{"id":"https://openalex.org/W4414272458","doi":"https://doi.org/10.1109/ichms65439.2025.11154183","title":"Systematic Prompt Framework for Qualitative Data Analysis: Designing System and User Prompts","display_name":"Systematic Prompt Framework for Qualitative Data Analysis: Designing System and User Prompts","publication_year":2025,"publication_date":"2025-05-26","ids":{"openalex":"https://openalex.org/W4414272458","doi":"https://doi.org/10.1109/ichms65439.2025.11154183"},"language":"en","primary_location":{"id":"doi:10.1109/ichms65439.2025.11154183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ichms65439.2025.11154183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 5th International Conference on Human-Machine Systems (ICHMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5117317772","display_name":"Aisvarya Adeseye","orcid":"https://orcid.org/0009-0003-2401-3076"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Aisvarya Adeseye","raw_affiliation_strings":["University of Turku,Department of Computing,Turku,Finland"],"affiliations":[{"raw_affiliation_string":"University of Turku,Department of Computing,Turku,Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055846108","display_name":"Jouni Isoaho","orcid":"https://orcid.org/0000-0002-5789-3992"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Jouni Isoaho","raw_affiliation_strings":["University of Turku,Department of Computing,Turku,Finland"],"affiliations":[{"raw_affiliation_string":"University of Turku,Department of Computing,Turku,Finland","institution_ids":["https://openalex.org/I155660961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035027638","display_name":"Mohammad Tahir","orcid":"https://orcid.org/0000-0002-6273-4603"},"institutions":[{"id":"https://openalex.org/I155660961","display_name":"University of Turku","ror":"https://ror.org/05vghhr25","country_code":"FI","type":"education","lineage":["https://openalex.org/I155660961"]}],"countries":["FI"],"is_corresponding":false,"raw_author_name":"Mohammad Tahir","raw_affiliation_strings":["University of Turku,Department of Computing,Turku,Finland"],"affiliations":[{"raw_affiliation_string":"University of Turku,Department of Computing,Turku,Finland","institution_ids":["https://openalex.org/I155660961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5117317772"],"corresponding_institution_ids":["https://openalex.org/I155660961"],"apc_list":null,"apc_paid":null,"fwci":18.8549,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.99100701,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"229","last_page":"234"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13051","display_name":"Qualitative Comparative Analysis Research","score":0.6739000082015991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13051","display_name":"Qualitative Comparative Analysis Research","score":0.6739000082015991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12880","display_name":"Qualitative Research Methods and Applications","score":0.6507999897003174,"subfield":{"id":"https://openalex.org/subfields/3304","display_name":"Education"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6370000243186951},{"id":"https://openalex.org/keywords/margin","display_name":"Margin (machine learning)","score":0.4943999946117401},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.42800000309944153},{"id":"https://openalex.org/keywords/qualitative-property","display_name":"Qualitative property","score":0.4027000069618225},{"id":"https://openalex.org/keywords/leakage","display_name":"Leakage (economics)","score":0.36160001158714294},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.3531999886035919},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.34200000762939453},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.33489999175071716}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7516999840736389},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6370000243186951},{"id":"https://openalex.org/C774472","wikidata":"https://www.wikidata.org/wiki/Q6760393","display_name":"Margin (machine learning)","level":2,"score":0.4943999946117401},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.42800000309944153},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.41940000653266907},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4189000129699707},{"id":"https://openalex.org/C87156501","wikidata":"https://www.wikidata.org/wiki/Q7268708","display_name":"Qualitative property","level":2,"score":0.4027000069618225},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.36160001158714294},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3531999886035919},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.35010001063346863},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.34200000762939453},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.34049999713897705},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.33489999175071716},{"id":"https://openalex.org/C3018587665","wikidata":"https://www.wikidata.org/wiki/Q7268696","display_name":"Qualitative analysis","level":3,"score":0.3257000148296356},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3172999918460846},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.3160000145435333},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.31150001287460327},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.29789999127388},{"id":"https://openalex.org/C2779982483","wikidata":"https://www.wikidata.org/wiki/Q6094420","display_name":"Iterative refinement","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C2983685735","wikidata":"https://www.wikidata.org/wiki/Q5227355","display_name":"Data source","level":2,"score":0.2858999967575073},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.2824999988079071},{"id":"https://openalex.org/C3018397939","wikidata":"https://www.wikidata.org/wiki/Q3644502","display_name":"Open source","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2750000059604645},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.2736000120639801},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.27160000801086426},{"id":"https://openalex.org/C2777655877","wikidata":"https://www.wikidata.org/wiki/Q3475740","display_name":"Design science research","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C2776945810","wikidata":"https://www.wikidata.org/wiki/Q17006654","display_name":"Data anonymization","level":3,"score":0.25220000743865967},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ichms65439.2025.11154183","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ichms65439.2025.11154183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 5th International Conference on Human-Machine Systems (ICHMS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W4246562710","https://openalex.org/W4378387269","https://openalex.org/W4388654530","https://openalex.org/W4390023570","https://openalex.org/W4390638022","https://openalex.org/W4396832834","https://openalex.org/W4396832972","https://openalex.org/W4396833147","https://openalex.org/W4402667158","https://openalex.org/W4405922624","https://openalex.org/W4410636349"],"related_works":[],"abstract_inverted_index":{"Prompt":[0],"engineering":[1],"has":[2],"become":[3],"an":[4],"important":[5],"aspect":[6],"in":[7,16,121],"optimizing":[8],"the":[9],"performance":[10],"of":[11,78],"large":[12],"language":[13],"models":[14],"(LLMs)":[15],"diverse":[17],"applications.":[18],"This":[19],"research":[20],"proposes":[21],"a":[22],"systematic":[23],"framework":[24,43],"for":[25,66,70,96,142],"system":[26],"and":[27,38,52,75,89,119,124],"user":[28],"prompts":[29],"by":[30],"utilizing":[31],"few-shot":[32],"learning,":[33],"chain-of-thought":[34],"reasoning,":[35],"role":[36],"play":[37],"iterative":[39],"refinement.":[40],"The":[41,112,129],"proposed":[42],"was":[44],"evaluated":[45],"on":[46,55],"open":[47],"source":[48],"LLMs,":[49],"Llama,":[50],"Gemma,":[51],"Phi,":[53],"running":[54],"local":[56,81],"machines":[57],"to":[58,62,86],"underscore":[59],"their":[60],"capability":[61],"enhance":[63],"LLMs'":[64],"outputs":[65],"qualitative":[67],"data":[68,87],"analysis":[69,133],"interview":[71],"transcripts":[72],"about":[73],"security":[74,123],"privacy":[76,100,125],"issues":[77],"gamification.":[79,128],"Utilizing":[80],"LLMs":[82],"eliminates":[83],"concerns":[84,101,126],"related":[85],"leakage":[88],"privacy,":[90],"making":[91],"this":[92],"approach":[93],"particularly":[94],"suitable":[95],"organizations":[97],"that":[98],"have":[99],"with":[102,127,134],"publicly":[103],"available":[104],"LLM":[105,113],"solutions":[106],"like":[107],"ChatGPT,":[108],"Gemini,":[109],"DeepSeek":[110],"etc.":[111],"output":[114],"demonstrated":[115],"improved":[116],"accuracy,":[117],"consistency,":[118],"scalability":[120],"addressing":[122],"validation":[130],"using":[131],"manual":[132],"NVivo":[135],"indicates":[136],"less":[137],"than":[138],"5%":[139],"error":[140],"margin":[141],"frequency":[143],"analysis.":[144]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
