The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The development of Internet and social networks has provided more emerging network data which facilitates the dynamic network analysis. In this paper, we propose a new method to measure coherence strength, also referred to as community consistency, of a community under dynamic settings. In order to better interpret the influence of evolving community structure on community consistency, we model the...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
The investors in financial market have shown great concerns in the events that may cause fluctuations in the capital market. Traditional event detection and type recognition methods were majorly based on text processing techniques while few research considers the financial time-series features. As we know, there are large amount of financial time-series data available such as stock transaction data...
In recent years, the rapid development of E-commerce has produced a tremendous effect on people's life and traditional industries. “Internet Plus” proposed by the premier on the two sessions (NPC & CPPCC) has boosted the accelerated integration of traditional industries and the internet. Local life service is closely related to people's lives which also continue to be combined with the Internet...
This paper tries to do the research of analyzing the relation of the customer trust, the customer satisfaction and purchase intention under the electronic commerce shopping environment. Drawing on the theory of customer trust, customer satisfaction and purchase intention, based on a survey of 102 respondents from the University in China, the United Kingdom, and the United States, the results showed...
Traditional enterprises should change their marketing strategy, business model, organizational structure and etc. to cope with the new market in the Internet age. Duo to the above requirement, the conception of Internet Thinking (IT) is created in China. Although many scholars have done a lot of research on this field about the company operating at the context of Internet and a few Chinese researchers...
The emergence of online music has brought a great change into the music industry, it also has brought opportunities for the development of music industry. With the emergence and development of the Internet, the traditional music business model cannot adapt to the development of online music anymore, so that online music business model based on Internet thinking need to be established. Based on value...
This paper mainly discusses about Alibaba under economic new normal “double eleven shopping festival” reasons for the slowing growth rate. We mainly analyze it from the following five dimensions. The first one is intensifying competition between the E-business in shopping festival double eleven. Ali is no longer a monolith. Second, Market education has been completed, consumers tend to be more rational...
Web Search Engines (WSEs) keep the record of the queries sent by their users in files named query logs. This kind of data is mainly used to improve the user experience by means of personalizing search results, auto-completing search terms, correcting spelling mistakes, etc. On the other hand, the companies that offer WSE services can also sell this data to obtain economic benefits, this is known as...
With the commercial deployment of 4G technology, the Mobile Internet era comes truly. The human resource managers should conform to the trend of the times, combine human resource management with Mobile Internet and design the innovation strategies for human resource management mode. This paper chooses the telecom operator -- JLLT company as the research object, analyses the bottleneck of JLLT company's...
Recently, due to the wide spread of high-bandwidth access to the Internet, and abundant generation of various kinds video contents, we live in a big data era, especially in video contents. There are too much videos already, but we are even unable to know which video is good for me now. In the coming big data era, video contents providers should develop efficient recommendation system to be competitive...
The appearance of internet brought most part of our life from off-line into on-line. Also the appearance of SNS and blog became the factor to explosively increase data in website. It is very important to search the useful information through text analysis which takes up most of texts, photos and video. Accordingly this study applied the social network analysis method which is one of the Graph theory...
While many cyber security organizations urge the corporate world to use defence-in-depth to create vigilant network perimeters, the human factor is often overlooked. Security evaluation frameworks focus mostly on critical assets of an organization and technical aspects of prevailing risks. There is consequently no specific framework to identify, categorize, analyse and mitigate social engineering...
After a physical crime occurs an important action typically takes place: the reporting of the crime to the police. However, this action becomes more complex for a victim to properly execute when a cybercrime is experienced, which can be partly explained for instance by a lack of knowledge about cybercrimes and computer security. Cybercrime reporting is crucial because it can provide a multitude of...
Online forum provides a popular platform for users to communicate and share experiences. Comparing to the social networks which require users to register with their real identities, online forum has no such requirement which makes its users more willing to speak the truth. Unfortunately, the anonymity makes online forum more likely to be abused by malicious users. Internet water army is a typical...
Social networks have been one of the most simple, available and developed means of communication. Herewith, even more companies pay attention to their reputation because one simple comment or opinion about a product/service of a company/brand could influence the decision making of other users/consumers. This work aims to better understand how the social networks are increasingly sought after by people...
The weighted bipartite $b$<alternatives> <inline-graphic xlink:type="simple" xlink:href="wu-ieq1-2527003.gif"/></alternatives>-matching problem (WBM) plays a significant role in many real-world applications, including resource allocation, scheduling, Internet advertising, and E-commerce. WBM has been widely studied and efficient matching algorithms are well known...
Information leakages are one of the main security threats in today's Internet. As ICN is expected to become the core architecture for Future Internet, it is therefore mandatory to prevent this threat. This paper proves that some ICN configuration prevents information leakages via Data packets and shows that it is an open problem to prevent interest packets from carrying encoded crucial information...
Proliferation of web as an easily accessible information resource has led many corporations to gather competitor intelligence from the internet. While collection of such information is easy from internet, the collation and structuring of them for perusal of business decision makers, is a real trouble. Text clustering based topic identification techniques are expected to be very useful for such application...
Documentation is often neglected in agile software projects, even if software developers perceive a need for good documentation. One reason can be found in improper documentation tools. This paper provides an overview of the central conceptual ideas for an agile documentation tool.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.