<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Contents</string-name>
        </contrib>
      </contrib-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Alexander Felfernig, Juha Tiihonen, and Paul Blazek, Editors
Proceedings of the 1st International Workshop on Personalization &amp; Recommender Systems in
Financial Services
April 16, 2015, Graz, Austria
Alexander Felfernig, Graz University of Technology, Austria</p>
      <p>Juha Tiihonen, University of Helsinki, Finland</p>
      <p>Paul Blazek, cyLEDGE, Austria</p>
    </sec>
    <sec id="sec-2">
      <title>Program Committee</title>
    </sec>
    <sec id="sec-3">
      <title>Organizational Support</title>
      <p>Martin Stettinger, Graz University of Technology, Austria
Personalization and recommendation technologies provide the basis for applications that are
tailored to the needs of individual users. These technologies play an increasingly important
role for financial service providers. The selection of papers of this year’s workshop
demonstrates the wide range of techniques including contributions on knowledge-based
recommender systems, case-based reasoning, knowledge interchange, psychological
aspects of recommender systems in financial services, MediaWiki-based recommendation
technologies, smart data analysis and big data, and campaign customization.
The workshop is of interest for both, researchers working in the various fields of
personalization and recommender systems as well as for industry representatives. It
provides a forum for the exchange of ideas, evaluations, and experiences. As such, this
year's workshop on “Personalization &amp; Recommender Systems in Financial Services” aims at
providing a stimulating environment for knowledge-exchange among academia and industry
and thus building a solid basis for further developments in the field.</p>
      <p>Alexander Felfernig, Juha Tiihonen, and Paul Blazek
Smart Data Analysis for Financial Services (invited talk)
Mathias Bauer
Conflict Management in Interactive Financial Service Selection
Alexander Felfernig and Martin Stettinger
An Integrated Knowledge Engineering Environment for Constraint-based Recommender
Systems
Stefan Reiterer
A Personal Data Framework for Exchanging Knowledge about Users in New Financial
Services
Beatriz San Miguel, Jose M. del Alamo and Juan C. Yelmo
Human Computation Based Acquisition Of Financial Service Advisory Practices
Alexander Felfernig, Michael Jeran, Martin Stettinger, Thomas Absenger,
Thomas Gruber, Sarah Haas, Emanuel Kirchengast, Michael Schwarz, Lukas Skofitsch,
and Thomas Ulz
Case-based Recommender Systems for Personalized Finance Advisory (invited talk)
Cataldo Musto and Giovanni Semeraro
PSYREC: Psychological Concepts to enhance the Interaction with Recommender
Systems
Gerhard Leitner
1—2
3—10
11—18
19—26
27—34
35—36
Smart Data Analysis for Financial Services</p>
      <p>Mathias Bauer1
Abstract.1 This talk addresses opportunities for the application of
intelligent data analysis techniques at various stages of the value
added chain for financial services. After introducing some basic
notions and explaining the fundamental steps of data mining, we
will have a closer look at various recent and ongoing projects and
discuss issues of practical relevance such as data quality and expert
knowledge. The talk concludes with some remarks on the potential
impact of new developments, e. g. in the context of Big Data.
Data mining – this notion will be used as a synonym for all kinds
of smart data analysis – is a complex process that aims at turning
raw data into actionable knowledge (see Figure 1 which depicts a
standard process model). We will introduce the basic notions,
discuss the various steps and in particular have a closer look at the
choices to be made and a few pitfalls to be avoided.</p>
      <p>In particular, we will address the crucial aspects of how to
choose an appropriate modeling approach and how to assess the
quality of a solution found by a data analyst.</p>
      <p>We show that in many cases it is not a good idea to simply
apply the data analyst's favorite modeling technique. Instead we
describe the various dimensions of such a choice and encourage the
end users of a data analysis to clearly state their requirements.
2</p>
      <sec id="sec-3-1">
        <title>SAMPLE APPLICATIONS</title>
        <p>Data Analysis can (and should) play a central role at various stages
of the value added chain in the financial industry. In the following
we will have a closer look at some relevant activities in this
context.
2.1</p>
      </sec>
      <sec id="sec-3-2">
        <title>Appraisal of real economic goods</title>
        <p>Scoring and rating processes are at the heart of financial industry.
Here we will demonstrate an approach to appraise vessels as
typical representatives of real economic goods which form an
important class of investments.
There are numerous aspects that can make a customer particularly
interesting to a company – his/her interest in certain products,
credit-worthiness and default risk, churn rate etc. We describe an
integrated approach to identify these individuals that reduces the
marketing effort required while simultaneously improving the
company's insight into their customer base and the quality of
customer contact.</p>
        <p>In particular, we will see how the modeling technique applied
affects the usefulness of the analytical findings.
From an abstract point of view, selecting a relevant set of stocks is
similar to the previous task as it mainly involves segmentation and
classification efforts. However, we will see that data preprocessing
in this case is significantly more complex and requires some
advanced expert knowledge.
3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Perspective</title>
        <p>Big data is more than a buzzword – even if it's not the silver bullet
for all problems ahead. We will discuss various techniques and
attempts to commercially make use of huge, largely unstructured
data sets and briefly discuss potential future applications.</p>
        <p>Page 2</p>
        <sec id="sec-3-3-1">
          <title>Alexander Felfernig1</title>
          <p>and</p>
        </sec>
        <sec id="sec-3-3-2">
          <title>Martin Stettinger1</title>
          <p>
            Abstract. Knowledge-based systems are often used to support
search and navigation in a set of financial services. In a typical
process users are defining their requirements and the system selects and
ranks alternatives that seem to be appropriate. In such scenarios
situations can occur in which requirements can not be fulfilled and
alternatives (repairs) must be proposed to the user. In this paper we
provide an overview of model-based diagnosis techniques that can
be applied to indicate ways out from such a ”no solution could be
found” dilemma. In this context we focus on scenarios from the
domain of financial services.
1
Knowledge-based systems such as recommenders [
            <xref ref-type="bibr" rid="ref18 ref2 ref28 ref44">2, 18</xref>
            ] and
configurators [
            <xref ref-type="bibr" rid="ref32 ref35 ref54 ref6 ref9">6, 9, 28</xref>
            ] are often used to support users (customers) who are
searching for solutions fitting their wishes and needs. These systems
select and also rank alternatives of relevance for the user. Examples
of such applications are knowledge based recommenders that support
users in the identification of relevant financial services [
            <xref ref-type="bibr" rid="ref10 ref11 ref36 ref37">10, 11</xref>
            ] and
configurators that actively support service configuration [
            <xref ref-type="bibr" rid="ref12 ref20 ref38 ref46">12, 20</xref>
            ].
          </p>
          <p>
            The mentioned systems have the potential to improve the
underlying business processes, for example, by reducing error rates in the
context of order recording and by reducing time efforts related to
customer advisory. Furthermore, customer domain knowledge can
be improved by recommendation and configuration technologies;
through the interaction with these systems customers gain a deeper
understanding of the product domain and – as a direct consequence
– less efforts are triggered that are related to the explanation of basic
domain aspects. For a detailed overview of the advantages of
applying such technologies we refer the reader to [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ].
          </p>
          <p>When interacting with knowledge-based systems, situations can
occur where no recommendation or configuration can be identified.</p>
          <p>In order to avoid inefficient manual adaptations of requirements,
techniques can be applied which automatically determine repair
actions that allow to recover from an inconsistency. For example, if
a customer is interested in financial services with high return rates
but at the same time does not accept risks related to investments, no
corresponding solution will be identified.</p>
          <p>There are quite different approaches to deal with the so-called no
solution could be found dilemma – see Table 1. In the context of
1 Applied Software Engineering, Institute for Software Technology,</p>
          <p>
            Graz University of Technology, Austria, email: ffelfernig,
stettingerg@ist.tugraz.at.
this paper we will focus on the application of the concepts of
modelbased diagnosis [
            <xref ref-type="bibr" rid="ref31 ref5 ref53">27, 5</xref>
            ]. A first application of model-based diagnosis
to the automated identification of erroneous constraints in
knowledge bases is reported in Bakker et al. [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ]. In their work the
authors show how to model the task of identifying faulty constraints
in a knowledge base as a diagnosis task. Felfernig et al. [
            <xref ref-type="bibr" rid="ref34 ref8">8</xref>
            ] extend
the approach of Bakker et al. [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ] by introducing concepts that
allow the automated debugging of (configuration) knowledge bases
on the basis of test cases. If one or more test cases fail within the
scope of regression testing, a diagnosis process is activated that
determines a minimal set of constraints in such a way that the deletion
of these constraints guarantees that each test case is consistent with
the knowledge base. Model-based diagnosis [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ] relies on the
existence of conflict sets which represent minimal sets of inconsistent
constraints. Conflict sets can be determined by conflict detection
algorithms such as QUICKXPLAIN [
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ].
          </p>
          <p>
            Beside the automated testing and debugging of inconsistent
knowledge bases, model-based diagnosis is also applied in situations
where the knowledge base per se is consistent but a set of customer
requirements induces an inconsistency. Felfernig et al. [
            <xref ref-type="bibr" rid="ref34 ref8">8</xref>
            ] also sketch
an approach to the application of model-based diagnosis to the
identification of minimal sets of fault requirements. Their approach is
based on breadth-first search that uses diagnosis cardinality as the
only ranking criteria.
          </p>
          <p>A couple of different approaches to the determination of
personalized diagnoses for inconsistent requirements have been proposed.</p>
          <p>
            DeKleer [
            <xref ref-type="bibr" rid="ref30 ref4">4</xref>
            ] introduces concepts for the probability-based
identification of leading diagnoses. O’Sullivan et al. [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ] introduce the concept
of representative explanations (diagnosis sets) where each existing
diagnosis element is contained in at least one diagnosis of a
representative set of diagnoses. Felfernig et al. [
            <xref ref-type="bibr" rid="ref13 ref39">13</xref>
            ] show how to integrate
basic recommendation algorithms into diagnosis search and with this
to increase the prediction quality (in terms of precision) of
diagnostic approaches. Felfernig et al. [
            <xref ref-type="bibr" rid="ref14 ref40">14</xref>
            ] extend this work and compare
different personalization approaches with regard to their prediction
quality and the basis of real-world datasets. Based on the concepts of
QUICKXPLAIN, Felfernig et al. [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ] introduced FASTDIAG which
improves the efficiency of diagnosis search by omitting the
calcualation of conflicts as a basis for diagnosis calculation. This diagnostic
approach is also denoted as direct diagnosis [
            <xref ref-type="bibr" rid="ref17 ref43">17</xref>
            ]. The applicability
of FASTDIAG has also been shown in SAT solving scenarios [
            <xref ref-type="bibr" rid="ref23 ref49">23</xref>
            ].
          </p>
          <p>Different types of knowledge-based systems have already been
applied to support the interactive selection and configuration of
fi</p>
          <p>Topic</p>
          <p>Foundations of model-based diagnosis
Conflict detection and model-based diagnosis of inconsistent</p>
          <p>constraint satisfaction problems (CSPs)</p>
          <p>Regression testing and automated debugging of configuration
knowledge bases using model-based diagnosis (breadth-first search)</p>
          <p>Identification of minimal diagnoses for user requirements for the</p>
          <p>purpose of consistency preservation (breadth-first search)
Identification of preferred minimal conflict sets on the basis of a</p>
          <p>divide-and-conquer based algorithm (QUICKXPLAIN)
Identification of representative explanations (each existing diagnosis
element is contained in at least one diagnosis of the result set)</p>
          <p>Identification of personalized diagnoses on the basis of</p>
          <p>recommendation algorithms</p>
          <p>Probability based identification of leading diagnoses
Identification of preferred minimal diagnoses on the basis of a</p>
          <p>
            divide-and-conquer based algorithm (FASTDIAG)
Preferred minimal diagnoses for SAT based knowledge representations
Reiter 1987 [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ], DeKleer
          </p>
          <p>
            et al. 1992 [
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ]
Bakker et al. 1993 [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ]
Felfernig et al. 2004 [
            <xref ref-type="bibr" rid="ref34 ref8">8</xref>
            ]
          </p>
          <p>
            Junker 2004 [
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ]
O’Sullivan et al. 2007 [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ]
Felfernig et al. 2009,2013
          </p>
          <p>
            [
            <xref ref-type="bibr" rid="ref13 ref14 ref39 ref40">13, 14</xref>
            ]
          </p>
          <p>
            DeKleer 1990 [
            <xref ref-type="bibr" rid="ref30 ref4">4</xref>
            ]
Felfernig et al. 2012 [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ]
Marques-Silva et al. 2013
[
            <xref ref-type="bibr" rid="ref23 ref49">23</xref>
            ]
nancial services. Fano and Kurth [
            <xref ref-type="bibr" rid="ref33 ref7">7</xref>
            ] introduce an approach to the
visualization and planning of financial service portfolios. The
simulation is based on an integrated model of a human’s household and
interdependencies between different financial decisions. Felfernig et
al. [
            <xref ref-type="bibr" rid="ref10 ref11 ref36 ref37">10, 11</xref>
            ] show how to apply knowledge-based recommender
applications for supporting sales representatives in their dialogs with
customers. Major improvements that can be expected from such an
approach are less errors in the offer phase and more time for
additional customer meetings. An approach to apply the concepts of
cased-based reasoning [
            <xref ref-type="bibr" rid="ref21 ref47">21</xref>
            ] for the purpose of recommending
financial services is introduced by Musto et al. [
            <xref ref-type="bibr" rid="ref24 ref50">24</xref>
            ].
          </p>
          <p>The major focus of this paper is to provide an overview of
techniques that help to recover from inconsistent situations in an
automated fashion. In this context we show how inconsistencies can be
identified and resolved. The major contributions of this paper are the
following: (1) we provide an overview of error identification and
repair techniques in the context of financial services recommendation
and configuration. (2) We show how diagnosis and repair techniques
can be applied on the basis of different knowledge representations
(CSPs as well as table-based representations). (3) We provide an
outlook of major issues for future work.</p>
          <p>
            The remainder of this paper is organized as follows. In Section
2 we introduce basic definitions of a constraint satisfaction problem
(CSP) and a corresponding solution. On the basis of these
definitions we introduce a first working example from the financial
services domain. Thereafter (in Section 3) we introduce a basic
definition of a diagnosis task and show how diagnoses and repairs for
inconsistent user requirements can be determined. In Section 4 we
switch from constraint-based to table-based knowledge
representations where (personalized) solutions are determined on the basis of
conjunctive queries [
            <xref ref-type="bibr" rid="ref13 ref39">13</xref>
            ]. In Section 5 we provide one further
example of consistency management in the loan domain. In Section 6 we
discuss issues for future work. With Section 7 we conclude the paper.
2
          </p>
          <p>
            Constraint-based Representations
Constraint Satisfaction Problems (CSPs) [
            <xref ref-type="bibr" rid="ref16 ref22 ref42 ref48">16, 22</xref>
            ] are successfully
applied in many industrial scenarios such as scheduling [
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ],
configuration [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ], and recommender systems [
            <xref ref-type="bibr" rid="ref18 ref44">18</xref>
            ]. The popularity of this
type of knowledge representation can be explained by the small set
of representation concepts (only variables, related domains, and
constraints have to be defined) and the still high degree of expressivity.
          </p>
          <p>Definition 1 (Constraint Satisfaction Problem (CSP) and
Solution). A constraint satisfaction problem (CSP) can be defined as a
triple (V; D; C) where V = fv1; v2; :::; vng represents a set of
variables, dom(v1); dom(v2); :::; dom(vn) represents the
corresponding variable domains, and C = fc1; c2; :::; cmg represents a set of
constraints that refer to corresponding variables and reduce the
number of potential solutions. A solution for a CSP is defined by an
assignment A of all variables in V where A is consistent with the
constraints in C.</p>
          <p>Usually, user requirements are interpreted as constraints
CREQ = fr1; r2; :::; rqg where ri represent individual user
requirements. In this paper we assume that the constraints in C are
consistent and inconsistencies are always induced by the constraints
in CREQ. If such a situation occurs, we are interested in the
elements of CREQ which are responsible for the given inconsistency.</p>
          <p>
            On the basis of a first example we will now provide an overview of
diagnosis techniques that can be used to recover from such
inconsistent situations. An example of a CSP in the domain of financial
services is the following. For simplicity we assume that each
variable has the domain flow, medium, highg.
of HSDAG construction (an example is depicted in Figure 1). In the
context of our example of C and CREQ, a first minimal conflict set
that could be returned by an algorithm such as QUICKXPLAIN [
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ]
is CS1 : fr1; r3g.
          </p>
          <p>V = fav; wr; rrg
dom(av) = dom(wr) = dom(rr) = flow; medium; highg
C = fc1 : :(av = high^wr = high); c2 : :(wr = low^rr =
high); c3 : :(rr = high ^ av = high)g
An overview of the variables of this CSP is given in Table 2.</p>
          <p>variable
av
wr
rr
description
availability
willingness to take risks
expected return rate
ri 2 CREQ
r1 : av = high
r2 : wr = low
r3 : rr = high</p>
          <p>In addition to this basic CSP definition we introduce an example
set of customer requirements CREQ = fr1 : av = high; r2 : wr =
low; r3 : rr = highg which is inconsistent with the constraints
defined in C. On the basis of this simplified financial service
knowledge base defined as a CSP we will now show how inconsistencies
induced by customer requirements can be identified and resolved.
3</p>
          <p>Diagnosis &amp; Repair of Inconsistent Constraints
In our working example, the requirements CREQ and the set of
constraints C are inconsistent, i.e., inconsistent(CREQ [ C). In
such situations we are interested in a minimal set of requirements
that have to be deleted or adapted such that consistency is restored.</p>
          <p>Consistency resolution is in many cases based on the resolution of
conflicts. In our case, a minimal conflict is represented by a minimal
set of requirements in CREQ that have to be deleted or adapted such
that consistency can be restored.</p>
          <p>Definition 2 (Conflict Set). A conflict set CS is a subset of CREQ
s.t. inconsistent (CS [ C). A conflict set is minimal if there does
not exist another conflict set CS0 with CS0 CS. A minimal
cardinality conflict set CS is a minimal conflict set with the additional
property that there does not exist another minimal conflict CS0 with
jCS0j &lt; jCSj.</p>
          <p>
            Minimal conflict sets can be determined on the basis of
conflict detection algorithms such as QUICKXPLAIN [
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ]. They can be
used to derive diagnoses. In our case, a diagnosis represents a
set of requirements that have to be deleted from CREQ such that
C [ (CREQ ) is consistent, i.e., diagnoses help to restore the
consistency between CREQ and C.
          </p>
          <p>Definition 3 (Diagnosis Task and Diagnosis). A diagnosis task can
be defined as a tuple (C; CREQ) where C represents a set of
constraints in the knowledge base and CREQ represents a set of
customer requirements. is a diagnosis if CREQ [C is consistent.</p>
          <p>A diagnosis is minimal if there does not exist a diagnosis 0 with</p>
          <p>0 . Furthermore, is a minimal cardinality diagnosis if there
does not exist a diagnosis 0 with j 0j &lt; j j.</p>
          <p>
            A standard approach to the determination of diagnoses is based on
the construction of a hitting set directed acyclic graph (HSDAG) [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ]
where minimal conflict sets are successively resolved in the process
          </p>
          <p>There are two possibilities of resolving CS1, either by
deleting requirement r1 or by deleting requirement r3. If we delete r3
(see Figure 1), we managed to identify the first minimal diagnosis</p>
          <p>1 = fr3g which is also a minimal cardinality diagnosis. The
second option to resolve CS1 is to delete r1. In this situation, another
conflict exists in CREQ, i.e., a conflict detection algorithm would
return CS2 : fr2; r3g. Again, there are two possibilities to resolve
the conflict (either by deleting r2 or by deleting r3). Deleting r3 leads
to a diagnosis which is not minimal since fr3g itself is already a
diagnosis. Deleting r2 leads to the second minimal diagnosis which is
2 = fr1; r2g.</p>
          <p>The diagnoses 1 and 2 are indicators of minimal changes that
need to be performed on the existing set of requirements such that
a consistency between CREQ and C can be restored. The issue of
finding concrete repair actions for the requirements contained in a
diagnosis will be discussed later in this paper.</p>
          <p>
            There can be quite many alternative diagnoses. In this context it
is not always clear which diagnosis should be selected or in which
order alternative diagnoses should be shown to the user. In the
following we present one approach to rank diagnoses. The approach we
sketch is based on multi-attribute utility theory [
            <xref ref-type="bibr" rid="ref55">29</xref>
            ] where we assume
that customers provide weights for each individual requirement. In
the example depicted in Table 3, two customers specified their
preferences in terms of weights for each requirement. For example,
customer 1 specified a weight of 0.7 for the requirement r3 : rr = high,
i.e., the attribute rr is of highest importance for the customer. These
weights can be exploited for ranking a set of diagnoses.
          </p>
          <p>Formula 1 can be used for determining the overall importance
(imp) of a set of requirements (RS). The higher the importance the
lower the probability that these requirements are element of a
diagnosis shown to the customer. Requirement r3 has a high importance
for customer 1, consequently, the probability that r3 is contained in
a diagnosis shown to customer 1 is low.</p>
          <p>imp(RS) = importance(RS) =
r2RS weight(r)
(1)</p>
          <p>Formula 2 can be used to determine the relevance of a partial or
complete (minimal) diagnosis, i.e., this formula can be used to rank
weight(r1 : av = high)
0.1
0.3
diagnoses with regard to their relevance for the customer. The higher
the relevance of a diagnosis, the higher the ranking of the diagnosis
in a list of diagnoses shown to the customer.</p>
          <p>rel( ) = relevance( ) = importa1nce( ) (2)</p>
          <p>Tables 4 and 5 show the results of applying Formulae 1 and 2 to
the customer preferences (weights) shown in Table 3. For customer
1 (see Table 4), diagnosis 2 = fr1; r2g has the highest relevance.</p>
          <p>For customer 2 (see Table 5), diagnosis 1 = fr3g has the highest
relevance. Consequently, diagnosis 2 is the first one that will be
shown to customer 1 and diagnosis 1 is the first one that will be
shown to customer 2.</p>
          <p>diagnosis j</p>
          <p>1 : fr3g
2 : fr1; r2g
importance( j )
0.7
0.3</p>
          <p>
            On the basis of the relevance values depicted in Table 4, Figure 2
depicts a HSDAG [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ] with additional annotations regarding
diagnosis relevance (rel). The higher the relevance of a (partial) diagnosis,
the higher the ranking of the corresponding diagnosis.
          </p>
          <p>
            The afore discussed approaches to diagnosis determination are
based on the construction of a HSDAG [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ]. Due to the fact that
conflicts have to determined explicitly when following this approach,
diagnosis determination does not scale well [
            <xref ref-type="bibr" rid="ref13 ref14 ref39 ref40">13, 14</xref>
            ]. The FASTDIAG
algorithm [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ] tackles this challenge by determining minimal and
preferred diagnoses without the need of conflict detection. This
algorithm has shown to have the same predictive quality as HSDAG
based algorithms that determine diagnoses in a breadth-first search
regime. The major advantage of FASTDIAG is a high-performance
diagnosis search for the leading diagnoses (first-n diagnoses).
          </p>
          <p>FASTDIAG is based on the principle of divide and conquer – see
Figure 3: if a set of requirements CREQ is inconsistent with a
corresponding set of constraints C and the first part fr1; r2; :::; rk=2g
of CREQ is consistent with C then diagnosis search can focus on
frk=2+1; :::; rkg, i.e., can omit the requirements in fr1; r2; :::; rk=2g.</p>
          <p>
            A detailed discussion of FASTDIAG can be found in [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ].
          </p>
          <p>Determination of Repair Actions. Repair actions for diagnosis
elements can be interpreted as changes to the originial set of
requirements in CREQ in such a way that at least one solution can be
identified. If we assume that CREQ is a set of unary constraints that
are inconsistent with C and is a corresponding diagnosis, then a
set of repair actions R = fa1; a2; :::; alg can be identified by the
consistency check CREQ [ C where aj (a variable assignment)
is a repair for the constraint rj if rj is in .</p>
          <p>In this section we took a look at different approaches that support
the determination of diagnoses in situations where a given set of
requirements becomes inconsistent with the constraints in C. In the
following we will take a look at an alternative knowledge
representation where tables (instead of CSPs) are used to represent knowledge
return rate p.a. (rr)
4.2
4.7
4.8
5.2
4.3
5.6
6.7
7.9
about financial services. Again, we will show how to deal with
inconsistent situations.
4</p>
          <p>
            Table-based Representations
In Section 3 we analyzed different ways of diagnosing inconsistent
CSPs [
            <xref ref-type="bibr" rid="ref16 ref22 ref42 ref48">16, 22</xref>
            ]. We now show how diagnosis can be performed on
a predefined set of solutions, i.e., a table-based representation.
Table 6 includes an example set of investment products. The set of
financial services f1; 2; :::; 8g is stored in an item table T [
            <xref ref-type="bibr" rid="ref13 ref39">13</xref>
            ] –
T can be interpreted as an explicit enumeration of the possible
solutions (defined by the set C in Section 2). Furthermore, we
assume that the customer has specified a set of requirements CREQ
= fr1 : rr 5:5; r2 : rt = 3:0; r3 : acc = yes; r4 : bc = yesg.
          </p>
          <p>The existence of a financial service in T that is able to fulfill all
requirements can be checked by a relational query [CREQ]T where
CREQ represents a set of selection criteria and T represents the
corresponding product table.</p>
          <p>An example query on the product table T could be [rr 5:5]T
which would return the financial services f6,7,8g. For the query</p>
          <p>[r1;r2;r3;r4]T there does not exist a solution. In such situations we
are interested in finding diagnoses that indicate minimal sets of
requirements in CREQ that have to be deleted or adapted in order to
be able to identify a solution.</p>
          <p>Definition 4 (Conflict Sets in Table-based Representations). A
conflict set CS is a subset of CREQ s.t. [CS]T returns an empty result
set. Minimality properties of conflict sets are the same as introduced
in Definition 2.</p>
          <p>A diagnosis task and a corresponding diagnosis in the context of
table-based representations can be defined as follows.</p>
          <p>Definition 5 (Diagnosis in Table-based Representations). A
diagnosis task can be defined as a tuple (T ; CREQ) where T represents a
product table and CREQ represents a set of customer requirements.</p>
          <p>is a diagnosis if [CREQ ]T returns at least one solution.
Minimality properties of diagnoses are the same as in Definition 3.</p>
          <p>The requirements rj 2 CREQ are inconsistent with the items
included in T (see Table 6), i.e., there does not exist a
financial service in T that completely fulfills the user requirements in
CREQ. Minimal conflict sets that can be derived for CREQ =
fr1 : rr 5:5; r2 : rt = 3:0; r3 : acc = yes; r4 : bc = yesg
are CS1 : fr1; r2g, CS2 : fr2; r3g, and CS3 : fr1; r4g. The
determination of the corresponding diagnoses is depicted in Figure 4.</p>
          <p>Diagnoses are determined in the same fashion as discussed in
Section 2. Minimal diagnoses that can be derived from the conflict
sets CS1; CS2; and CS3 are 1 : fr1; r2g, 2 : fr1; r3g and
3 : fr2; r4g (see Figure 4).</p>
          <p>Again, the question arises which of the diagnoses has the
highest relevance for the user (customer). Table 7 depicts the importance
distributions for the requirements of our example. Based on the
importance distributions depicted in Table 7 we can derive a preferred
diagnosis (see Figure 5). Diagnosis 3 will be first shown to
customer 1 since 3 has the highest evaluation in terms of relevance
(see Formula 2). The first diagnosis shown to customer 2 is 2.
diagnosis</p>
          <p>j
1 : fr1; r2g
2 : fr1; r3g
3 : fr2; r4g</p>
          <p>Loans: creditworthiness (cw), loan limit (ll), runtime in years (rt), and interest rate (ir).
As a third example we introduce the domain of loans. The entries in
Table 10 represent different loan variants that can be chosen by
customers. Customers can specify their requirements on the basis of the
variables depicted in Table 11. Furthermore, the different loan
variants are characterized by their expected creditworthiness (cw), loan
limit (ll), runtime in yrs. (rt), and interest rate (ir). These variables
are basic elements of the definition of the following Constraint
Satisfaction Problem (CSP).</p>
          <p>variable
ccw
ils
mpp
irt
pir</p>
          <p>V = fccw, ils, mpp, irt, pir, cw, ll, rt, irg
dom(ccw) = dom(cw) = f1,2,3g; dom(ils) = dom(ll) = float;
dom(mpp) = float; dom(irt) = dom(rt) = integer; dom(pir) =
dom(ir) = integer.</p>
          <p>C = fc1 : ccw cw; c2 : ils ls; c3 : irt = rt; c4 : pir
ir; c5 : see below; c6;7 : see belowg</p>
          <p>Constraint c5 represents the entities of Table 10 in disjunctive
normal form, for example, the first table row can be represented as
basic constraint fcw = 1 ^ ll = 30:000 ^ rt = 5:0 ^ ir = 3%g.</p>
          <p>The disjunct of all basic constraints is the disjunctive normal form.</p>
          <p>Constraints c6;7 can be used to avoid situations where the periodical
payments for a loan exceed the financial resources of the customer.</p>
          <p>c6 : mpp
costs(id) + ils
rt</p>
          <p>(3)
c7 : costs(id) = ils ir(id) (rt(id2) + 1) (4)</p>
          <p>For the purpose of our example let us assume that the customer
has the following requirements: CREQ = fr1 : ccw = 3; r2 :
ils = 30:000; r3 : irt = 6yrs:; r4 : pir = 4:5%g. Since the
customer creditworthiness has been evaluated with 3, only three
alternative loan variants are available (the ids 3,6,9). These variants are
depicted in Table 12.</p>
          <p>id
3
6
9
cw
3
3
3</p>
          <p>
            The requirements CREQ include one minimal conflict set which
is CS1 : fr3; r4g. Consequently, there exist two different
possibilities to resolve the conflict: one possibility is to change the value for
the intended runtime (irt) from 6.0 years to 5.0 years and to keep the
preferred interest rate (pir) as is. The other possibility is to change
the preferred interest rate from 4.5% to 6% and to keep the intended
runtime as is. The overall loan costs related to these two alternatives
are depicted in Table 13. If the overall loan costs are a major criteria
then repair alternative 1 would be chosen by the customer, otherwise
– if the upper limit for periodical payments is strict – repair
alternative 2 will be chosen.
A major issue for interactive applications is to guarantee reasonable
response times which should be below one second [
            <xref ref-type="bibr" rid="ref29 ref3">3</xref>
            ]. This goal can
not be achieved with standard diagnosis approaches since they
typically rely on the (pre-)determination of conflict sets. Although
existing divide-and-conquer based diagnosis approaches are significantly
faster when determining only leading (preferred) diagnosis, i.e., not
all diagnoses have to be determined, there is still a need for
improving diagnosis efficiency in more complex settings. In this context,
on research issue is the development of so-called anytime diagnosis
algorithms that help to determine nearly optimal (e.g., in terms of
prediction quality) diagnoses with less computational efforts.
          </p>
          <p>Although the prediction quality of diagnoses significantly
increases and numerous recommendation algorithms have already been
evaluated, there is still a need for further advancing the
state-of-theart in diagnosis prediction. One research direction is to focus on
learning-based approaches that help to figure out which combination
of a set of basic diagnosis prediction methods best performs in the
considered domain. Such approaches are also denoted as
ensemblebased methods which focus on figuring out optimal configurations of
basic diagnosis prediction methods.</p>
          <p>Efficient calculation and high predictive quality are for sure central
issues of future research. Beyond efficiency and prediction quality,
intelligent visualization concepts for diagnoses are extremely
important. For example, the the context of group decision scenarios where
groups of users are in charge of resolving existing inconsistencies in
the preferences between group members, visualizations have to be
identified that help to restore consistency (consensus) in the group
as soon as possible. Such visualizations could focus on visualizing
the mental state on individual group members as well visualizing the
individual decision behavior (e.g., egoism vs. altruism).</p>
          <p>Since CREQ is inconsistent with the constraints in C we could
determine minimal diagnoses as indicators for possible adaptations
in the requirements. A possible criteria for personalizing
diagnosis ranking could be the costs related to a loan (see Formula 4).
7</p>
          <p>
            Conclusions
In this paper we give an overview of existing approaches to
determine diagnoses in situations were no solution can be found. We first
provide an overview of existing related work and then focus on
basic approaches to determine diagnoses in the context of two
knowledge representation formalisms (constraint satisfaction and
conjunctive query based approaches). For explanation purposes we introduce
three different types of financial services as working examples (basic
investment decisions, selection of investment products, and loan
selection). On the basis of these examples we sketch the determination
of (preferred) diagnoses. Thereafter, we provide a short discussion of
open research issues which includes diagnosis efficiency, prediction
quality, and intelligent visualization.
Stefan Reiterer1
Abstract. Constraint-based recommenders support customers in
identifying relevant items from complex item assortments. In this
paper we present a constraint-based environment already deployed in
real-world scenarios that supports knowledge acquisition for
recommender applications in a MediaWiki-based context. This technology
provides the opportunity do directly integrate informal Wiki content
with complementary formalized recommendation knowledge which
makes information retrieval for users (readers) easier and less
timeconsuming. The user interface supports recommender development
on the basis of intelligent debugging and redundancy detection. The
results of a user study show the need of automated debugging and
redundancy detection even for small-sized knowledge bases.
1
Constraint-based recommenders support the identification of relevant
items from large and often complex assortments on the basis of an
explicitly defined set of recommendation rules [
            <xref ref-type="bibr" rid="ref29 ref3">3</xref>
            ]. Example item
domains are digital cameras and financial services [
            <xref ref-type="bibr" rid="ref31 ref34 ref35 ref5 ref8 ref9">5, 8, 9</xref>
            ]. For a long
period of time the engineering of recommender knowledge bases (for
constraint-based recommenders) required that knowledge engineers
are technical experts (in the majority of the cases computer
scientists) with the needed technical capabilities [
            <xref ref-type="bibr" rid="ref14 ref40">14</xref>
            ]. Developments in
the field moved one step further and provided graphical engineering
environments [
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ], which improve the accessibility and
maintainability of recommender knowledge bases. However, users still have to
deal with additional tools and technologies which is in many cases a
reason for not applying constraint-based environments.
          </p>
          <p>Similar to the idea of Wikipedia to allow user communities to
develop and maintain Wiki pages in a cooperative fashion, we
introduce the WEEVIS2 environment, which supports the
communitybased development of constraint-based recommender applications
within a Wiki environment. WEEVIS has been implemented on the
basis of MediaWiki3, which is an established standard Wiki platform.</p>
          <p>
            Compared to other types of recommender systems such as
collaborative filtering [
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ] and content-based filtering [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ], constraint-based
recommender systems are based on an underlying recommendation
knowledge base, i.e., recommendation knowledge is defined
explicitly. WEEVIS is already applied by four Austrian universities (within
the scope of recommender systems courses) and two companies for
the purpose of prototyping recommender applications in the financial
services domain.
1 SelectionArts Intelligent Decision Technologies GmbH, Austria,
          </p>
          <p>email:stefan.reiterer@selectionarts.com
2 www.weevis.org.
3 www.mediawiki.org.</p>
          <p>
            The user interface of the WEEVIS environment provides
intelligent mechanisms that help to make development and
maintenance operations easier. Based on model-based diagnosis techniques
[
            <xref ref-type="bibr" rid="ref12 ref17 ref26 ref38 ref43 ref52">12, 17, 26</xref>
            ], the environment supports users in the following
situations: (1) if no solution could be found for a set of user requirements,
the system proposes repair actions that help to find a way out from
the ”no solution could be found” dilemma; (2) if the constraints in
the recommender knowledge base are inconsistent with a set of test
cases (situation detected within the scope of regression testing of the
knowledge base), those constraints are shown to the users
(knowledge engineers) who are responsible for the faulty behavior of the
knowledge base; (3) if the recommender knowledge base includes
redundant constraints, i.e., constraints that – if removed from the
knowledge base – logically follow from the remaining constraints,
these constraints are also determined in an automated fashion and
shown to knowledge engineers.
          </p>
          <p>The major contributions of this paper are the following. (1) on the
basis of a working example from the domain of financial services,
we provide an overview of the diagnosis and redundancy detection
techniques integrated in the WEEVIS environment. (2) we report the
results of an empirical study which analyzed the usability of
WEEVIS functionalities.</p>
          <p>
            The remainder of this paper is organized as follows. In Section
2 we discuss related work. In Section 3 we present an overview of
the recommendation environment WEEVIS and discuss the included
knowledge engineering support mechanisms. In Section 4 we present
results of an empirical study that show the need of intelligent
diagnosis and redundancy detection support. In Section 5 we discuss issues
for future work, with Section 6 we conclude the paper.
2
Based on original static Constraint Satisfaction Problem (CSP)
represenations [
            <xref ref-type="bibr" rid="ref15 ref20 ref41 ref46 ref55">15, 20, 29</xref>
            ], many different types of constraint-based
knowledge representations have been developed. Mittal and
Falkenhainer [
            <xref ref-type="bibr" rid="ref22 ref48">22</xref>
            ] introduced dynamic constraint satisfaction problems
where variables have an activity status and only active variables
are taken into account by the search process. Stumptner et al. [
            <xref ref-type="bibr" rid="ref54">28</xref>
            ]
introduced the concept of generative constraint satisfaction where
variables can be generated on demand within the scope of solution
search. Compared to existing work, WEEVIS supports the solving of
static CSPs on the basis of conjunctive queries where each solution
corresponds to a result of querying a relational database.
Additionally, WEEVIS includes diagnosis functionalities that help to
automatically determine repair proposals in situations where no solution
could be found [
            <xref ref-type="bibr" rid="ref12 ref38">12</xref>
            ].
          </p>
          <p>
            A graphical recommender development environment for single
users is introduced in [
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ]. This Java-based environment supports the
development of constraint-based recommender applications for
online selling platforms. Compared to Felfernig et al. [
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ], WEEVIS
provides a wiki-based user interface that allows user communities to
develop recommender applications. Furthermore, WEEVIS includes
efficient diagnosis [
            <xref ref-type="bibr" rid="ref12 ref38">12</xref>
            ] and redundancy detection [
            <xref ref-type="bibr" rid="ref13 ref39">13</xref>
            ] mechanisms
that allow the support of interactive knowledge base development.
          </p>
          <p>
            A Semantic Wiki-based approach to knowledge acquisition for
collaborative ontology development is introduced in [
            <xref ref-type="bibr" rid="ref2 ref28">2</xref>
            ]. Compared
to Baumeister et al. [
            <xref ref-type="bibr" rid="ref2 ref28">2</xref>
            ], WEEVIS is based on a recommendation
domain specific knowledge representation (in contrast to ontology
representation languages) which makes the definition of domain
knowledge more accessible also for domain experts. Furthermore,
WEEVIS includes intelligent debugging and redundancy detection
mechanisms which make development and maintenance operations more
efficient. We want to emphasize that intended redundancies can
exist, for example, for the purpose of better understandability of the
knowledge base. If such constraints are part of a knowledge base,
these should be left out from the redundancy detection process.
          </p>
          <p>
            A first approach to a conflict-directed search for hitting sets in
inconsistent CSP definitions was introduced by Bakker et al. [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ]. In
this work, minimal sets of faulty constraints in inconsistent CSP
definitions were identified on the basis of the concepts of model-based
diagnosis [
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ]. In the line of Bakker et al. [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ], Felfernig et al. [
            <xref ref-type="bibr" rid="ref30 ref4">4</xref>
            ]
introduced concepts that allow the exploitation of the concepts of
model-based diagnosis in the context of knowledge base testing and
debugging. Compared to earlier work [
            <xref ref-type="bibr" rid="ref24 ref30 ref4 ref50">4, 24</xref>
            ], WEEVIS provides an
environment for development, testing, debugging, and application of
recommender systems. With regard to diagnosis techniques,
WEEVIS is based on more efficient debugging and redundancy detection
techniques that make the environment applicable in interactive
settings [
            <xref ref-type="bibr" rid="ref12 ref16 ref21 ref38 ref42 ref47">12, 16, 21</xref>
            ].
3
          </p>
          <p>
            The WEEVIS Environment
In it’s current version, WEEVIS supports scenarios where user
requirements can be defined in terms of functional requirements [
            <xref ref-type="bibr" rid="ref23 ref49">23</xref>
            ].
          </p>
          <p>
            The corresponding recommendations (solutions) are retrieved from
a predefined set of alternatives (also denoted as item set or product
catalog). Requirements are checked with regard to their consistency
with the underlying item set (consistency is given if at least one
solution could be identified). If no solution could be found, WEEVIS
repair alternatives are determined on the basis of direct diagnosis
algorithms [
            <xref ref-type="bibr" rid="ref12 ref38">12</xref>
            ]. This way, WEEVIS does not only support item
selection but also consistency maintenance processes on the basis of
intelligent repair mechanisms [
            <xref ref-type="bibr" rid="ref32 ref6">6</xref>
            ].
          </p>
          <p>WEEVIS is based on the idea that a community of users
cooperatively contributes to the development of a recommender
knowledge base. The environment supports knowledge acquisition
processes on the basis of tags that can be used for defining and
testing recommendation knowledge bases. Using WEEVIS, standard
Wikipedia pages can be extended with recommendation knowledge
that helps to represent domain knowledge in a more accessible and
understandable fashion. The same principles used for the developing
Wikipedia pages can also be used for the development and
maintenance of recommender knowledge bases, i.e., in the read mode
recommenders can be executed and in the view source mode
recommendation knowledge can be defined and adapted. This way, rapid
prototyping processes can be supported in an intuitive fashion (changes
to the knowledge can be immediately experienced by switching from
the view source to the read mode). In the read mode, knowledge
bases can as well be tested and in the case of inconsistencies (some
test cases were not fulfilled within the scope of regression testing)
corresponding diagnoses are shown to the user.
The website www.weevis.org provides a selection of different
recommender applications (full list, list of most popular recommenders,
and recommenders that have been defined previously) that can be
tested and extended. Most of these applications have been developed
within the scope of university courses on recommender systems
(conducted at four Austrian universities). WEEVIS recommenders can be
integrated seamlessly into standard Wiki pages, i.e., informally
defined knowledge can be complemented or even substituted with
formal definitions.</p>
          <p>In the following we will present the concepts integrated in the
WEEVIS environment on the basis of a working example from the
domain of financial services. In such a recommendation scenario,
a user has to specify his/her requirements regarding, for example,
the expected capital guarantee level of the financial product or the
amount of money he or she wants to invest. A corresponding
WEEVIS user interface is depicted in Figure 1 where requirements are
specified on the left hand side and the corresponding
recommendations are displayed in the right hand side.</p>
          <p>Each recommendation (item) has a corresponding support value
that indicates the share of requirements that are currently supported
by the item. A support value of 100% indicates that each requirement
is satisfied by the corresponding item. If the support value is below
100%, corresponding repair alternatives are shown to the user, i.e.,
alternative answers to questions that guarantee the recommendation
of at least one item (with 100% support).</p>
          <p>Since WEEVIS is a MediaWiki-based environment, the definition
of a recommender knowledge base is supported in a textual fashion
on the basis of a syntax similar to MediaWiki. An example of the
definition of a (simplified) financial services recommender knowledge
base is depicted in Figure 2. Basic syntactical elements provided in
WEEVIS will be introduced in the next subsection.
Constraint-based recommendation requires the explicit definition of
questions and possible answers, items and their properties, and
constraints (see Figure 2).</p>
          <p>In WEEVIS the tag &amp;QUESTIONS enumerates the set of user
requirements where, for example, pension specifies whether the user
wants a financial product to support his private pension plan [yes, no]
and maxinvestment specifies the amout of money the user wants to
invest. Furthermore, payment represents the frequency in which the
payment should be done [once, periodical], payout specifies the
frequency the customer gets a payout from the financial product (out of
[once,monthly]), and guarantee the expected capital guarantee [low,
high].</p>
          <p>An item assortment can be specified in WEEVIS using the
&amp;PRODUCTS tag (see Figure 2). In our example, the item
(product) assortment is specified by values related to the attributes name;
guaranteep, the capital guarantee the product provides; payoutp, the
payout frequency of the product; mininvestp the minimal amount of
personal data in the PeDF. It interacts with the User Manager
module to obtain the user consent.</p>
          <p>Collector. This module is in charge of obtaining personal data
from external data sources, checking user authorization. It can
also include crawlers’ components that get personal data from
public data sources.</p>
          <p>Registry. It allows the PeDF to store pointers to external
personal data that the PeDF is able to recover from data
sources.</p>
          <p>Generator. It comprises a set of components that allow PeDF
to obtain user models from personal data. These implement
different techniques of user modelling to uncover user needs,
preferences, interests, etc.</p>
          <p>User Data Store. It is a central repository that stores the
personal data that is obtained from external data sources or by
the Generator module. It contains different interfaces that
allow the updating and refreshing of personal data.</p>
          <p>Retriever. This module is in charge of communicating with
data consumers who are interested in obtaining personal data
and user models of a specific user. It interacts with the User
Manager module to check user consent and with the Registry
or User Data Store to retrieve the personal data requested.
4.1</p>
          <p>External data sources
We have considered two private data sources for PeDF validation:
PosdataP2P service, and the social network Facebook.</p>
          <p>
            PosdataP2P service [
            <xref ref-type="bibr" rid="ref17 ref43">17</xref>
            ] is an innovative financial service
developed within the context of a COM project. It allows
Santander University Smart Card (USC) holders to make payments
to or request money from friends, using alternative social channels
such as texting systems e.g. Telegram, or online social networks
e.g. Facebook or Twitter.
          </p>
          <p>The USC is a smart card issued by over 300 universities in
collaboration with Santander Bank. It is used by 7.8 million people
worldwide to access university services, such as libraries, control
access (for example, to computers, campus, sports pavilions, etc.),
electronic signature, discounts at retailers, etc. It can be also used
to gain access to Santander Bank financial services, working as a
credit/debit card linked to the holder’s saving account.</p>
          <p>To use PosdataP2P service, USC holders have to activate the
service first, providing their USC information. Then, they choose
the social channels that they want to use to carry out financial
transactions. Having done that, students can start making financial
transactions by simply posting messages to their friends within
their enabled social channels (Figure 3).</p>
          <p>FRAMEWORK VALIDATION
We have validated the PeDF in a banking scenario which considers
a person-to-person payment service namely PosdataP2P, and the
social network Facebook as data sources. Moreover, it includes a
financial service called FriendLoans that uses user models from the
PeDF to offer its users recommendations about microloans. It is an
integration effort to provide user models that fulfill individual
business needs of third entities. We have focused our work on a
centralized integration based on semantic technologies, which
improve the user modelling process. Moreover, we have validated
the PeDF with five beta testers from our research group.</p>
          <p>Figure 2 represents our validation to the PeDF. Here, we can
observe the two private data sources (PosdataP2P and Facebook),
the data consumer (MicroLoans), the user and the main PeDF
modules that we have validated: User Manager, Collector, User
Data Store, Generators, and Retriever.</p>
          <p>A Personal Socio-Economic Network
The PeDF validation applies a centralized approach where personal
data obtained from external data sources are stored in a central
repository. Specifically, it is based on a semantic modelling and
storing, and an ontology, namely the Personal Socio-Economic
Network (PSEN).</p>
          <p>The PSEN represents the exchange of money between people
and user social data. We have considered the reusing of existing
ontologies, which is a must to allow semantic and syntactic
interoperability. Thus, we have identified the FOAF ontology as
the best alternative for representing people in a social network
context and the SUMO’s financial ontology (using the OWL
version) for representing the financial concepts. We have also
extended them and linked the different socio-economic concepts.</p>
          <p>The nomenclature that we have used to represent the PSEN
concepts is based on SUMO terms so it can be easily related to the
upper ontology.</p>
          <p>Briefly, the PSEN includes the main terms to describe people,
the relationships between them, and the financial data and activities
carried out between them (Figure 4). We represent people as the
Person class from FOAF and we use the corresponding FOAF
properties to describe their user’s demographic information:
firstName, lastName, gender, age, birthday, and mbox (omitted in
Figure 4 for the sake of simplicity). We also made use of the
Online Account class from FOAF that allows the modelling of
different web identities or online accounts of a person. We have
extended it to include online payment and banking accounts. The
former is devoted to service providers that allow users to carry out
payment operations through the Internet, such as PosdataP2P
service. It has associated a BankCard or a Financial Account class
from the SUMO financial ontology that denotes where the payment
will become effective. These classes have a relationship (namely,
cardAccount) since a BankCard is always associated with a
FinancialAccount. On the other hand, the Online Banking Account
class represents online banking services including financial
institutions, such as Santander Bank.</p>
          <p>To model user economic activities, we have defined a
SocialInteraction class within the PSEN ontology. It includes three
main properties: timestamp, channel and patient. The timestamp
and channel properties indicate when and where the social
interaction happens respectively, and patient designates an Entity
that participates in the social interaction, i.e. the money exchange.</p>
          <p>The SocialInteraction class also has two subclasses: Transaction
and Communication that have Payment and Request subclasses
correspondingly. These are related to a hasPayment link that
indicates whether a request for money has been paid.</p>
          <p>In Figure 4, the rounded rectangles characterize the main
concepts and the edges indicate the relationships between two
classes. We have distinguished the terms of the different ontologies
with darker rectangles indicated in the legend of the figure.</p>
          <p>
            Knowledge retrieval
We have validated the retrieval of user knowledge through the
FriendLoans service, which is based on friendsourcing [
            <xref ref-type="bibr" rid="ref57">31</xref>
            ]. It is a
form of crowdsourcing where the user’s social network is
mobilized to achieve a specific objective. Specifically,
FriendLoans relies on the PSEN data to offer financial
recommendations on microloans to raise money from friends. It
has been implemented as a web application in which authenticated
users can ask for money from their friends. Basically, a user
accesses to the service, indicates the money needed (Figure 5 at the
top) and the service provides a list of prospective borrowers who
are trusty, available, and solvent enough to lend (Figure 5 at the
bottom). Figure 5 shows an example of the FriendLoans service for
a user called Maria who needs 200€ from her friends.
          </p>
          <p>Generating a list of friends for a user requires user models that
are unknown to FriendLoans, but can be retrieved from the PeDF.</p>
          <p>The PeDF has incorporated two mechanisms that allow data
consumers to ask for user financial relationships and other banking
information, all with the consent of the user. Specifically, the PeDF
abstracts a set of SPARQL sentences and calls the reasoners which
obtain and derive additional knowledge from the PSEN.</p>
          <p>The SPARQL sentences obtain personal data and user models
directly from the PSEN which can be used by FriendLoans. This
information does not derive facts or inferences under the PSEN
data, just data contained in it. For example, the list of friends for a
specific user, if a person has carried out payments or requests for
money, if a person has received money, if a person has requests for
money and no associated payments, etc.</p>
          <p>As regards the reasoners, they include the mechanisms that
allow the extration of derived data. For this, we have implemented
four custom rules that detect: 1) whether a user knows another user</p>
          <p>A; 2) whether a user owes money to a user A; 3) whether a user has
received a payment greater than X euros; and 4) whether a user has
requests for money with greater amount of money than Y euros. In
the rules, the user A and the amount of money X and Y can be
indicated by FriendLoans to give recommendations to its users. In
this way, for the example shown in Figure 5, A will be the
authenticated user Maria who needs money from her friends, X
and Y could be at least 200€ or the amount wanted by FriendLoans.</p>
          <p>The results obtained from executing these rules are a set of users
that fulfill all conditions. This set is not ordered since the order of
execution of the rules is not predictable in the reasoner. However,
the PeDF has implemented an algorithm that orders the results
including tags that indicate the prioritization.</p>
          <p>The next program listing shows an example of a rule that tags
the results as the most important ones (it is indicated by the tag
isFirstFor) for the user Maria (specified by the second line of the
rule). The conditions of the rule are: 1) a user who has debts with
Maria (defined in a function called hasDebtWith), and 2) a user has
not requested an amount of money greater than 5€ with other
people (defined in a function called possibleProblem).
[isFirst:
(?Maria psen:isTarget “true”^^xs:Boolean)
(?person psen:hasDebtWith psen:Maria)
noValue(?ecAct psen:possibleProblem
“true”^^xs:Boolean)
-&gt; (?person psen:isFirstFor ?Maria)]
4.4</p>
          <p>Identity management and privacy
We have based our identity management infrastructure on OAuth
2.0, as it has become the de facto standard to gain access to
personal data on the Web. The User Manager includes the
component that manages the interaction with external sites.</p>
          <p>Users can currently link their accounts on the PosdataP2P
service and Facebook to the PeDF. The process works as follows:
when a user activates a data source (i.e. Facebook), he is then
redirected to the service provider site to grant the PeDF the
required level of authorization. If successful, the data source
delivers a token that allows access to the user profile.</p>
          <p>As regards privacy, the PeDF has been designed to observe
European privacy and data protection principles following a
privacy-by-design approach. The User Manager is also the key
component here, since it provides users with an identity and
privacy dashboard allowing them to 1) grant/revoke consent to the
collection, processing and disclosure of their personal data, 2)
check the PeDF privacy policies, 3) manage the personal data
known and stored by the PeDF, their sources, and the details on the
disclosures to third parties as well as exercising their right to
access, rectify, erase or block personal data. At the same time, the
User Data Store implements security safeguards to avoid and
mitigate privacy threats derived from malicious attackers or
unwitting users. Finally, as regards the data minimization principle,
the use of reasoners allows third parties to be limited and allows
justified users to be able to query and retrieve that specified and
agreed to by the data subject.
5</p>
          <p>
            RELATED WORK
The PeDF is an ambitious solution that covers four main
technological challenges related to personal data: collection,
integration, retrieval, and identity and privacy management. These
have been widely analyzed separately over time in different
contexts, and we can find many researchers addressing each of
them in depth. For example, the previously cited literature [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ]
includes a study into data integration in business environments, or
[
            <xref ref-type="bibr" rid="ref58">32</xref>
            ] presents the user modelling techniques, its challenges and the
state-of-the-art research, focusing on ubiquitous environments.
          </p>
          <p>
            We can find aligned systems that attempt to solve the same issues
as the PeDF in the personal data context. For example, the
socalled data brokers [
            <xref ref-type="bibr" rid="ref59">33</xref>
            ] are companies that collect personal data on
individual (generally, from public data sources), and resell them to
or share them with third parties. These systems are focused on data
collection and integration, but individuals are generally unaware of
their activities. Otherwise, there are a number of companies and
projects within the initiative called Personal Cloud10. It advocates
the creation of safe places where users have complete control of
their data. The associated solutions address the definition of a new
interaction model between users, service providers, and devices,
where clouds connect voluntarily to services which use stored
personal data. They focus on identity management, encryption,
data storage, cloud computing, as well as other user modelling
works related to reputation. Closely related to these, there are
different identity management systems [
            <xref ref-type="bibr" rid="ref60">34</xref>
            ] that implement
enduser solutions with the goal of making personal data available only
to the right parties, establishing trust between parties involved,
avoiding the abuse of personal data, and making these provisions
possible in a scalable, usable, and cost-effective manner. These
latter solutions do not generally include user modelling techniques.
          </p>
          <p>
            On the other hand, there are also specialized systems, namely
Generic User Modelling Systems [
            <xref ref-type="bibr" rid="ref61">35</xref>
            ] that can serve as a separate
user modelling component to different service providers. They
address issues related to data representation, inferential
capabilities, management of distributed information, or privacy.
          </p>
          <p>
            However, they focus on the reuse of technological user modelling
components rather on the reuse of the personal data and user
models themselves. Finally, there are solutions referred as Personal
Data Store, Personal Data Locker, or Personal Data Vault that
roughly describe the same concept. Generally, these solutions are
based on a central place where the user can save and manage all
their personal data, including data such as text, passwords, images,
video or music [
            <xref ref-type="bibr" rid="ref62">36</xref>
            ]. These solutions have an end-user approach.
          </p>
          <p>To summarize, the aforementioned solutions are rather diverse
from one another, and each of them focuses on a main objective
(i.e., personal data collection, identity management, and data
storage). Our work is an integration effort to provide an end-to-end
solution that aims at incorporating the best solutions for each issue.</p>
          <p>Our first approach is based on integrating social and financial data.</p>
          <p>To the best of our knowledge, this is the first effort in this context.
6</p>
          <p>CONCLUSIONS AND FUTURE WORK
In this paper we have presented a comprehensive framework
intermediating between users and organizations to support the
seamless integration of personal data from several, distributed
sources and generating advanced knowledge on users, to be shared
with interested third parties, all supervised by the users who control
and manage the flow of their personal data. The framework
includes components for personal data collection, integration, and
retrieval, as well as users’ identity and privacy management.</p>
          <p>10 http://personal-clouds.org</p>
          <p>The framework has been validated in a financial context,
integrating social information from Facebook and a
person-toperson payment service, to generate knowledge useful for a
personal lending application.</p>
          <p>Our future work includes advancing on the design of the
privacy-preserving elements required to minimize the personal
information retrieved by the data consumers while keeping it useful
enough to fit their business needs. These developments will
comprise advanced privacy enhancing technologies for
attributebased credentials and database privacy.</p>
          <p>ACKNOWLEDGEMENTS
This work is part of the Center for Open Middleware (COM), a
joint technology center created by Universidad Politécnica de
Madrid, Banco Santander and its technological divisions ISBAN
and PRODUBAN.</p>
          <p>Alexander Felfernig1 and Michael Jeran1 and
Thomas Absenger1 and Thomas Gruber1 and Sarah Haas1</p>
          <p>Michael Schwarz1 and Lukas Skofitsch1</p>
          <p>Martin Stettinger1 and</p>
          <p>
            and Emanuel Kirchengast1
and Thomas Ulz1
and
Abstract. Knowledge-based recommenders support an easier
comprehension of complex item assortments (e.g., financial services
and electronic equipment). In this paper we show (1) how such
recommenders can be developed in a Human Computation based
knowledge acquisition environment (PEOPLEVIEWS) and (2) how
the resulting recommendation knowledge can be exploited in a
competition-based e-Learning environment (STUDYBATTLE).
1
Knowledge-based recommenders [
            <xref ref-type="bibr" rid="ref2 ref28">2</xref>
            ] support users on the basis of
semantic knowledge about the item (product) domain.2 One
variant of knowledge-based recommenders are constraint-based
recommenders [
            <xref ref-type="bibr" rid="ref34 ref8">8</xref>
            ] which exploit explicit constraints (rules) that encode the
recommendation knowledge. Another variant are critiquing-based
recommenders [
            <xref ref-type="bibr" rid="ref30 ref4">4</xref>
            ]: new items are presented to the user as long as
the user is unsatisfied and articulates critiques (e.g., an item should
be cheaper). In critiquing-based recommendation, new items are
determined by similarity functions. For a detailed overview of
recommendation approaches we refer to [
            <xref ref-type="bibr" rid="ref20 ref29 ref3 ref46">3, 20</xref>
            ].
          </p>
          <p>In this paper we focus on constraint-based recommenders, i.e.,
recommenders that are based on explicit recommendation rules
(constraints). The development of such recommenders is often a
timeconsuming and error-prone process which can be primarily explained
by the knowledge acquisition bottleneck: in the formalization of
product domain and recommendation knowledge, misunderstandings
can occur and as a result knowledge engineers encode this knowledge
in an unintended fashion. The more recommenders have to be
developed and maintained the higher the risk that the organization runs
into a scalability problem where additional resources are needed to
be able to perform knowledge engineering and maintenance.</p>
          <p>An alternative to the hiring of additional staff for development
and maintenance of recommendation knowledge bases is to change
the underlying knowledge engineering paradigm. The idea of
PEOPLEVIEWS is to engage domain experts more deeply into knowledge
engineering tasks. We do not want to ”convert” them into
technical experts but to define basic tasks (micro tasks) that are easy to
understand and complete even for domain experts without the
corresponding technical expertise. Micro tasks completed by users
pro1 Applied Software Engineering, Institute for Software
Technology, Graz University of Technology, Austria, email: ffelfernig,
mjeran, stettingerg@ist.tugraz.at, fthomas.absenger, th.gruber,
sarah.haas, emanuel.kirchengast, michael.schwarz, lukas.skofitsch,
thomas.ulzg@student.tugraz.at.
2 The terms item and product are used synonymously throughout the paper.
vide knowledge chunks that can be aggregated into a PEOPLEVIEWS
recommender knowledge base.</p>
          <p>The resulting PEOPLEVIEWS recommenders support customers
(and especially in the financial services domain also sales
representatives) in finding products that fit their wishes and needs. Using such a
recommender, items are retrieved within the scope of a dialog (these
systems are often also denoted as conversational) where users
articulate their requirements and the system tries to identify corresponding
solutions. Major advantages of such systems are reduced error rates
in the phase of order acquisition, more time that can be invested in
contacting new customers due to fewer errors, more satisfied
customers, and also pre-informed customers due to the fact that
recommender applications can be made publicly available.</p>
          <p>
            Knowledge-based recommender systems have been applied in
various item domains – due to the diversity of applications, we can
only give some examples of applications of these systems. In the
financial services domain, for example, the following applications of
knowledge-based recommendation technologies are reported in the
literature. Felfernig et al. [
            <xref ref-type="bibr" rid="ref11 ref12 ref37 ref38">11, 12</xref>
            ] show an application in the
context of investment decisions where recommenders are provided to
sales representatives who exploit the recommenders in sales dialogs.
          </p>
          <p>
            Time savings are reported as one of the major improvements directly
related to the application of recommendation technologies. Another
application of knowledge-based technologies in financial services is
presented by Fano and Kurth [
            <xref ref-type="bibr" rid="ref33 ref7">7</xref>
            ] who introduce a simulation
environment that can directly visualize the effects of financial decisions
on the financial situation of a family.
          </p>
          <p>
            Felfernig et al. [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ] present a digital camera recommender
deployed on a large Austrian product comparison platform. Peischl
et al. [
            <xref ref-type="bibr" rid="ref22 ref48">22</xref>
            ] show the application of constraint-based
recommendation technologies in the domain of software effort estimation.
WEEVIS[
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ]3 is a MediaWiki4 based environment for the development
and maintenance of constraint-based recommender applications –
a couple of freely available recommenders have already been
deployed. Knowledge-based technologies for the recommendation of
business plans are introduced by Jannach and Bundgaard-Joergensen
[
            <xref ref-type="bibr" rid="ref19 ref45">19</xref>
            ]. The recommendation of equipment configuration in the
context of smarthomes is introduced by Leitner et al. [
            <xref ref-type="bibr" rid="ref21 ref47">21</xref>
            ]. Technologies
that recommend changes in software development practices are
introduced by Pribik and Felfernig [
            <xref ref-type="bibr" rid="ref23 ref49">23</xref>
            ]. Finally, Burke and Ramezani
[
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ] show how to select recommendation algorithms by introducing
rules for recommending recommenders.
3 www.weevis.org.
          </p>
          <p>4 www.mediawiki.org.</p>
          <p>
            In PEOPLEVIEWS, principles of Human Computation [
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ] are
included into the development of knowledge-based recommenders.
          </p>
          <p>
            The idea of Human Computation is to let persons perform tasks in
which they are better than computers, for example, the identification
of product properties from a website. In the context of knowledge
base development and maintenance the idea is to let domain experts
perform tasks they are much better in compared to knowledge
engineers who typically have less knowledge about the product domain
and thus relieve the work of knowledge engineers. MATCHIN [
            <xref ref-type="bibr" rid="ref18 ref44">18</xref>
            ]
is based on the idea of preference elicitation by asking users what
a person would typically prefer when having to choose between
alternatives. Compared to this work, PEOPLEVIEWS allows to derive
constraint-based recommenders which are the basis for intelligent
user interfaces that support, for example, deep explanations [
            <xref ref-type="bibr" rid="ref17 ref43">17</xref>
            ] and
the diagnosis and repair of inconsistent requirements [
            <xref ref-type="bibr" rid="ref13 ref14 ref39 ref40">13, 14</xref>
            ].
          </p>
          <p>The major contributions of this paper are the following. First, we
show how financial service recommender knowledge bases can be
developed by a community of domain experts. Second, we sketch
how such knowledge bases can also be exploited for teaching
advisory practices on the basis of games (STUDYBATTLE environment).</p>
          <p>Third, we provide a discussion of major issues for future research.</p>
          <p>The remainder of this paper is organized as follows. In Section 2
we introduce basic concepts of Human Computation based
knowledge construction. To give an impression of the PEOPLEVIEWS and
the STUDYBATTLE user interface, we present example screenshots
in Section 3. Preliminary results of empirical evaluations are shortly
discussed in Section 4. In Section 5 we provide an overview of issues
for future work. We conclude the paper with Section 6.
2</p>
          <p>Developing PEOPLEVIEWS Recommenders
The PEOPLEVIEWS environment supports two basic modes of
interaction. First, recommender applications can be created in the
modeling mode and second, the applications can be executed in the
recommendation mode. In this section we discuss different tasks to be
performed in order to create a PEOPLEVIEWS recommender. Table
1 provides an overview of the users of our working example. These
users will jointly develop a PEOPLEVIEWS recommender.</p>
          <p>user
Andrea
Mary</p>
          <p>Luc
Torsten</p>
          <p>email</p>
          <p>pwd
****
*****
******
****</p>
          <p>Table 2 contains an overview of items (financial services) that are
used in our working example. The Investment Funds (A and B) have
a higher risk of loss and require that customers have a high
willingness to take risks, otherwise these services will not be recommended.</p>
          <p>Building Loan, Bond, and Savings Book are lower-risk items. In the
current version of PEOPLEVIEWS, items can be characterized by
additional item attributes, however, these attributes are not used by
recommendation rules constructed from micro contributions.</p>
          <p>In PEOPLEVIEWS, user requirements reqi 2 REQ are specified
as assignments of user attributes. For our financial services
recommender we define a set of user attributes which are enumerated in
Table 3. In the current version of the system, user attributes are defined
by the creators of a recommender application, i.e., attribute
definitions can not be extended by other users who contribute to the further
id
1
2
3
4
5</p>
          <p>item name
Investment Fund A
Investment Fund B</p>
          <p>Building Loan</p>
          <p>Bond</p>
          <p>Savings Book
development of the application on the basis of micro tasks.</p>
          <p>user attribute
goal (gl)
runtime (rt)
risk (ri)
question to user
What are your
personal goals?</p>
          <p>When is the
money needed?
Preparedness to
take risks?</p>
          <p>attribute domain
fStudies, Pension, Speculation,</p>
          <p>Car, House, World trip, novalg
fin 1 year, in 2 years, in 3-5 years,
in 5-10 years, in 10-20 years, in
more than 20 years, novalg
flow, medium, high, novalg</p>
          <p>In the PEOPLEVIEWS recommendation mode, user attributes can
be used to specify user (customer) requirements reqi 2 REQ. In
the modeling mode, user attributes represent a central element of a
micro task: given a certain item, users are asked to estimate which
values of user attributes are compatible with the item, i.e., are a
criteria for selecting and recommending the item. The evaluation of items
with regard to user attributes is the central micro task implemented
in the current PEOPLEVIEWS prototype. A detailed evaluation of the
example items (Table 2) regarding the user attributes goal, runtime,
and risk is provided in Table 4.</p>
          <p>
            Each row of Table 4 specifies a so-called user-specific filter
constraint [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ], i.e., a filter constraint (specified by a user) regarding a
specific item. For example, user Luc specified Pension and
Speculation as possible goals that lead to an inclusion of the item
Investment Fund B into a recommendation. Furthermore, Luc believes that
a user should have a high preparedness to take risks (attribute risk)
and should need the payment in 3-5 years, 5-10 years or 10-20 years
from now on. Semantically, an item X is selected by a user-specific
filter constraint if all the preconditions are fulfilled.
          </p>
          <p>
            In order to derive recommendation-relevant filter constraints
(recommendation rules) [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ]), user-specific filter constraints have to be
aggregated. An example of this aggregation step is depicted in Table
5. For each item all related user-specific filter constraints are
integrated into one constraint. Each row in this table has to be interpreted
as a filter constraint for a specific item, for example, the constraint
in the first row of Table 5 is the following. The item 1 (Investment
Fund A) is included (recommended) if the user requirements
regarding goal (gl), runtime (rt), and risk (ri) are consistent with the
condition of the recommendation-relevant filter constraint gl 2 fStudies,
Pension, Speculation, novalg ^ rt 2 fin 5-10 year, in 10-20 years,
novalg ^ ri 2 fmedium, high, novalg ! include( 1).
          </p>
          <p>Table 5 includes the complete set of recommendation-relevant
filter constraints (recommendation rules). Exactly these conditions
are applied by PEOPLEVIEWS to determine recommendations for
a user. In PEOPLEVIEWS, each item has exactly one related
recommendation-relevant filter constraint; each such filter constraint
is represented by one row in Table 5. The general logical
representation of a recommendation-relevant filter constraint f for an item</p>
          <p>is shown in Formula 1. In this context, values( ; u) is the set of
Investment Fund A ( 1)</p>
          <p>goal
Investment Fund A ( 1)
Investment Fund A ( 1)
Investment Fund B ( 2)
Investment Fund B ( 2)</p>
          <p>Building Loan ( 3)
Building Loan ( 3)
Building Loan ( 3)
Savings Book ( 5)
Savings Book ( 5)
in 5-10 years, in 10-20</p>
          <p>years
in 5-10 years, in 10-20</p>
          <p>years
in 5-10 years, in 10-20</p>
          <p>years
in 3-5 years, in 5-10 years,</p>
          <p>in 10-20 years
in 3-5 years, in 5-10 years,</p>
          <p>in 10-20 years
in 5-10 years, in 10-20</p>
          <p>years
in 5-10 years
in 5-10 years
in 2 years, in 3-5 years, in</p>
          <p>5-10 years
in 1 year, in 2 years, in 3-5</p>
          <p>years, in 5-10 years
in 1 year, in 2 years, in 3-5
years, in 5-10 years
risk
high
high
high
high
low
low</p>
          <p>user
Andrea</p>
          <p>Luc
Mary
Torsten</p>
          <p>Luc
Mary
Andrea</p>
          <p>Luc
Mary
Andrea
Torsten</p>
          <p>u2U
supported domain values of user attribute u 2 U (see Table 4). The
constant noval denotes the fact that no value has been selected for
the corresponding user attribute.</p>
          <p>f ( ) : ^ u 2 values( ; u) [ fnovalg ! include( )
(1)</p>
          <p>For each pair ( ; val 2 values( ; u)), PEOPLEVIEWS
determines a corresponding support value (see Formula 2). In this context,
occurrence( ; val) denotes the number of times, value val occurs
in a user-specific filter constraint for item and occurrence( )
denotes the number of times an item is referred in a user-specific
filter constraint. For example, support( 1; Studies) = 13 .</p>
          <p>support( ; val) =
occurrence( ; val)
occurrence( )
(2)</p>
          <p>The complete set of support values is depicted in Table 6. In
PEOPLEVIEWS, an item can have an associated rating (rating( ))
which represents an item evaluation with regard to quality and related
services. Such a rating can be determined, for example, by
calculating the average of the individual user item ratings.5 For simplicity, we
do not take into account user ratings in the utility function discussed
below (see Formula 3).</p>
          <p>Depending on the requirements articulated by the current user
(see, e.g., Table 7), PEOPLEVIEWS determines and ranks a set
of relevant items as follows. First, recommendation-relevant
filter constraints are applied to pre-select items that fulfill the user
requirements REQ = freq1; req2; :::; reqkg. In our example, the
set fInvestment Fund A, Building Loang would be selected by the
recommendation-relevant filter constraints (see Table 5).
item name</p>
          <p>(id)
Investment
Fund A ( 1)
Investment
Fund B ( 2)</p>
          <p>Building
Loan ( 3)</p>
          <p>Investment
Fund A ( 1)
Investment
Fund B ( 2)
Building Loan</p>
          <p>( 3)</p>
          <p>goal
in 5-10 years, in 10-20</p>
          <p>years
in 3-5 years, in 5-10 years,</p>
          <p>in 10-20 years
in 5-10 years, in 10-20</p>
          <p>years
in 2 years, in 2-5 years, in</p>
          <p>5-10 years
in 1 year, in 2 years, in 3-5
years, in 5-10 years
risk
high
low</p>
          <p>The determined recommendation set must be ranked before being
presented to the user. In PEOPLEVIEWS, item ranking is based on
the following utility function (see Formula 3). The utility of each
item is derived from the support values of individual requirements
(see Formula 2).
req2REQ support( ; req)
(3)</p>
          <p>The item ranking of our working example as a result of
applying Formula 3 is depicted in Table 8. For example, utility( 3,REQ
= fgoal = Studies, goal = Pension, runtime = in 5-10 years, risk =
mediumg) = support( 3, goal = Studies) + support( 3, goal =
Pension) + support( 3, runtime = in 5-10 years) + support( 3,
risk = medium) = 1.0 + 1.0 + 1.0 + 1.0 = 4.0.
3
3.1</p>
          <p>User Interface</p>
          <p>PEOPLEVIEWS
In this section we discuss the PEOPLEVIEWS user interface6 and also
show how PEOPLEVIEWS recommendation knowledge can be
exploited by the STUDYBATTLE learning environment. The
PEOPLEVIEWS homescreen is depicted in Figure 1. For applying
PEOPLEVIEWS recommenders, there is no explicit need for being logged in.</p>
          <p>Recommenders can be selected and activated directly from the
homescreen (see the tag cloud in Figure 1).
6 The user interface is currently only available in German.</p>
          <p>If users are logged in, they are allowed to contribute to the
development of PEOPLEVIEWS recommender applications. Only the
creators of a recommender application are allowed to define user
attributes. Other users can complete micro tasks in terms of evaluating
items with regard to a defined set of user attributes. The list of user
attributes used in our working example is depicted in Figure 2
(corresponds to the entries of Table 3).
the recommender can directly be executed. The user interface of our
financial services recommender is depicted in Figure 5.
product knowledge and sales practices. Examples of STUDYBATTLE
games are the following.</p>
          <p>Assign Properties. Figure 6 depicts an example user interface of a
STUDYBATTLE application that implements a quiz related to
knowledge about the relationship between user attributes and items. In the
example, users have the task to assign items on the left hand side to
user attribute values on the right hand side where each product has to
be assigned to at least one attribute value and vice-versa.</p>
          <p>Find Items. A different version of the game depicted in Figure 6
is to ask for products that fulfill certain criteria (represented by a
combination of user attribute settings).</p>
          <p>Find Incompatibilities. This game focuses on combinations of user
attribute values that do not lead to a solution, i.e., users have to
specify combinations of user attribute values from which they think that
no corresponding solution could be found.</p>
          <p>
            Maximize Requirements. The task is to identify minimal sets of
requirements (from a given set of requirements REQ) that have to
be deleted from REQ such that the remaining requirements lead to
at least one solution. This game type reflects the principles of
modelbased diagnosis [
            <xref ref-type="bibr" rid="ref24 ref32 ref50 ref6">6, 24</xref>
            ], i.e., support users in learning and improving
repair behavior in situations where no solution can be identified.
          </p>
          <p>Maximize Items. A similar task is focused on the repair of item
sets; in this context the task of users is to identify a maximal set of
items from a given set of items such that there exists at least one
combination of user attribute values that lead to these items (not
necessarily exclusively). An additional criteria could be that at least n
items from the original item list must remain in the result set.</p>
          <p>
            STUDYBATTLE
4
Recommendation-relevant filter constraints can be further exploited
for generating different learning applications that are part of the
STUDYBATTLE environment. STUDYBATTLE is a game-based
learning environment which can be utilized as an environment for learning
Human Computation based Knowledge Acquisition. Applying
Human Computation concepts [
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ] in the context of recommender
application development and maintenance has the potential to lift the
burden of enormous engineering and maintenance efforts from the
shoulder of knowledge engineers. Micro tasks as sketched in this
paper can be structured in a way that they are understandable for
domain experts without a computer science background. Knowledge
gained from completed micro tasks can be easily integrated into a
corresponding recommender knowledge base. Due to the
increasing size and complexity of knowledge bases, the development of
such technologies is crucial since they help to tackle scalability
issues which otherwise could cause a complete failure with regard to a
company-wide recommender deployment. As such, PEOPLEVIEWS
technologies can be considered as a first step towards more scalable
development methods that will also help to further increase the
popularity of knowledge-based (recommendation) technologies.
          </p>
          <p>
            Usability. An initial user study has been conducted with an early
version of PEOPLEVIEWS at the Graz University of Technology [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ].
          </p>
          <p>
            N=161 (15% female and 85% male) students interacted with the
system with the goal to develop different recommender applications.
After having completed the development, the study participants had to
complete a questionnaire which was based on the system usability
scale (SUS) [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ]. Evaluation results regarding the SUS aspects are
summarized in Figure 7. Besides usability questions, further
feedback has been provided by the study participants, for example, the
majority of the participants (69% of all study participants) would
like to further contribute to PEOPLEVIEWS recommenders. 56% out
of those participants who wanted to contribute agreed to contribute
within a time frame of less than 30 minutes per week.
5
          </p>
          <p>Future Work
The major goal of this paper was to provide an overview of the
PEOPLEVIEWS recommendation environment. There are many issues for
future work that we want to tackle and integrate corresponding
solutions in upcoming PEOPLEVIEWS versions.</p>
          <p>Weighting of Item Evaluations. In the current PEOPLEVIEWS
version it is possible to assign user attribute values to items, i.e., to
specify which criteria are relevant for the selection of a certain item.</p>
          <p>In future versions of PEOPLEVIEWS it will be possible to integrate
weights into item evaluations. This maybe does not play a major role
in financial service related recommender applications but can be
important in other domains were nuances and personal tastes play a
more important role. For example, in the context of recommending
digital cameras, it can be important to specify degrees regarding
certain camera properties, for example, the degree to which a camera is
able to support sports photography.</p>
          <p>Further Micro Tasks. In the current system version, the only
micro task to be completed is to define the relationship (compatibility
properties) between items and corresponding user attribute values.</p>
          <p>In future versions of PEOPLEVIEWS we will extend this list of micro
tasks (see Table 9).</p>
          <p>User Selection for Micro Tasks. An important enhancement will be
the inclusion of methods that automatically select users for a given
set of micro tasks and also take into account fairness in the
distribution of micro tasks. As detected in our initial studies, users are willing
to contribute to the further development of PEOPLEVIEWS
recommenders. An important issue in this context is to find the users with
the right expertise for certain tasks and also to not overload users.</p>
          <p>Our approach in this context will be to maintain user profiles which
are derived from observing the activities of a user within
PEOPLEVIEWS. For example, if a user selects a certain item when
interacting with the financial services recommender, the keywords extracted
from the corresponding item description are stored in the user
profile. If (in the future) micro tasks related to similar items (items with
a similar description) have to be completed, users with expertise
regarding such items will be the preferred contact persons.</p>
          <p>Games. Games will be another mechanism for data collection in
the PEOPLEVIEWS modeling mode. A single user game will be
included that is quiz-based. The overall goal is to guess user attribute
settings correctly that best describe a certain item. In a second game
two users will jointly try to figure out user attribute values that best
describe shown items. The more matching item evaluations exist the
better the team performs.</p>
          <p>Dependencies between User Attributes and Item Attributes. An
extension of the current PEOPLEVIEWS version will be the possibility
to identify direct relationships between user attribute values and
technical product properties. This is not the case in the current
PEOPLEVIEWS version since dependencies are only defined between user
attribute values and items.</p>
          <p>Recommendation Algorithms. The current version of
PEOPLEVIEWS relies on the discussed recommendation-relevant filter
constraints – item ranking is based on a utility-based evaluation (see
Formula 3). In future versions of PEOPLEVIEWS we will extend the
quality of recommendation algorithms by, for example, adapting the
determination of support values. If, for example, additional
information about the performance of a certain user is available (e.g.,
performance with regard to correctly completed micro tasks in the
past), this information can be used to increase/decrease the weight
of a user when determining support values. Finally, when users are
specifying their requirements, future versions of PEOPLEVIEWS will
allow the specification of preferences (weights) which indicate user
preferences regarding certain requirements. This will also include
approaches to the learning of weights (users should not have to specify
all weights explicitly).</p>
          <p>
            Inconsistency Management. Given a set of customer requirements
it could be the case that no solution can be presented to the user. In
upcoming versions of PEOPLEVIEWS we will focus on integrating
state-of-the-art diagnosis algorithms that help to automatically
determine repair actions in such inconsistent situations [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ]. These repairs
will take into account user weights (preferences) and thus minimize
the number of interaction cycles needed to find a reasonable
solution. In addition to this more intelligent management of inconsistent
requirements, we will integrate mechanisms that help to consolidate
the set of user-specific filter constraints in order to make the
resulting recommendation-relevant filter constraints more compact.
Consolidation will be achieved, for example, on the basis of redundancy
detection algorithms [
            <xref ref-type="bibr" rid="ref16 ref42">16</xref>
            ].
          </p>
          <p>Quality Management. The major task of quality management is
to assure the quality of the dataset collected on the basis of
different micro tasks. Quality assurance must be capable of detecting and
preventing manipulations of the dataset (also under the assumption
that anonymous users are allowed to complete micro tasks), it must
also identify changes to the given set of user-specific filter constraints
that help to improve the prediction quality of recommendation
algorithms. Quality assurance is also responsible for the generation of
micro tasks that need to be completed in order to improve the overall
quality of the PEOPLEVIEWS datasets. The micro tasks generated by
quality assurance are summarized as an agenda – this agenda is
forwarded to micro task scheduling that is responsible for distributing
micro tasks to the PEOPLEVIEWS user community.
6
In this paper we gave an overview of the PEOPLEVIEWS
recommendation environment which exploits concepts of Human Computation
to integrate domain experts more deeply into knowledge base
development and maintenance processes. PEOPLEVIEWS knowledge
bases can be exploited to generate learning applications which can
be used in the STUDYBATTLE environment. A major focus of this
paper was to show how PEOPLEVIEWS can be applied in the context
of financial service recommendation. The concepts presented in this
paper have the potential to avoid scalability issues which already
exist in many knowledge-based environments due to the increasing size
and complexity of knowledge bases.</p>
          <p>Cataldo Musto1
and</p>
          <p>Giovanni Semeraro1
1
Wealth Management is a business model operated by banks and
brokers, that offers a broad range of investment services to individual
clients to help them reach their investment objectives. Wealth
management services include investment advisory, subscription of
mandates, sales of financial products, collection of investment orders by
clients. Due to the complexity of the tasks, which largely require
a deep knowledge of the financial domain, a trend in the area is the
exploitation of recommendation technologies to support financial
advisors and to improve the effectiveness of the process.</p>
          <p>
            The talk presents a framework to support financial advisors in the
task of providing clients with personalized investment strategies. The
methodology is based on the exploitation of case-based reasoning
and the introduction of a diversification technique. A prototype of
the framework has been used to generate personalized portfolios, and
its performance, evaluated against 1,172 real users, shows that the
yield obtained by recommended portfolios overcomes that of
portfolios proposed by human advisors in most experimental settings.
2
Wealth management services have become a priority for most
financial services companies. As investors are pressing wealth managers
to justify their value proposition, turbulences in financial markets
reinforce the need to improve the advisory offering with more
customized and sophisticated services. As a consequence, a recent trend
in wealth management is to improve the advisory process by
exploiting recommendation technologies. However, some peculiarities of
the financial domain make hard to put into practice the most common
recommendation approaches, as the Content-Based (CB) or the
Collaborative Filtering (CF). As regards CB recommenders, the
available content, which is necessary to feed a CB recommendation
algorithm, is very inadequate and not meaningful, since each user can be
just modeled through her risk profile2 along with some
demographical features. Similarly, financial products are described through a
rating3 provided by credit rating agencies, an average yield on different
time intervals and the category it belongs to. In this
recommendation setting a pure CB strategy is likely to fail, since the overlap
between features is very poor. Moreover, the over-specialization
problem [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ], typical of CB recommenders, may collide with the fact that
turbulence and fluctuations in financial markets suggest to change
1 Dipartimento di Informatica, Universita degli Studi di Bari ”Aldo Moro”,
          </p>
          <p>Bari, Italy, email:fcataldo.musto, giovanni.semerarog@uniba.it
2 The Risk Profile is defined as ”an evaluation of an individual or
organization’s willingness to take risks”. Typically, this value is obtained by
conducting the above mentioned standard MiFiD questionnaire.
3 http://en.wikipedia.org/wiki/Credit rating
and diversify the investments over time. Similarly, CF algorithms
can hardly be adopted because of the well-known sparsity problem,
which makes very difficult to identify the neighbors of the target user.</p>
          <p>These dynamics suggest to focus on different recommendation
paradigms. Given that financial advisors have to analyze and sift
through several investment portfolios4 before providing the user with
a solution able to meet her investment goals, the insight behind
our recommendation framework is to exploit Case-Based Reasoning
(CBR) to tailor investment proposals on the ground of a case base of
previously proposed investments.
3</p>
          <p>
            Methodology
Our recommendation process is based on the typical CBR workflow
described in [
            <xref ref-type="bibr" rid="ref2 ref28">2</xref>
            ] and sketcted in Figure 3. Our pipeline is structured
in three different steps:
(1) Retrieve and Reuse: retrieval of similar portfolios is performed
by representing each user through a feature vector: risk profile,
inferred through the standard MiFiD questionnaire5, investment goals,
temporal goals, financial experience, and financial situation have
been chosen as features. Each feature is represented on a five-point
ordinal scale, from very low to very high. Next, cosine similarity is
adopted to retrieve the most similar users (along with the portfolios
they agreed) from the case base.
4 http://en.m.wikipedia.org/wiki/Portfolio (finance)
5 http://en.wikipedia.org/wiki/Markets in Financial Instruments Directive
(2) Revise: candidate solutions retrieved at step 1 are typically too
many to be consulted by a human advisor. Thus, the Revise step
further filters this set to obtain the final solutions. To revise the candidate
solutions, four techniques are compared:
          </p>
          <p>(a) Basic Ranking: portfolios are ranked in descending cosine
similarity order, according to the scores returned by the RETRIEVE
step. The first k portfolios are returned to the advisor as final
solutions.</p>
          <p>
            (b) Greedy Diversification: this strategy implements the
diversification algorithm described in [
            <xref ref-type="bibr" rid="ref29 ref3">3</xref>
            ]. The algorithm tries to
diversify the final solutions by iteratively picking from the original set of
candidate solutions the ones with the best compromise between
cosine similarity and intra-list diversity with respect to the previously
picked solutions. At each step of the strategy, the solution with the
best compromise is removed from the set of candidate solutions and
is stored in the set of final solutions.
          </p>
          <p>(c) FCV: Financial Confidence Value (FCV) calculates how close
to the optimal one is the distribution of the asset classes in a
portofolio, according to the average historical yield obtained by each class.</p>
          <p>Given a set of asset classes A, for each portfolio p the set P , of the
asset classes in it, and its complement P are computed. Next, FCV
is formally defined as:</p>
          <p>F CV (p) = Y (p)log( )+1
yai</p>
          <p>PjiP=j1 yai</p>
          <p>PjkP=j1 yak
where pai and yai are the percentage and the average yield of the
i-th asset class in the portfolio, respectively. Y (p) is the total yield
obtained by the portfolio, and is a drift factor which calculates
the ratio in terms of average yield between the asset classes in the
portfolio and those which are not in. For values of 1, it acts as
a boosting factor (for 1, it acts as a dumping factor). Through
this strategy, all the candidate solutions are ranked according to the
FCV score and thetop-k solutions are returned to the advisor.</p>
          <p>(d) FCV + Greedy: this combined strategy first uses the greedy
algorithm to diversify the solutions, then exploits the FCV to rank
the portfolios and obtain the final solutions.
(3) Review and Retain: in the Review step the user and the human
advisor can further discuss and modify the portfolio, before
generating the final solution for the user. If the monthly yield obtained by the
newly recommended portfolio is acceptable, the solution is stored in
the case base and can be used in the future as input to resolve similar
cases.</p>
          <p>The performance of the framework has been evaluated in an
experimental session against 1,172 real users. Results show that the
yield obtained by recommended portfolios overcomes that of
portfolios proposed by human advisors in many experimental settings.</p>
          <p>As shown in Figure 2, FCV significantly outperforms human
recommendations (the average monthly yield increases from 0.18 to almost
0.30) for all the neighboorhood (put on the X axis) taken into account.</p>
          <p>The experimental results were further confirmed by an ex-post
evaluation performed on real financial data from January to April 2014.</p>
          <p>As shown in Figure 3, this experiment provided very interesting
results: beyond confirming the goodness of FCV-based ranking and
the statistically significance of the gap with respect to both
collaborative and human baselines, the most interesting outcome was that
the combination of the diversification technique and FCV can further
improve the performance of the proposed portfolios. This result
suggests that the integration of the approaches can make the framework
even more effective. This is due to the fact that a combined strategy
can merge the advantages of a ranking based on past performance,
as FCV, with an algorithm that may lead to more diverse
recommendations. This makes the investment strategy better, since the human
advisor does not base her investment proposal on a set of very similar
portfolios, but rather on a set of diversified solutions which is more
stable and effective, especially when market fluctuations have to be
tackled.</p>
          <p>Deployment of the framework
A demo version of the platform is available online6.</p>
          <p>Given that the platform is supposed to be of aid for financial
advisors, it lets the advisor to select the current user as well as the
recommendation technique to be adopted. Next, the
”Recommendation” button shows the most promising portfolios for the target users
along with the distribution of the asset classes. The distribution can
be further discussed by user and advisor before coming to the final
proposal which is stored in the case base.</p>
          <p>
            REFERENCES
[
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ] P. Lops, M. de Gemmis, and G. Semeraro, ‘Content-based recommender
systems: State of the art and trends’, in Recommender Systems
Handbook, pp. 73–105. Springer, (2011).
[
            <xref ref-type="bibr" rid="ref2 ref28">2</xref>
            ] F. Lorenzi and F. Ricci, ‘Case-based recommender systems: a
unifying view’, in Intelligent Techniques for Web Personalization, 89–113,
          </p>
          <p>
            Springer, (2005).
[
            <xref ref-type="bibr" rid="ref29 ref3">3</xref>
            ] B. Smyth and P. McClave, ‘Similarity vs. diversity’, in Case-Based
Rea
          </p>
          <p>soning Research and Development, 347–361, Springer, (2001).</p>
          <p>
            6 http://193.204.187.192:8080/OBWFinance/ - Login: 2 - Password: 12345
P S Y R E C: Psychological Concepts to enhance the
Interaction with Recommender Systems
Gerhard Leitner1
Abstract. Although recommender systems are already a successful
part of many online systems, there are still areas of research which
are unexploited. One of them is the appropriate consideration of
psychological theories which could be beneficial for the interaction
between a computerized system and an online consumer, particularly in
the financial services sector. This paper emphasizes the potentials of
integrating psychological knowledge into the further development of
recommender systems on the basis of psychological theories and
basic decision processes. The enumerated concepts have been
demonstrated to be influential in consumer buying behaviour in numerous
studies and therefore are used as a theoretical basis of the presented
work. A conceptual framework is build upon the technology
acceptance model (TAM) which offers the possibility of integrating
psychological knowledge in the further development of online financial
services. Possible applications and implementations are shown on the
basis of empirical work that has been carried out in the past years.
1
The utility of recommender systems to enhance the quality of
decision processes and their outcome has been approved many times,
according to [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ] they are among the most successful applications in
Artificial Intelligence. Although recommenders have such a successful
history, there are still unexploited potentials for advancement [
            <xref ref-type="bibr" rid="ref2 ref28 ref29 ref3">2, 3</xref>
            ].
          </p>
          <p>
            Specifically promising in this regard is knowledge from psychology
and research aiming to integrate it into recommender systems. This
area of research is, taking the words of [
            <xref ref-type="bibr" rid="ref30 ref4">4</xref>
            ], still in its infancy. This
paper opens new perspectives on the potentials of psychological
concepts and theories to enhance the interaction with recommender
systems in general and in the context of financial services in particular.
          </p>
          <p>
            The emphasis is put on interface and interaction aspects, because
recommender systems are typically characterized by highly
sophisticated algorithmic and technical basis. However, investigating also
efforts in the enhancement of the interface is important, or, as Louis
[
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ] formulated it: ”No matter how good your back-end systems are,
the users will only remember your front end. Fail there and you will
fail, period.”
          </p>
          <p>
            The rest of the paper is structured as follows. In the first sections
an introduction into the theoretical background with an emphasis on
psychological concepts is given. This part is followed by a detailed
discussion on decision phenomena and how these are related to
recommender systems. Afterwards a framework based on the TAM, the
technology acceptance model [
            <xref ref-type="bibr" rid="ref32 ref6">6</xref>
            ] is presented serving as a research
basis for future research activities. In Section 6 studies which were
1
          </p>
          <p>Alpen-Adria-Universita¨t
Systems, Universita¨tsstrasse
email:gerhard.leitner@aau.at</p>
          <p>Klagenfurt,
65-67,</p>
          <p>
            Institute for
Informatics9020 Klagenfurt, Austria,
carried out and showing concrete possibilities for combining
psychological knowledge and recommender technologies are
exemplified. The paper concludes with a discussion and an outlook on future
work.
In the history of online sales many examples of online platforms exist
which were characterized by high technical quality and
innovativeness but lost market share or even disappeared because they did not
appropriately consider user needs. For example, the first company
offering books online was superseded by competitors who provided
better user experience. Another example showing the importance of
considering user needs is Boo.com, which was based on cutting edge
technology but showed bad usability, see, for example, [
            <xref ref-type="bibr" rid="ref31 ref5">5</xref>
            ].
Recommender systems can be considered as state of the art technologies
supporting online interaction and purchase and have demonstrated
their benefits and capabilities in numerous studies. However, as [
            <xref ref-type="bibr" rid="ref33 ref7">7</xref>
            ]
pointed out, decision support tools such as recommender systems
consist of three parts:”...database management capabilities,
modelling functions, and a powerful yet simple user interface..”.
Specifically the latter offers high potentials for enhancement, by
considering human capabilities such as attitudes, emotions, and other factors
influencing their behaviour in their design. The goal to achieve is
an enhanced quality of interaction between the human user and the
computerized part of a system resulting in a better outcome for both,
the user and the provider.
          </p>
          <p>
            Recommender systems can be seen as the technical counterpart
of real shopping environments. For about a century research in
consumer psychology has been influential in advertising, marketing, and
sales. Speaking of the offline world it does not surprise any more
that the design of supermarkets in regard to shopping paths,
lighting conditions or sound exposure is not left to chance and consumer
psychology is omnipresent [
            <xref ref-type="bibr" rid="ref34 ref8">8</xref>
            ]. In comparison, psychological
knowledge applied in the online sector is limited, although an increased
consideration could be beneficial on different levels [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ]. Specifically
phenomena addressed in consumer and decision psychology are of
interest in this regard [
            <xref ref-type="bibr" rid="ref10 ref11 ref36 ref37">10, 11</xref>
            ]. The challenge addressed in this paper
is to take this knowledge to optimize recommender operated
platforms in a way that consumers can, on the one hand, benefit from the
advantages of information and communication technologies (ICT).
          </p>
          <p>
            This is possible because recommender systems are able to
dynamically adapt to the individual user. This can constitute a meaningful
alternative to offline purchase situations where an average sales
assistant can be assumed to base his recommendations only on a limited
set of alternatives. On the other hand it is important to make the user
forget about the disadvantages online systems could have compared
to real shopping experiences. These are, for example, the
possibility to touch and investigate a product physically and to communicate
with a human counterpart, negotiate a price or ask questions. The
challenge for the service-provider is the increased difficulty to
convince an online user about the benefits of a product or even persuade
him or her to buy it, because there are limited possibilities to
establish a pleasant atmosphere. In the following a spotlight is put on a
selection of psychological concepts and theories which have a direct
relation to buying behaviour and therefore build a promising basis
for further research and to enhance recommender systems in a way
that they are capable of supporting all facets and phases of human
consumer behaviour. This is neither easy nor possible in just one
iteration.
3
The following list of theories is not intended to be exhaustive, it
should just point out the potentials of psychological concepts which
have, as demonstrated in numerous studies, a direct relation to
human behaviour and insofar could also be useful for the enhancement
of online behaviour in general and in regard to financial services in
particular. Some of the elements of the theories have been either
analysed for applicability or actually used within own studies [
            <xref ref-type="bibr" rid="ref1 ref12 ref13 ref27 ref38 ref39">12, 13, 1</xref>
            ],
others are planned to be integrated in our future work.
          </p>
          <p>
            Prospect Theory, PT
PT is of interest in regard to the behaviour of consumers in
situations characterized by uncertainty and and risk. These are, when
considering the work of [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ] demonstrating that the assumptions
of economic theory do not hold, almost all situations. Because
of limitations in human information processing, systematic biases
in rating situations and decision making are observable. For
example, humans act risk seeking when a loss is probable, or risk
averse when a profit can be expected [
            <xref ref-type="bibr" rid="ref11 ref14 ref37 ref40">11, 14</xref>
            ]. This asymmetry is,
for example, one explanation why people invest additional money
into loss-making investments.
          </p>
          <p>
            Locus of Control Theory, LoC
LoC implies that behaviour depends on the interpretation of a
person whether she has control over a situation or interaction and the
outcome of an interaction (internal locus of control). When a
situation or outcome is beyond influence (e.g. the user has the feeling
that the system or external forces have the control), then external
locus of control is the case [
            <xref ref-type="bibr" rid="ref15 ref41">15</xref>
            ].
          </p>
          <p>
            Attribution Theories, AT
Attribution theories are, as LoC, assuming internal/external
control as one important dimension, but also include other
dimensions, for example stability vs. flexibility. It is not only of
relevance whether control is perceived as internal or external but also
if it is stable, depending on the domain or a particular situation
[
            <xref ref-type="bibr" rid="ref16 ref17 ref42 ref43">16, 17</xref>
            ]. An example for the influence of LoC and AT in the
context of financial services is that a person may assume that it makes
sense to actively control her financial portfolio (internal control) to
increase prosperity. A person who observes herself as externally
controlled may think that anyway only governments with
taxation policies and financial service providers are responsible for
the financial status of the individual. This attitude can be stable
or flexible, the latter, for example, by observing the own financial
situation as depending on the global economy and the possibility
to change when the financial crisis is overcome.
          </p>
          <p>
            Expectancy-Value Theories, EVT
This group of theories is based on the two dimensions expectancy
and value. Expectancy refers to the degree to which a person is
capable of reaching a goal. Value refers to the importance the goal
has for the person. Example theories of this group are the theory of
planned behaviour (TPB) or the theory of reasoned action (TRA)
and they are important in the context of online buying. Besides
personal aspects (i.e., attitude to a behaviour), social aspects play
an important role and influence the value. For example, how
people from relevant groups such as peer groups, family and friend
would judge a certain behaviour (e.g., the purchase of a certain
product) [
            <xref ref-type="bibr" rid="ref18 ref19 ref44 ref45">18, 19</xref>
            ].
          </p>
          <p>Need for Cognition / Elaboration Likelihood Model, NfC
NfC implies that depending on the importance of the domain
(”personal involvement”) a person tends to process information on
different elaboration routes. In domains which are of high
importance for the person information is processed on the central route,
characterized by a high level of elaboration (extensive collection
of information, comparison, outweighing of pros and cons, etc.)
The alternative way of processing, the peripheral route, is
characterized by low involvement of the person and, as an effect, an
intentional low investment of efforts in processing information.</p>
          <p>
            The type of elaboration is, for example, of interest when an online
platform is intending to include persuasive technologies [
            <xref ref-type="bibr" rid="ref20 ref21 ref46 ref47">20, 21</xref>
            ].
          </p>
          <p>
            Cognitive Dissonance, CD
CD is assuming a mental model that a person establishes about
a certain area of life, a behaviour or other relevant issues. The
model only includes ”consonant” information, which means that
information present in the model should not be contradictory. For
example, if a person thinks about financing a holiday trip with a
loan this may contradict with a negative attitude towards taking
out a loan for things that do not have a material value (such as
cars or real estates) . In this case dissonance occurs and,
according to the model, mental efforts are invested to restore consistency
[
            <xref ref-type="bibr" rid="ref22 ref48">22</xref>
            ]. For the concrete example an argument could be that the
exchange rate of country’s currency where the journey is heading is
favourable and insofar money is saved.
          </p>
          <p>
            Reactance Theory, RT
Implies that humans are driven by the assumption that they can
behave and act unrestrictedly. If a behaviour or an ”object of
desire” is not available or difficult to reach, its subjective value is
increased and the reactant user tries to overcome this shortage by
increased efforts [
            <xref ref-type="bibr" rid="ref23 ref49">23</xref>
            ]. Online platforms try to induce reactance
by indicating limitations in product or service availability. In
regard to financial services, for example, special offers for loans or
financing models are made available for limited time periods.
          </p>
          <p>
            Flow, F
The central concept of the theory is the state of flow which is
characterized by an immersion of the user with the system. Flow
is, for example, observable on computer game players, musicians
or craftsmen who smoothly interact with their tools without
observable disruptions [
            <xref ref-type="bibr" rid="ref24 ref50">24</xref>
            ]. A platform offering financial services
should aim at supporting flow by enabling a smooth interaction
dialogue between user and system and giving the possibility to
”play” with alternatives.
          </p>
          <p>How elements of the enumerated theories and concepts could
affect the interaction with a financial services platform is illustrated in
the following example.</p>
          <p>Example. Imagine a potential consumer is using an online
system to inform herself about loan opportunities. Based on her
attributional patterns (AT, LoC) she has a certain understanding of whether
she is able to use an online platform and can control the outcome of
the product search. We assume that she is self-confident in the usage
of the system (EVT, expectancy) and the system is appropriately
designed that she can ”play around” and easily evaluate alternatives
(and eventually reaches a kind of ”flow”, F). Depending on the
personal importance (EVT, value) of the product she is searching for
(loan for a holiday trip, a car or a house) she will put low or high
efforts in the evaluation, comparison, and selection of the product
(NfC). When she knows what she wants and has good experiences
with a certain brand or provider (PT, CD) she will not care that much
what others say about her decision (EVT, peers). If she is uncertain,
doesn’t want to make a mistake or wants a product with a high status
she will orient herself on information of other users (EVT, peers) and
in what percentage they purchased what product (for example based
on online ratings or discussions with her peer groups). If the product
or service she has finally chosen is not available immediately, she
will try to solve the problem by finding other sources from where to
get the product (PT, RT) or she will resign and decide not to buy any
product (AT).
4</p>
          <p>
            Decisions as the Connecting Element
The direct application of the theories and concepts enumerated above
is difficult because many of them are too abstract. It is therefore
necessary to investigate the ”atomic” element of consumer behaviour
which is decision. Each purchase or even browsing for information
to prepare a purchase is characterized by a singular decision or a
sequence of decisions. They are made on the basis of gathered
information, the consultation of different information sources, the
outweighing of alternatives, etc. Economic theory has assumed that humans
can be considered as omniscient and make decisions on the basis of
optimal rationality. Since the work of Simon [
            <xref ref-type="bibr" rid="ref10 ref36">10</xref>
            ] it is commonly
agreed that this assumption does not hold for most decision
situations. The majority of human decision processes is characterized by
limited information use, biased mental models and routines either
because of missing capabilities or a low level of motivation to invest
cognitive efforts. Depending on the kind of limitation, technological
means supporting the basic decision processes have to be designed
in different ways.
          </p>
          <p>
            Felser [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ], based on the work of [
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ], categorizes decisions in
consumer behaviour into 4 types, namely extensive, limited, habitual
and impulsive decisions. What type of decision is actually applied is
depending on the type of product or service, the degree of personal
involvement, and emotional contribution (activation) to the domain
and other personality traits. For example, searching for an
appropriate loan for an apartment can have very different characteristics and
motives.
          </p>
          <p>
            Extensive Decision. If a person is planning to buy the apartment
this is a long term investment that influences the financial life of the
person for decades. Therefore the person is probably highly involved,
activated, and will invest high efforts to find out the best financing
alternative and therefore applies an extensive decision procedure until
he gets the best financial plan which the smallest influence in the
current financial situation. The strategy followed has characteristics
of the central route processing of need for cognition theory [
            <xref ref-type="bibr" rid="ref20 ref21 ref46 ref47">20, 21</xref>
            ].
          </p>
          <p>
            Although this type of decision making is highly sophisticated, it has
some weaknesses. For example, the amount of information
considered in the decision is not directly proportional to the amount of
information available, which means that even if higher amounts of
information would be available, people prefer short cuts [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ]. An
empirical proof for this hypothesis could be shown in our own work [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ].
          </p>
          <p>Another insight is that higher effort invested into a decision does not
mean that the outcome of the decision is better. One of the reasons is
that the dimensions consulted for a decision are often unconscious.</p>
          <p>An a posteriori justification is done on dimensions which can be
rationalized but those may not be the ones which were responsible for
the decision.</p>
          <p>
            Limited Decision. Another person having in mind to rent an
apartment and just needs money for new furniture may be less passionate
and would apply other criteria to the decision process. She applies
the second type of decision, which is limited decision. Decisions
following this strategy are based on experiences (positive and negative
ones) and heuristics which were derived from these experiences, such
as ”Brand A is better than brand B” or, ”The more expensive, the
better a product”. The person may choose the company for financing
furniture based on an advertisement she recently saw. In this case the
availability heuristic, described by [
            <xref ref-type="bibr" rid="ref11 ref14 ref37 ref40">11, 14</xref>
            ], is applied (e.g., brands
and companies that are commonly known are better). Following this
heuristic could lead to choosing a financing the furniture shop offers
to his customers (an alternative the first person probably would not
think about). An influence could also have the social environment
(subjective norm, [
            <xref ref-type="bibr" rid="ref18 ref19 ref44 ref45">18, 19</xref>
            ]). Recommendations of relatives or friends
which have good experiences with a bank can be taken into account.
          </p>
          <p>Habitual Decision. The third type of decision, habitual decision, can
be seen as a combination of extensive and limited decision. Based on
previous experiences a mental model has been established, on the
basis of which consumer behaviour follows a routine sequence and
may not involve explicit decisions. This strategy mainly is applied in
routine behaviour when no extraordinary investment is planned (such
as in the previous examples). For example, if a person has to
transfer money to a country where the receiver still requires conventional
paper based transfer, she typically goes to her familiar bank branch
and transfers the money there although there might be another
company who offers cheaper transfers to the target country. In the past
the selection of the best bank might have involved extensive
decision strategies. When these efforts were successful and resulted in
selecting an appropriate bank, a mental model is build which drives
future behaviour. If the combination of services, price and reputation
has been working satisfactorily in the past it would not have a
serious impact, if it did not work any more (e.g., prices for services are
slightly increased) - in terms of financial loss or well-being.</p>
          <p>Impulsive Decisions. The last form - impulsive buying - is
characterized as a ”reaction” to environmental stimuli rather active behaviour
and may not include decisions at all. This form of occurs in the
context of financial services, for example, when a credit card is used for
buying things. This also involves investing money, but the investment
is hidden and partly unconscious.</p>
          <p>
            The previous paragraph was describing decisions on a general
level. Beckett et al.[
            <xref ref-type="bibr" rid="ref53">27</xref>
            ] have focused their work on financial
products and present their findings in the form of a four-field decision
matrix which has parallels to the four types of decisions described
by [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ]. Additionally to involvement, which is part of the systematic
of [
            <xref ref-type="bibr" rid="ref25 ref26 ref51 ref52">26, 25</xref>
            ] and NfC [
            <xref ref-type="bibr" rid="ref21 ref47">21</xref>
            ], the authors point out confidence as another
relevant dimension, which is a relevant dimension in LoC and AT
[
            <xref ref-type="bibr" rid="ref17 ref43">17</xref>
            ] as well as the EVT [
            <xref ref-type="bibr" rid="ref18 ref44">18</xref>
            ]. The first decision type included in the
matrix is repeat-passive decisions - which correspond to habitual
decision in the nomenclature of [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ]. Based on positive experiences the
consumer has developed loyalty to an enterprise (a bank or insurance)
and does not explicitly search for alternatives. The rational-active
decision type corresponds to the extensive decision strategy. The third
type identified by [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ], relational-dependent decisions corresponds
to [
            <xref ref-type="bibr" rid="ref25 ref26 ref51 ref52">25, 26</xref>
            ]’s limited decision type and is based on heuristics
regarding experience and brand. If this strategy has been successful, trust
is developed which reduces search and information processing
activities. Finally, the impulsive type of [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ] does not occur very often
in the context of financial decisions. Therefore the matrix of [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ]
includes a fourth field labelled ”no purchase”. Figure 1 is showing the
decision types of [
            <xref ref-type="bibr" rid="ref25 ref51">25</xref>
            ] and their counterparts described in the work of
[
            <xref ref-type="bibr" rid="ref53">27</xref>
            ].
          </p>
          <p>The matrix has been evaluated in a series of focus groups and
three product types are corresponding to the different decision types
shown in Figure 1: basic transaction services (existing accounts),
basic insurances products (car, house), and investment services (stocks,
shares, pensions, etc.). Repeat-passive decisions mainly take place in
the context of basic transaction services, when brand loyalty to
banking institution and confidence in the decision is high. Rational-active
decisions are made when price is one of the most important criteria.</p>
          <p>This strategy is characterized by the necessity to search for products,
to deal with a big amount of information and to thoroughly analyse
the outcome. This could be necessary because, for example,
insurance companies offer more or less the same services and products
and deliberately make comparison to competitive products difficult.</p>
          <p>
            Relational-dependent decisions are, according to the results achieved
by [
            <xref ref-type="bibr" rid="ref53">27</xref>
            ] still strongly depending on personal communication and
advice, because of the inherent complexity of the products and services.
          </p>
          <p>
            The previous paragraphs were devoted to the content of decision
processes involved in consumer behaviour. The second, similarly
important dimension in regard to online platforms based on
recommender systems is the presentation of information. We take the
differentiation of [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ] who proposes to differentiate two roles an online
consumer has to assume, one as a shopper and the second as a
computer user. What characterizes and drives the shopper has been
emphasized above, in the next part the focus is put on the role of a
computer user. Supporting a user in decision making requires the
provision of interfaces that is appropriate, an issue the research areas
of human computer interaction (HCI), usability engineering and user
experience [
            <xref ref-type="bibr" rid="ref54 ref55 ref56 ref57">28, 29, 30, 31</xref>
            ] are dealing with. In regard to online
consumer behaviour one of the major goals has to be to design interfaces
in a way that they compensate the limitations an online system has in
comparison to a to real world shopping situation and emphasize the
advantages online systems have over real world shopping. The
flexibility, adaptiveness, and adaptability of recommender systems
enabling an individual support of each consumer is probably not
available in typical shopping environments and insofar bear high
potentials but are also challenging in regard to user interface design. This
means, for example, that the development has to be based on state of
the art interface design technologies, such as responsive design [
            <xref ref-type="bibr" rid="ref58">32</xref>
            ]
and mobile first [
            <xref ref-type="bibr" rid="ref59">33</xref>
            ]. Not only the technology in the back-end (the
recommender system) has to be adaptive, but also the interface itself
should adapt to the needs of users. Burke [
            <xref ref-type="bibr" rid="ref60">34</xref>
            ] proposes a hybrid
solution for recommender system technology, a similar approach could
also be imagined for the user interface part. A one fits all approach
seems not to be contemporary, different interface alternatives seem
to be a proper way to provide an adaptive access to a recommender
system for different groups of users in different contexts of use. One
and the same user could be interacting with different views of the
system, on different devices, depending on the task at hand,
contextual aspects, and psychological factors such as involvement in the
domain. This means that interfaces do not only have to be adaptive,
but personalized, platform independent and customizable [
            <xref ref-type="bibr" rid="ref61 ref62">35, 36</xref>
            ].
          </p>
          <p>
            The application of conventional usability engineering methods to
accompany the development is crucial [
            <xref ref-type="bibr" rid="ref63 ref64">37, 38</xref>
            ], integrated in a user
centred design process and combined with frequent evaluations
involving representatives of the intended user groups.
5
          </p>
          <p>
            An Integrated Model as Basis of Research
The aspects addressed in the previous sections characterizing
consumer behaviour in general and online consumer behaviour in
particular are difficult to capture. Their comprehension would be easier if
a way could be found to operationalize them based on an integrated
framework. The technology acceptance model (TAM) originally
proposed by Davis [
            <xref ref-type="bibr" rid="ref65">39</xref>
            ] could build a basis for this attempt. TAM and its
derivates have been empirically validated in numerous studies, and
it optimally combines the two dimensions emphasized in the
previous section. Content - meaning the psychological aspects related to
a decision making and Presentation - aspects that related to human
computer interaction. The TAM has relations to many of the theories
and concepts enumerated in the previous sections. Figure 2 shows an
adapted version of the latest version of TAM, TAM 3, introduced by
[
            <xref ref-type="bibr" rid="ref32 ref6">6</xref>
            ]. The dimensions of TAM and their relation to the concepts and
theories enumerated above are described in this section. The
descriptions are partly taken from [
            <xref ref-type="bibr" rid="ref32 ref6 ref66">6, 40</xref>
            ].
          </p>
          <p>Experience
Already having used a system or similar ones can have an
influence on many factors, such as the perceived usefulness and the
subjective norm. In relation to psychological theories, experience
can increase, for example, the confidence and the assumption of
internal control (LoC, AT).</p>
          <p>Voluntariness
The extent to which users perceive the usage of a system to be
non-mandatory. This aspect relates to reactance theory (RT) - if a
person has the freedom to choose an online system for financial
services additionally to offline services this makes a difference
to being forced to use online services (because the nearby bank
branch has been closed).</p>
          <p>Subjective Norm
A person’s perception that most people who are important think he
or she should or should not perform a behaviour or use a system.</p>
          <p>There could, for example, be a conflict between the personal
preferences and the attitude of the relevant others, which could lead to
cognitive dissonance (CD) (”I would issue a credit for a holiday
trip”.)
Image
The degree to which the use of an innovation is perceived to
enhance one’s status in the social system. In regard to the provision
of different platforms (desktop or mobile platforms) this aspect,</p>
          <p>Computer Self-Efficacy
The degree to which a person beliefs that he or she has the
ability to perform the intended task. This depends on the experience
with computer systems in general, and on the experiences within
a specific domain (e.g. financial services) in particular (LoC, AT).</p>
          <p>Perceptions of External Control
The degree to which a person believes that an organizational and
technical infrastructure exists to support use of the system. This
could also be influential in a negative way (according to LoC and
AT) when a person feels that the organization behind a system
limits his or her performance or degrees of freedom.</p>
          <p>Computer Anxiety
The degree of a person’s fear, when she/he is faced with the need
of using computers to access services. Specifically in the context
of financial services (or even online transactions with credit cards)
people are anxious because of the danger to lose money (PT).</p>
          <p>Computer Playfulness
The degree of cognitive spontaneity in computer interactions. If a
system supports this kind of interaction, such as simulating
different variants of financing, this supports persons engaging in
extensive decision making processes (NfC).</p>
          <p>Perceived Enjoyment
The extent to which using a specific system is perceived to be
enjoyable, whereas enjoyment can have different dimensions.
Feeling safe in the sense of nothing unexpected can happen when
transferring money could be one form of enjoyment. Another
one is developing trust towards an institution or a platform when
the latter is characterized by transparency and comprehensibility
(NfC).</p>
          <p>Objective Usability
A comparison of systems based on the actual level of effort
required to complete specific tasks. If it is faster to go to the bank
branch to transfer money than using the computer interface, then
the objective usability of an online system would be low (EVT).</p>
          <p>Perceived Usefulness
The degree to which a person believes that using the system will
help him or her to attain gains in life quality. Saving money by
using an online system instead of personal services convinces people
to adapt to new technologies (EVT).</p>
          <p>Perceived Ease of Use
The degree of ease associated with the use of the system. Besides
the utility aspects of a system, the subjective usability is relevant.</p>
          <p>If people do not trust a system or are doubtful in their usage, they
would not use it (LoC, AT).</p>
          <p>Behavioural Intention
The degree to which a person has conscious plans to perform or
not perform some specified behaviour. Only if the enumerated
dimensions are fulfilled in a certain degree, a person will have the
intention to use a system. The correlation between the intention
and the actual use still is low (EVT).</p>
          <p>Use Behaviour When every aspect is, depending on the
individual preferences, optimally fulfilled, then a flow experience could
occur (F).</p>
          <p>
            As emphasized in the enumeration of elements, the TAM has
connections to the concepts and theories addressed in this paper [
            <xref ref-type="bibr" rid="ref35 ref9">9</xref>
            ] and
would also allow the integration of additional aspects, for example
trust, cf. e.g. [
            <xref ref-type="bibr" rid="ref67 ref68 ref69 ref70">41, 42, 43, 44</xref>
            ]. The TAM has also served as basis for
research in the financial services domain, cf. e.g. [
            <xref ref-type="bibr" rid="ref71 ref72 ref73">45, 46, 47</xref>
            ].
6
The theoretical concepts presented in this paper have been evaluated
in several empirical works. In this section a selection of these works
and their relation to the theoretical parts of the paper is presented and
relations to the enumerated models and concepts are emphasized.
          </p>
          <p>The first work in this regard is a paper on serial position effects.</p>
          <p>
            The effect, being one of the oldest phenomena in psychological
basic research [
            <xref ref-type="bibr" rid="ref74 ref75 ref76">48, 49, 50</xref>
            ], is characterized by the fact that items
presented in a list or sequence are better memorized when presented at
the beginning or the end of the list. In our work [
            <xref ref-type="bibr" rid="ref1 ref27">1</xref>
            ] we could show
that changing the sequence of items significantly influences the recall
of the items and this offers a possibility to influence the interaction
between a consumer and a computer system on the level of
presentation. Depending on the motives and needs that drive the consumer
(e.g. involvement, confidence, type of decision, willingness to invest
efforts) important information can be put in the sequence where it has
the highest probability to be perceived and memorized for further
usage. Figure 3 is shows the effect on the recall of items by simply
changing their order. The list used in the study contained features of
digital cameras (pixels, storage, zoom). Only the order of items was
manipulated but this significantly increased their recall.
          </p>
          <p>
            A more recent work which builds upon the work on serial position
effects was carried out in the domain of group decision making [
            <xref ref-type="bibr" rid="ref78">52</xref>
            ].
          </p>
          <p>Making decisions in groups, for example choosing a dinner with a
business partner or deciding what movie to watch with friends in a
cinema always involves psychological phenomena on the individual
as well as on the group level. Decisions derived in group situations
are influenced by rhetoric skills of the participants, negotiation
techniques applied, leadership competency and other personality factors.</p>
          <p>
            In contrast to this real-time and synchronous approach, an online tool
supports asynchronous and sequential decision procedures.
Psychological concepts that could have an impact in this kind of decision
process are, for example, originating from research groups who
developed the prospect theory [
            <xref ref-type="bibr" rid="ref11 ref14 ref37 ref40">11, 14</xref>
            ]. One group of effects are
anchoring or framing effects, or more general, context effects [
            <xref ref-type="bibr" rid="ref77 ref79">53, 51</xref>
            ].
          </p>
          <p>A following small example illustrates their influence. To be able to
sketch a financial plan it is necessary to have a starting point, the
anchor stimulus. This starting point is typically the amount of money
that has to be financed. A strategy that is frequently used in
advertising is not to use the whole amount for evaluation (for example,
100.000 are needed + overhead costs) but the monthly rate (for
example 500). Within the study we investigated alternatives of presenting
information and were interest in the possibilities of manipulating
serial position effects and other form of presentation, concretely based
on the multi attribute utility model (MAUT). The results showed that
MAUT concepts can counteract serial position effects and insofar
represent an appropriate means to steer decision processes. Figure 4
is showing an example screen of the CHOICLA group decision
support tool on which preferences can be declared based on multiple
attributes.</p>
          <p>
            The last empirical work presented was focused on persuasion [
            <xref ref-type="bibr" rid="ref80">54</xref>
            ]
and the potentials of the asymmetric dominance effect, better known
as decoy effect [
            <xref ref-type="bibr" rid="ref81">55</xref>
            ]. This concept has also a relation to anchoring and
framing effects which can be manipulated. In contrast to the example
above where information is hidden or presented in another form, the
decoy effect uses the influence of adding additional information to
a decision situation. Adding a decoy element is intended to divert
or even disturb the attentive processes of a potential consumer and
open a new perspective to him or her to lead a decision in a certain
direction, to persuade a user to purchase a product or to initiate a
preference construction which would not have been started without
the distractive element. In our paper we investigated the asymmetric
dominance effect and could show possibilities how to integrate them
into recommender systems. Figure 5 is showing a decoy situation.
          </p>
          <p>
            Before introducing the decoy element (D) two products are available
to the customer, C (competitor product) and T (target product). C is
characterized by a lower price, but also by lower quality than T. As
price is one of the most important dimensions in purchase decisions
[
            <xref ref-type="bibr" rid="ref26 ref52">26</xref>
            ] consumers tend to buy C. With introducing the decoy D which
has a lower quality than T, but a higher price, the focus of attention is
directed to quality. This new perspective is not only of advantage for
the provider (because of higher revenue) but also for the consumer
(because of higher quality and satisfaction with the product).
          </p>
          <p>.
7</p>
          <p>Discussion and Conclusions
In this paper we have tried to emphasise the potentials of
psychological theories to enhance the quality of interaction between users and
computerised systems based on recommender technology. The
theoretical basis builds a selection of psychological concepts and
theories which have been empirically investigated in numerous studies
and proved themselves as being relevant in the context of consumer
behaviour. An increased consideration of knowledge from
psychology could enhance the quality of recommender systems, specifically
on the level of the user interface. The different types of decisions
related to consumer behaviour were discussed and possibilities of
recommender systems to support such decisions were exemplified.</p>
          <p>The technology acceptance model serves as a basis for further
research in this area because it already integrates many of the relevant
psychological concepts and theories that have been demonstrated to
be influential in the context of consumer behaviour. With an
appropriate consideration of this knowledge, recommender systems could
overcome the disadvantages online system have in comparison to
offline interaction between consumers and, for example, shop
assistants. The advantages of recommender systems such as their
capabilities of processing huge amounts of data, selecting the correct
products from millions of alternatives, and calculating the best product
for are consumer within a few seconds could be exploited in a better
way if not only the back-end functionalities but also the front-end,
the interface to the customer is enhanced in an appropriate way.</p>
          <p>
            Although our work is addressing different domains, the
conceptual work sketched and the empirical studies performed are also
applicable to the financial sector. Specifically of interest in this
regard are the different types of decisions driving potential customers
and motivating them to use an online system, choosing a product or
service, changing parts of his or her financial portfolio. In the
context of recent developments in the financial sector (e.g., merging of
banks and insurance companies, closing of branches) the importance
of online services will increase. Appropriate systems supporting the
different needs, motives of end consumers, and also respecting the
different levels of efforts people are willing to invest into financial
decisions will be more important than ever before. Recommender
systems integrating psychological aspect and simulating a ”human
image” [
            <xref ref-type="bibr" rid="ref62">36</xref>
            ] could fill the arising gaps. With the system MYLIFE,
an award winning platform, we could demonstrate respective
possibilities. MYLIFE is an online platform enabling insurance agents
together with end consumers to manage the consumer’s financial
portfolio in a cooperative partnership instead of putting the consumer in
the role of a ”supplicant” towards financial service providers. The
system consists of an intelligent algorithmic basis FASTDIAG [
            <xref ref-type="bibr" rid="ref82">56</xref>
            ]
and an appropriate user interface visualizing in an integrated fashion
the finance portfolio of a customer.
          </p>
          <p>The empirical work presented can only be seen as the starting
point in the endeavour of enhancing human recommender
interaction in the emphasized way. An unresolved problem in this regard is,
for example, how a recommender system could find out what
strategy a consumer is currently applying (e.g. extensive or limited
decision) and to change the presentation of information accordingly.</p>
          <p>There are of course domains where one strategy is the most
probable one (e.g. financing a real estate are probably based on extensive
and central route elaboration) but further research is necessary to
address this problem. Of course transferring services form offline to
online does not only have advantages. In the context of current
developments in regard to privacy and business ethics this opens new
challenges which are influencing the orientation of future research
activities. Our major goal is to complete the ”puzzle” of which we
have already identified elements in our past research work.</p>
        </sec>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bangor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Kortum</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Miller</surname>
          </string-name>
          , '
          <article-title>An Empirical Evaluation of the System Usability Scale (SUS)'</article-title>
          ,
          <source>International Journal of HumanComputer Interaction</source>
          ,
          <volume>24</volume>
          (
          <issue>6</issue>
          ),
          <fpage>574</fpage>
          -
          <lpage>594</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          , '
          <article-title>Knowledge-based recommender systems'</article-title>
          ,
          <source>Encyclopedia of Library and Information Systems</source>
          ,
          <volume>69</volume>
          (
          <issue>32</issue>
          ),
          <fpage>180</fpage>
          -
          <lpage>200</lpage>
          , (
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Goeker</surname>
          </string-name>
          , '
          <article-title>Recommender systems: An overview'</article-title>
          ,
          <source>AI Magazine</source>
          ,
          <volume>32</volume>
          (
          <issue>3</issue>
          ),
          <fpage>13</fpage>
          -
          <lpage>18</lpage>
          , (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Hammond</surname>
          </string-name>
          , '
          <article-title>The FindMe Approach to Assisted Browsing'</article-title>
          ,
          <source>IEEE Expert</source>
          ,
          <volume>32</volume>
          -
          <fpage>40</fpage>
          , (
          <year>1997</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ramezani</surname>
          </string-name>
          , '
          <article-title>Matching recommendation technologies and domains'</article-title>
          ,
          <source>in Recommender Systems Handbook</source>
          ,
          <fpage>367</fpage>
          -
          <lpage>386</lpage>
          , Springer, (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>J. de Kleer</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Mackworth</surname>
            , and
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Reiter</surname>
          </string-name>
          , '
          <article-title>Characterizing diagnoses and systems'</article-title>
          ,
          <source>AI Journal</source>
          ,
          <volume>56</volume>
          (
          <fpage>197</fpage>
          -
          <lpage>222</lpage>
          ),
          <fpage>57</fpage>
          -
          <lpage>95</lpage>
          , (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Fano</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kurth</surname>
          </string-name>
          , '
          <article-title>Personal Choice Point: Helping Users Visualize What it Means to Buy a BMW'</article-title>
          ,
          <source>in International Conference on Intelligent User Interfaces IUI'03</source>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>52</lpage>
          , Miami, FL, USA, (
          <year>2003</year>
          ). ACM, New York, USA.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Burke</surname>
          </string-name>
          , '
          <article-title>Constraint-based recommender systems: Technologies and research issues'</article-title>
          ,
          <source>in IEEE ICEC'08</source>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>26</lpage>
          , Innsbruck, Austria, (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Friedrich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanker</surname>
          </string-name>
          , '
          <article-title>An environment for the development of knowledge-based recommender applications'</article-title>
          ,
          <source>International Journal of Electronic Commerce (IJEC)</source>
          ,
          <volume>11</volume>
          (
          <issue>2</issue>
          ),
          <fpage>11</fpage>
          -
          <lpage>34</lpage>
          , (
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Haas</surname>
          </string-name>
          , G. Ninaus,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schwarz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ulz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Stettinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Isak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jeran</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Reiterer</surname>
          </string-name>
          , '
          <article-title>RecTurk: Constraint-based Recommendation based on Human Computation'</article-title>
          ,
          <source>in RecSys 2014 CrowdRec Workshop</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <string-name>
            <given-names>Foster</given-names>
            <surname>City</surname>
          </string-name>
          , CA, USA, (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Isak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Szabo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Zachar</surname>
          </string-name>
          , '
          <source>The VITA Financial Services Sales Support Environment'</source>
          , pp.
          <fpage>1692</fpage>
          -
          <lpage>1699</lpage>
          , Vancouver, Canada, (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiener</surname>
          </string-name>
          , '
          <article-title>Knowledge-based Interactive Selling of Financial Services with FSAdvisor'</article-title>
          ,
          <source>in 17th Innovative Applications of Artificial Intelligence Conference (IAAI05)</source>
          , pp.
          <fpage>1475</fpage>
          -
          <lpage>1482</lpage>
          , Pittsburgh, Pennsylvania, (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schubert</surname>
          </string-name>
          , G. Friedrich,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mandl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mairitsch</surname>
          </string-name>
          , and E. Teppan, '
          <article-title>Plausible repairs for inconsistent requirements'</article-title>
          ,
          <source>in 21st International Joint Conference on Artificial Intelligence (IJCAI'09)</source>
          , pp.
          <fpage>791</fpage>
          -
          <lpage>796</lpage>
          , Pasadena, CA, (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schubert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Reiterer</surname>
          </string-name>
          , '
          <article-title>Personalized diagnosis for over-constrained problems'</article-title>
          ,
          <source>in 23rd International Conference on Artificial Intelligence (IJCAI</source>
          <year>2013</year>
          ), pp.
          <fpage>1990</fpage>
          -
          <lpage>1996</lpage>
          , Peking, China.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Schubert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Zehentner</surname>
          </string-name>
          , '
          <article-title>An Efficient Diagnosis Algorithm for Inconsistent Constraint Sets'</article-title>
          ,
          <source>Artificial Intelligence for Engineering Design, Analysis, and Manufacturing (AIEDAM)</source>
          ,
          <volume>25</volume>
          (
          <issue>2</issue>
          ),
          <fpage>175</fpage>
          -
          <lpage>184</lpage>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Zehentner</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Blazek</surname>
          </string-name>
          , 'Corediag:
          <article-title>Eliminating redundancy in constraint sets'</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>G.</given-names>
            <surname>Friedrich</surname>
          </string-name>
          , '
          <article-title>Elimination of spurious explanations'</article-title>
          ,
          <source>in European Conference on Artificial Intelligence (ECAI</source>
          <year>2004</year>
          ), pp.
          <fpage>813</fpage>
          -
          <lpage>817</lpage>
          , Valencia, Spain, (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Hacker</surname>
          </string-name>
          and L. VonAhn, '
          <article-title>Matchin: Eliciting User Preferences with an Online Game'</article-title>
          ,
          <source>in CHI'09</source>
          , pp.
          <fpage>1207</fpage>
          -
          <lpage>1216</lpage>
          , (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          and
          <string-name>
            <given-names>U.</given-names>
            <surname>Bundgaard-Joergensen</surname>
          </string-name>
          ,
          <article-title>'SAT: A Web-Based Interactive Advisor for Investor-Ready Business Plans'</article-title>
          ,
          <source>in Intl. Conference on e-Business (ICE-B</source>
          <year>2007</year>
          ), pp.
          <fpage>99</fpage>
          -
          <lpage>106</lpage>
          , (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , and G. Friedrich,
          <string-name>
            <surname>Recommender</surname>
            <given-names>Systems</given-names>
          </string-name>
          , Cambridge University Press,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>G.</given-names>
            <surname>Leitner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fercher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hitz</surname>
          </string-name>
          , '
          <article-title>Reducing the Entry Threshold of AAL Systems: Preliminary Results from Casa Vecchia'</article-title>
          ,
          <source>in 13th Intl. Conference on Computers Helping People with Special Needs</source>
          , pp.
          <fpage>709</fpage>
          -
          <lpage>715</lpage>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>B.</given-names>
            <surname>Peischl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Nica</surname>
          </string-name>
          , and W. Schmid, '
          <article-title>Constraint-based Recommendation for Software Project Effort Estimation'</article-title>
          ,
          <source>Journal of Emerging Technologies in Web Intelligence</source>
          ,
          <volume>2</volume>
          (
          <issue>4</issue>
          ),
          <fpage>282</fpage>
          -
          <lpage>290</lpage>
          , (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>I.</given-names>
            <surname>Pribik</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , '
          <article-title>Towards Persuasive Technology for Software Development Environments: An Empirical Study'</article-title>
          ,
          <source>in Persuasive Technology Conference (Persuasive</source>
          <year>2012</year>
          ), pp.
          <fpage>227</fpage>
          -
          <lpage>238</lpage>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>R.</given-names>
            <surname>Reiter</surname>
          </string-name>
          , '
          <article-title>A theory of diagnosis from first principles'</article-title>
          ,
          <source>AI Journal</source>
          ,
          <volume>23</volume>
          (
          <issue>1</issue>
          ),
          <fpage>57</fpage>
          -
          <lpage>95</lpage>
          , (
          <year>1987</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Reiterer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Blazek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Leitner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Reinfrank</surname>
          </string-name>
          , and G. Ninaus, '
          <article-title>WeeVis', in Knowledge-based Configuration -</article-title>
          From Research to Business Cases, eds.,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Hotz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Bagley</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Tiihonen</surname>
          </string-name>
          , chapter
          <volume>25</volume>
          ,
          <fpage>365</fpage>
          -
          <lpage>376</lpage>
          , Morgan Kaufmann Publishers, (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>L. VonAhn</surname>
          </string-name>
          , 'Human Computation',
          <source>in Technical Report CM-CS-05- 193</source>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Felfernig</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedrich</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gula</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hitz</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kruggel</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melcher</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Riepan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Strauss</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teppan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Vitouch</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Persuasive recommendation: serial position effects in knowledge-based recommender systems</article-title>
          .
          <source>In: Persuasive Technology</source>
          ,
          <fpage>283</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Adomavicius</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tuzhilin</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. Knowledge and Data Engineering</article-title>
          , IEEE Transactions on,
          <volume>17</volume>
          (
          <issue>6</issue>
          ),
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Konstan</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>B. N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maltz</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herlocker</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gordon</surname>
            ,
            <given-names>L. R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Riedl</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1997</year>
          ).
          <article-title>GroupLens: applying collaborative filtering to Usenet news</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>40</volume>
          (
          <issue>3</issue>
          ),
          <fpage>77</fpage>
          -
          <lpage>87</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>de Gemmis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Felfernig</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lops</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricci</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Semeraro</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Human decision making and recommender systems</article-title>
          .
          <source>ACM Transactions on Interactive Intelligent Systems (TiiS)</source>
          ,
          <volume>3</volume>
          (
          <issue>3</issue>
          ),
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Louis</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Boo</surname>
          </string-name>
          .
          <article-title>com goes bust. The Boo.com post-mortem, from an insider</article-title>
          . http://www.tnl.net/blog/2000/05/19/ boocom-goes-bust/
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Venkatesh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , &amp; Bala,
          <string-name>
            <surname>H.</surname>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Technology acceptance model 3 and a research agenda on interventions</article-title>
          .
          <source>Decision sciences</source>
          ,
          <volume>39</volume>
          (
          <issue>2</issue>
          ),
          <fpage>273</fpage>
          -
          <lpage>315</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Shim</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Warkentin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Courtney</surname>
            ,
            <given-names>J. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Power</surname>
            ,
            <given-names>D. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharda</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Carlsson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2002</year>
          ).
          <article-title>Past, present, and future of decision support technology</article-title>
          .
          <source>Decision support systems</source>
          ,
          <volume>33</volume>
          (
          <issue>2</issue>
          ),
          <fpage>111</fpage>
          -
          <lpage>126</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Bell</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          (
          <year>1999</year>
          )
          <article-title>Image and consumer attraction to intra-urban retail areas: An environmental psychology approach</article-title>
          ,
          <source>Journal of Retailing and Consumer Services</source>
          , Volume
          <volume>6</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>2</given-names>
          </string-name>
          ,
          <fpage>67</fpage>
          -
          <lpage>78</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Koufaris</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2002</year>
          ).
          <article-title>Applying the technology acceptance model and flow theory to online consumer behavior</article-title>
          .
          <source>Information systems research</source>
          ,
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <fpage>205</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Simon</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          (
          <year>1955</year>
          ).
          <article-title>A behavioral model of rational choice</article-title>
          ,
          <source>Quarterly Journal of Economics</source>
          <volume>69</volume>
          ,
          <fpage>99</fpage>
          -
          <lpage>118</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Tversky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kahneman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          (
          <year>1986</year>
          )
          <article-title>Rational Choice and the Framing of Decisions</article-title>
          .
          <source>Journal of Business</source>
          ,
          <volume>59</volume>
          /4,Part 2,
          <fpage>251</fpage>
          -
          <lpage>278</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>1998</year>
          )
          <article-title>Stressfaktoren, Stresserleben und subjektive Attributionsmuster</article-title>
          .
          <source>Diploma Thesis</source>
          , University of Vienna.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mitrea</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Fercher</surname>
            ,
            <given-names>A. J.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Towards an Acceptance Model for AAL</article-title>
          .
          <source>In Human Factors in Computing and Informatics</source>
          <volume>672</volume>
          - 679.
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Kahneman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Tversky</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>1979</year>
          ).
          <article-title>Prospect theory: An analysis of decision under risk</article-title>
          .
          <source>Econometrica: Journal of the Econometric Society</source>
          ,
          <fpage>263</fpage>
          -
          <lpage>291</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Rotter</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          (
          <year>1990</year>
          ).
          <article-title>Internal versus external control of reinforcement: A case history of a variable</article-title>
          .
          <source>American psychologist</source>
          ,
          <volume>45</volume>
          (
          <issue>4</issue>
          ),
          <fpage>489</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Kelley</surname>
            ,
            <given-names>H. H.</given-names>
          </string-name>
          (
          <year>1973</year>
          ).
          <article-title>The processes of causal attribution</article-title>
          .
          <source>American psychologist</source>
          ,
          <volume>28</volume>
          (
          <issue>2</issue>
          ),
          <fpage>107</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Weiner</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>An attribution theory of motivation</article-title>
          .
          <source>Handbook of theories of social psychology</source>
          ,
          <volume>1</volume>
          ,
          <fpage>135</fpage>
          -
          <lpage>155</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Ajzen</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>1991</year>
          ).
          <article-title>The theory of planned behavior. Organizational behavior and human decision processes</article-title>
          ,
          <volume>50</volume>
          (
          <issue>2</issue>
          ),
          <fpage>179</fpage>
          -
          <lpage>211</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Fishbein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1979</year>
          ).
          <article-title>A theory of reasoned action: some applications and implications</article-title>
          . In: Howe et al..
          <volume>65</volume>
          -
          <fpage>116</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Smith</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levin</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>1998</year>
          )
          <article-title>Need for Cognition and Choice Framing Effects</article-title>
          ,
          <source>Journal of Behavioral Decision Making</source>
          ,
          <volume>9</volume>
          (
          <issue>4</issue>
          ):
          <fpage>283</fpage>
          -
          <lpage>290</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref47">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Haugtvedt</surname>
            ,
            <given-names>C. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petty</surname>
            ,
            <given-names>R. E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Cacioppo</surname>
            ,
            <given-names>J. T.</given-names>
          </string-name>
          (
          <year>1992</year>
          ).
          <article-title>Need for cognition and advertising: Understanding the role of personality variables in consumer behavior</article-title>
          .
          <source>Journal of Consumer Psychology</source>
          ,
          <volume>1</volume>
          (
          <issue>3</issue>
          ),
          <fpage>239</fpage>
          -
          <lpage>260</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref48">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Festinger</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>1962</year>
          ).
          <article-title>A theory of cognitive dissonance</article-title>
          (Vol.
          <volume>2</volume>
          ). Stanford university press.
        </mixed-citation>
      </ref>
      <ref id="ref49">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Brehm</surname>
            ,
            <given-names>J. W.</given-names>
          </string-name>
          (
          <year>1966</year>
          ).
          <article-title>A theory of psychological reactance</article-title>
          . Academic Press.
        </mixed-citation>
      </ref>
      <ref id="ref50">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Csikszentmihalyi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>1990</year>
          ).
          <article-title>Flow: The Psychology of Optimal Performance</article-title>
          . Cambridge University Press.
        </mixed-citation>
      </ref>
      <ref id="ref51">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Felser</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Werbe-und Konsumentenpsychologie</article-title>
          . Spektrum.
        </mixed-citation>
      </ref>
      <ref id="ref52">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Weinberg</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <article-title>Gr o¨ppel-</article-title>
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kroeber-Riel</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2003</year>
          ). Konsumentenverhalten. Vahlen.
        </mixed-citation>
      </ref>
      <ref id="ref53">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Beckett</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hewer</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Howcroft</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>An exposition of consumer behaviour in the financial services industry</article-title>
          .
          <source>International Journal of Bank Marketing</source>
          ,
          <volume>18</volume>
          (
          <issue>1</issue>
          ),
          <fpage>15</fpage>
          -
          <lpage>26</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref54">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Donahue</surname>
            ,
            <given-names>G.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weinschenk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nowicki</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>1999</year>
          ). Usability Is Good Business. http://half-tide.net/ UsabilityCost-BenefitPaper.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref55">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Van Pelt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hey</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Using TRIZ and human-centered design for consumer product development</article-title>
          .
          <source>Procedia Engineering</source>
          ,
          <volume>9</volume>
          ,
          <fpage>688</fpage>
          -
          <lpage>693</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref56">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Lohse</surname>
            ,
            <given-names>G. J. L.</given-names>
          </string-name>
          (
          <year>2000</year>
          ).
          <article-title>Usability and profits in the digital economy</article-title>
          .
          <source>In People and Computers XIV Usability or Else!</source>
          ,
          <fpage>3</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref57">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Lohse</surname>
            ,
            <given-names>G. L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Spiller</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>1999</year>
          ).
          <article-title>Internet retail store design: How the user interface influences traffic and sales</article-title>
          .
          <source>Journal of Computer Mediated Communication</source>
          ,
          <volume>5</volume>
          (
          <issue>2</issue>
          ),
          <fpage>0</fpage>
          -
          <lpage>0</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref58">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Marcotte</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Responsive web design</article-title>
          .
          <source>Editions Eyrolles.</source>
        </mixed-citation>
      </ref>
      <ref id="ref59">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Wroblewski</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>Mobile first</article-title>
          . Editions Eyrolles.
        </mixed-citation>
      </ref>
      <ref id="ref60">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Burke</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2002</year>
          .
          <article-title>Hybrid recommender systems: Survey and</article-title>
          <string-name>
            <given-names>Experiments. User</given-names>
            <surname>Model</surname>
          </string-name>
          .
          <source>User-Adapt. Interact</source>
          .
          <volume>12</volume>
          ,
          <issue>4</issue>
          ,
          <fpage>180</fpage>
          -
          <lpage>200</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref61">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Karat</surname>
            ,
            <given-names>C. M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Blom</surname>
            ,
            <given-names>J. O</given-names>
          </string-name>
          . (Eds.). (
          <year>2004</year>
          ).
          <article-title>Designing personalized user experiences in eCommerce</article-title>
          (Vol.
          <volume>5</volume>
          ). Springer Science &amp; Business Media.
        </mixed-citation>
      </ref>
      <ref id="ref62">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Blom</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2002</year>
          ).
          <article-title>A theory of personalized recommendations</article-title>
          .
          <source>In CHI'02 Extended Abstracts on Human Factors in Computing Systems</source>
          ,
          <volume>540</volume>
          -
          <fpage>541</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref63">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Weibelzahl</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Evaluation of adaptive systems</article-title>
          ,
          <source>In: User Modeling 2001. LNAI 2109</source>
          ,
          <fpage>292</fpage>
          -
          <lpage>294</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref64">
        <mixed-citation>
          [38]
          <string-name>
            <surname>Swearingen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Sinha</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2001</year>
          ,
          <article-title>September)</article-title>
          .
          <article-title>Beyond algorithms: An HCI perspective on recommender systems</article-title>
          .
          <source>In ACM SIGIR 2001 Workshop on Recommender Systems</source>
          , Vol.
          <volume>13</volume>
          , No.
          <fpage>5</fpage>
          -
          <issue>6</issue>
          ,
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref65">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>Davis</given-names>
            <surname>Jr</surname>
          </string-name>
          ,
          <string-name>
            <surname>F. D.</surname>
          </string-name>
          (
          <year>1986</year>
          ).
          <article-title>A technology acceptance model for empirically testing new end-user information systems: Theory and results</article-title>
          .
          <source>Doctoral dissertation</source>
          , Massachusetts Institute of Technology.
        </mixed-citation>
      </ref>
      <ref id="ref66">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Venkatesh</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <article-title>Theoretical models of Acceptance http: //www</article-title>
          .vvenkatesh.com/it/organizations/ theoretical-models.asp
        </mixed-citation>
      </ref>
      <ref id="ref67">
        <mixed-citation>
          [41]
          <string-name>
            <surname>Gefen</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karahanna</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Straub</surname>
            ,
            <given-names>D. W.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Trust and TAM in online shopping: An integrated model</article-title>
          .
          <source>MIS quarterly</source>
          ,
          <volume>27</volume>
          (
          <issue>1</issue>
          ),
          <fpage>51</fpage>
          -
          <lpage>90</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref68">
        <mixed-citation>
          [42]
          <string-name>
            <surname>Benbasat</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          (
          <year>2005</year>
          ).
          <article-title>Trust in and adoption of online recommendation agents</article-title>
          .
          <source>Journal of the Association for Information Systems</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          ),
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref69">
        <mixed-citation>
          [43]
          <string-name>
            <surname>Pavlou</surname>
            ,
            <given-names>P. A.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model</article-title>
          .
          <source>International journal of electronic commerce</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ),
          <fpage>101</fpage>
          -
          <lpage>134</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref70">
        <mixed-citation>
          [44]
          <string-name>
            <surname>Suh</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Han</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Effect of trust on customer acceptance of Internet banking</article-title>
          .
          <source>Electronic Commerce research and applications</source>
          ,
          <volume>1</volume>
          (
          <issue>3</issue>
          ),
          <fpage>247</fpage>
          -
          <lpage>263</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref71">
        <mixed-citation>
          [45]
          <string-name>
            <surname>McKechnie</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Winklhofer</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ennew</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Applying the technology acceptance model to the online retailing of financial services</article-title>
          .
          <source>International Journal of Retail &amp; Distribution Management</source>
          ,
          <volume>34</volume>
          (
          <issue>4</issue>
          /5),
          <fpage>388</fpage>
          -
          <lpage>410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref72">
        <mixed-citation>
          [46]
          <string-name>
            <surname>Pikkarainen</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pikkarainen</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karjaluoto</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Pahnila</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2004</year>
          ).
          <article-title>Consumer acceptance of online banking: an extension of the technology acceptance model</article-title>
          .
          <source>Internet research</source>
          ,
          <volume>14</volume>
          (
          <issue>3</issue>
          ),
          <fpage>224</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref73">
        <mixed-citation>
          [47]
          <string-name>
            <surname>Featherman</surname>
            ,
            <given-names>M. S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Pavlou</surname>
            ,
            <given-names>P. A.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Predicting e-services adoption: a perceived risk facets perspective</article-title>
          .
          <source>International journal of humancomputer studies</source>
          ,
          <volume>59</volume>
          (
          <issue>4</issue>
          ),
          <fpage>451</fpage>
          -
          <lpage>474</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref74">
        <mixed-citation>
          [48]
          <string-name>
            <surname>Kirkpatrick</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          (
          <year>1894</year>
          ).
          <article-title>An experimental study of memory</article-title>
          .
          <source>Psychological Review</source>
          ,
          <volume>1</volume>
          (
          <issue>6</issue>
          ),
          <fpage>602</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref75">
        <mixed-citation>
          [49]
          <string-name>
            <surname>Ebbinghaus</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Memory: A contribution to experimental psychology</article-title>
          .
          <source>Annals of neurosciences</source>
          ,
          <volume>20</volume>
          (
          <issue>4</issue>
          ),
          <fpage>155</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref76">
        <mixed-citation>
          [50]
          <string-name>
            <surname>Gershberg</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shimamura</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          (
          <year>1994</year>
          )
          <article-title>Serial position effects in implicit and explicit tests of memory</article-title>
          ,
          <source>Journal of Experimental Psychology: Learning, Memory, and Cognition</source>
          ,
          <volume>20</volume>
          ,
          <fpage>1370</fpage>
          -
          <lpage>1378</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref77">
        <mixed-citation>
          [51]
          <string-name>
            <surname>Simonson</surname>
            ,
            <given-names>I. Tversky</given-names>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          (
          <year>1992</year>
          )
          <article-title>Choice in Context: Tradeoff Contrast and Extremeness Aversion</article-title>
          ,
          <source>Journal of Marketing Research</source>
          ,
          <volume>29</volume>
          .
          <fpage>281</fpage>
          -
          <lpage>295</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref78">
        <mixed-citation>
          [52]
          <string-name>
            <surname>Stettinger</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Felfernig</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reiterer</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jeran</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Counteracting Serial Position Effects in the CHOICLA Group Decision Support Environment</article-title>
          .
          <source>In Proceedings of the 20th International Conference on Intelligent User Interfaces</source>
          ,
          <fpage>148</fpage>
          -
          <lpage>157</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref79">
        <mixed-citation>
          [53]
          <string-name>
            <surname>Hamilton</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2003</year>
          )
          <article-title>Why Do People Suggest What They Do Not Want? Using Context Effects to Influence Others Choices</article-title>
          ,
          <source>Journal of Consumer Research</source>
          ,
          <volume>29</volume>
          ,
          <fpage>492</fpage>
          -
          <lpage>506</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref80">
        <mixed-citation>
          [54]
          <string-name>
            <surname>Felfernig</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gula</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leitner</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melcher</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Teppan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Persuasion in knowledge-based recommendation</article-title>
          .
          <source>In Persuasive Technology</source>
          ,
          <fpage>71</fpage>
          -
          <lpage>82</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref81">
        <mixed-citation>
          [55]
          <string-name>
            <surname>Huber</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Payne</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puto</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>1982</year>
          )
          <article-title>Adding Asymmetrically Dominated Alternatives: Violations of Regularity and the Similarity Hypothesis</article-title>
          ,
          <source>Journal of Consumer Research</source>
          ,
          <volume>9</volume>
          ,
          <fpage>90</fpage>
          -
          <lpage>98</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref82">
        <mixed-citation>
          [56]
          <string-name>
            <surname>Felfernig</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schubert</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Zehentner</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2012</year>
          )
          <article-title>An Efficient Diagnosis Algorithm for Inconsistent Constraint Sets, Artificial Intelligence for Engineering Design, Analysis,</article-title>
          and
          <string-name>
            <surname>Manufacturing</surname>
          </string-name>
          (AIEDAM), Cambridge University Press,
          <volume>26</volume>
          (
          <issue>1</issue>
          ),
          <fpage>53</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>