable source of surfer behavior research. Especially web server logs can be used for discovering knowledge useful in different areas. Knowledge acquired from web server logs in order to generate solutions has to be validated. The aim of this paper is presentation of web...
Conference Paper
Full-text available
Continued growth of user number and size of shared content on Web sites cause the necessity of automatic adjusting content to users' needs. In the literature of Web Mining, such actions are referred to personalization and recommendation which led to improve the visibility of presented content. To perform adequacy actions which correspond to the exp...
Conference Paper
Internet resources as life environment of modern society with huge number of more or less conscious participants should be adjusted in terms of forms as well as content to users' needs. Knowledge acquired from web server logs in order to generate has to be validated. The aim of this paper is presentation of web usage mining as a quest for the knowl...
Chapter
Full-text available
An association rule in data mining is an implication of the form A→B where A is a set of antecedent items and B is a set of consequent items. In other words, it is defined on items which reflect the many-to-many relationships among items. Visualization has a quite long history of making large data sets better accessible using different techniques....
Chapter
Full-text available
Aktywność użytkowników korzystających z zasobów portali internetowych zapisywana jest w plikach logów serwera WWW. W celu odkrycia i analizy wzorców zachowań takich użytkowników, dane z surowych plików loga należy poddać przetwarzaniu wstępnemu. W niniejszym artykule przeprowadzono badanie złożone z dwóch etapów. W pierwszym z nich znajdowane są w...
Chapter
Aktywność użytkowników korzystających z zasobów portali internetowych zapisywana jest w plikach logów serwera WWW. W celu odkrycia i analizy wzorców zachowań takich użytkowników, dane z surowych plików loga należy poddać przetwarzaniu wstępnemu. W niniejszym artykule przeprowadzono badanie złożone z dwóch etapów. W pierwszym z nich znajdowane są w...
Chapter
Full-text available
Data is a key component of developing Expert System for market basket analysis. Getting data safely stored, analyzed and updated in databases is a crucial factor for discovering knowledge and its quality. This article presents a logical data model which is going to be implemented in a physical environment. We started off by gathering system’s requi...
Conference Paper
Full-text available
In this paper we introduce a Web Usage Mining (WUM) system, which transparently and dynamically generates content (links) and structure (layout) of the web portal for anonymous visitor. To this purpose we make use of the two software concepts: Multi-Agent and Expert System simultaneously. Multi-Agent system is responsible for discovering knowledge...
Article
Full-text available
In the article the Cross- and Up-selling marketing techniques were presented in the spectrum of e-commerce. Their aim is to raise both the value of a single sales transaction and confidence as well as to lower the risk of ta king the customers by the competitors. In the article iterative client service model was presented, indicating particular...
Chapter
The goal of this article is to briefly present CSDM Model which is being used in Atos Origin. In its context, there are generally described key processes which can be distinguished in the presented model in Polish Branch Office. Firstly, authors give a short description of PDCA model which is the fundament of principle activities. The next section...
Conference Paper
This paper presents a novel approach to discovering association rules from market basket data. For this purpose there has been elaborated the expert system with inference engine, visualisation engine and knowledge base. After a sort foreword, in general extent, a description of the system’s components is given. Then, the functionality of inference...
Article
Niniejsza artykuł opisuje zastosowanie reguł asocjacyjnych w analizie koszyka zakupów. Na wstępie została podana definicja przytoczonego pojęcia, łącznie z przykładami aplikacji komputerowych w których została ona zaimplementowana. W całej pracy autor przytacza ekonomiczne korzyści z zastosowania analizy podobieństw przez sieci sklepów detalicznych...
Chapter
Full-text available
In the article the Cross- and Up-selling marketing techniques were presented in the spectrum of e-commerce. Their aim is to raise both the value of a single sales transaction and confidence as well as to lower the risk of taking the customers by the competitors. In the article iterative client service model was presented, indicating particular role...