The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Technologic strategy modes are ambiguous based on different vary analysis approaches and technologic indicators. This research tries to figure out the technologic strategy modes based on the two indicators of technologic knowledge status and technologic knowledge reliability, and four centralities (Degree, Eigenvector, Closeness and Betweenness centrality) of technologic network by technologic network...
Pressure of emerging countries, environmental protection and industrial companies' interests are pushing European companies towards new trends and paradigms such as sustainable manufacturing. Sustainability is now considered a strategic must-have and it can enable a profitability in the long run. One way to pursue sustainability is to implement a product life cycle approach, especially in the capital...
Non-practising entities, also known as NPEs, adopt lawsuits to collect authorization payments or/and settlement payments as their business models. Ascertaining which patent portfolio or patent layout and purchase strategy are suitable is an important topic of discussion for the NPEs who value operational performance. This study adopts the DigiTude company, an NPE, as the case study, exploring the...
The Metrics Grimoire system is composed by a set of tools designed to retrieve data from repositories related to software development. Their aim is to produce organized databases suitable for easy querying with research and industrial purposes. The data in those databases have a similar structure, to easy cross-database studies, and can be enriched with information such as linkage of the multiple...
Financial services companies are concerned with identifying when customers have moved because of customer service and marketing concerns. Knowing when customers have moved can create opportunities for these companies to better market their financial products and provide improved customer service. This paper focuses on identifying features of customers who have moved for the purpose of predicting customer...
Nowadays, every company could understand how its business evolves from the data (deluge) generated by its activities. Roughly speaking, two types of data co-exist: historical data and real-time data from which business analysts have to take their decisions in a timely fashion. In this context, the notions of time (application time and transaction time) and traceability turn out to play a crucial role...
This study investigates airline passenger behavior by analyzing three types of travel data: passenger name record (PNR), share of wallet (SOW) and webtrends. First, PNR archives the airline travel itinerary for individual passenger and a group of passengers traveling together. Usually, passengers and their accompaniers are close to each other, such as families, friends, lovers, colleagues and so on...
In this research, we built the fire fighting support system for supporting the fire fighting of the volunteer fire company. This system is the mobile application based on Web-GIS. By using this system, the fire corps volunteers can confirm the fire fighting water sources around the fire site in real time. In fire fighting, secure of the fire fighting water sources are the most important. Therefore,...
The selection and application of biometrics traits for authentication and identification have recently attracted a significant amount of research interest. In this paper we investigate the use of keystroke data to distinguish between humans using keystroke biometric systems and non-humans for auditing application. Recently, Benford’s Law and Zipf’s Law, which are both discrete Power law probability...
This study empirically investigates the merger and acquisition (M&A) strategies of focal firms by considering their market and technology position at the industry level. The results obtained using patents, firm M&A agreements, and the financial data of U.S. technology firms from 1997 through 2008 demonstrate how industry leaders, challengers, and niche players differ in their M&A strategic...
Data de-duplication has an important role in reducing storage consumption to make it affordable to manage in today's explosive data growth. Numerous DD methodologies like chunking and, delta encoding are available to optimize the use of storage. These technologies approach DD at file and/or sub-file level but this approach has never been optimal for NoSQL DBs. This method proposes data De-Duplication...
Model Driven Engineering (MDE) gives new insights into software engineering and software development. This approach is quite new and it still is the subject of discussion concerning its efficiency and usefulness. However, MDE approach becomes more and more popular among researchers and developers. That is why it is being introduced into curricula by many universities. MDE proposes a new way of software...
This paper proposes the taboo words similarity browsing system which is able to assist the naming process. The proposed system in this paper analyzes new texts - new words or sentences - into phonemes, compares their similarities of pronunciations between new words and taboo words from various language cultural areas. The system supports the effective visualization interfaces in order to visualize...
Many non-profit organizations have prioritized the need to be transparent in operating procedures, allocation of funds, and the impact of programs aimed at reducing social issues. In an effort to support this practical business need, we highlight how non-profits utilize information systems (IS) to support their strategic social goals through a case study. We examine business intelligence (BI) practices...
Wide range of software from business intelligence (BI) category are used in almost every big company. They allow users to create various reports and analyses. BI idea was primary used for business data, but now many companies like Wonderware, Rockwell are offering solutions for manufacturing data, so new form of intelligence was formed. It is called Manufacturing intelligence or Enterprise intelligence...
In research, many barriers to BITA are presented based on different theoretical frameworks. However, these barriers are studied either from a pure theoretical perspective or with limited empirical scope. This consequently hinders the achievement of BITA in organizations. In this paper the practitioners view of barriers to BITA are investigated aiming at producing a list of barriers which practitioners...
Technology is taking an increasingly prominent role in firm strategy and investments, yet there is a high degree of variability of returns in technology based expenditures. Fragmented technology investments can lead to reduced firm flexibility and higher operating costs over time. Coordinated technology planning and effective IT governance can manage tradeoffs between short term and long term benefits...
Using the Internet increasingly requires people to disclose personal information for various reasons such as establishing legitimacy, authentication, or providing personalized services. An enormous amount of literature analyzed various influencing variables that shape self-disclosure in online interaction. However, the range of studies considers very specific variables and therefore provides merely...
Financial fines imposed by regulatory bodies to penalize illegal activities and violations against regulations (cases of non-compliance) have recently become more common, and the sizes of fines have increased. This development coincides with the ongoing increase of complexity of regulatory rules. Huge fines have been imposed on banks for financial fraud and regulations have been made more stringent...
Effective Big Data applications dynamically handle the retrieval of decisioned results based on stored large datasets efficiently. One effective method of requesting decisioned results, or querying, large datasets is the use of SQL and database management systems such as MySQL. But a problem with using relational databases to store huge datasets is the decisioned result retrieval time, which is often...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.