The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Building a knowledge base (KB) describing domain-specific entities is an important problem in industry, examples including KBs built over companies (e.g. Dun & Bradstreet), skills (LinkedIn, CareerBuilder) and people (inome). The task involves several engineering challenges, including devising effective procedures for data extraction, aggregation and deduplication. Data extraction involves processing...
Internet technology has changed many aspects in business these days, from new product and services development, to business process improvement such as online tender, mobile payment, online registration, and many others. As a result of those changes, companies need the right resources who understand on how to do business and compete in this new economy hence new competencies are hired. This research...
In this paper, we discuss how using Secondary Non-Admin Privileged (SNAP) accounts can mitigate a variety of attacks targeting privileged accounts. We present our methodology for implementing this approach and discuss how this can prevent a variety of attack-types. We note that other studies have shown that over 92 % of critical vulnerabilities require administrative access and present multiple case-studies...
In the changing development industry, training for the project team members is necessary to maintain with the most up-to-date tools and techniques. The software development organizations that provide appropriate training to their employees can expect e a higher quality from their development. In global software development as project members are scattered geographically, the training for the employees...
Research institutes and companies are focusing intensively on Complex Event Processing, Event Stream Processing, Information Flow Processing and Surprise Event Detection methods and algorithms. This phenomenon is intensified by the rapid evolution and spreading in practice of the Internet of Things services. A huge amount of data is created continuously by the physical and logical sensors embedded...
the development of internet comes with the other domain that is cyber-crime. The record and intelligently can be exposed to a user of illegal activity so that it has become important to make the technology reliable. Phishing techniques include domain of email messages. Phishing emails have hosted such a phishing website, where a click on the URL or the malware code as executing some actions to perform...
In spite of the wide adoption of Internet banking service in developed countries, its application is still low in developing countries like Yemen. The purpose of this study is to examine and investigate the main factors which influence the adoption of Internet banking services by Small and Medium Enterprises (SMEs) managers or owners in Yemen. The research framework consists of six latent variables,...
Information extraction studies have been conducted to improve the efficiency ansd accuracy of information retrieval. We developed information extraction techniques to extract name of company, period of document, currency, revenue, and number of employee information from financial report documents automatically. Different with other works, we applied a multi-strategy approach for developing extraction...
The fast growth of e-commerce business in several previous years has attracted attention of many researchers. There are numerous research investigate about purchase behavior. Despite of that, only a few study conducted to determine segmentation of online buyers. Market segmentation is the most fundamental and basic step in determining marketing strategies. This study illustrates the segmentation of...
This study employed Path Analysis to investigate the relations among Website Quality, Brand Awareness, Perceive Product Quality and Purchase intention from consumer point of view. Data were collected from 200 Indonesian website users which focus on video games online store. A significance and positive influence exists for each variable of website quality, brand awareness, perceive quality and purchase...
In the past (classical supply chain) the supply of goods generally flow starts from factory or producer, then producer sent to a storage area called the warehouse. When finished goods are collected, the goods from storage area or warehouse (WH) is distributed to the distribution center (DC). Then after the goods were placed in the Distribution center, then the goods are shipped to the retailer (retailer)...
The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol stacks, and communication mechanism. M2M/IoT is widely used in vary industrials energy, transport, industrial communication control, public/private services management, e-health, water, oil and other industries...
The enactment of intrastate crowdfunding exemptions around the United States has built up a lot of excitement. Crowdfunding became a popular phenomenon in the past 15 years for art and design projects. Crowdfunding companies only allowed raising money by receiving donations or loans without giving funders any security interests in the project's company. This is because any potential economic return...
The world of marketing has been revolutionized in recent times. So many new methods of marketing are being experimented with. Marketing is imperative for any business and the world today focuses on gaining more attention from the customers, where people are rigorously trying to find out effective and cost saving techniques of reaching out to the customers. Viral Marketing is also one such technique...
Since the 1980s, the telephone survey has become a primary form for gathering public opinion or market information. Polling can help understand the general population's opinions, consumers' behaviors or predict election results. Based on AAPOR, it became clear that most telephone surveys of the general population would require the combination of a sample reached via landline and one reached via cell...
Continuous deployment speeds up the process of existing agile methods, such as Scrum, and Extreme Programming (XP) through the automatic deployment of software changes to end-users upon passing of automated tests. Continuous deployment has become an emerging software engineering process amongst numerous software companies, such as Facebook, Github, Netflix, and Rally Software. A systematic analysis...
In the information society, and utilizing ICT(Information and Communication Technology), it has become possible to deploy a new business model. In the use of the financial business ICT, companies rather than funding from traditional financial institutions such as banks and securities companies, it has become possible to raise funds from individuals of the general public. One of the new forms of financing...
A large number of players such as content holders, platform service providers, and application service providers will continue to increase rapidly along with the utilization of electronic commerce such as internet shopping. Internet shopping using a point card system or virtual currency will be especially common. Therefore, many agents who manage billing issues will appear in the near future. Because...
This paper gives a brief analysis of the current China's Internet financial ecosystem, analyzes the Internet financial important ten types of products on the market, briefly analyzes the relationship between them, and its importance in the future development.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.