The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grooming is the process by which pedophiles try to find children on the internet for sex-related purposes. In chat conversations they may try to establish a connection and escalate the conversation towards a physical meeting. Till date no effective methods exist for quickly analyzing the contents, evolution over time, the present state and threat level of these chat conversations. In this paper we...
Preference has been included in the dominating economic theory for intensive analysis, as the understanding and explanation of the human action may be passively entrapped to some extent if the actor's preferences are disregarded in the economic behavior research. The supply chain knowledge sharing preference space model is to be constructed based on kinds of actor's preferences analyzed and indicated,...
This paper presents a method for extractive multi-document summarization that explores a two-phase clustering approach that, combined with a sentence simplification procedure, aims to generate more useful summaries. First, sentences are clustered by similarity, and one sentence per cluster is selected, to reduce redundancy. Then, in order to group them according to topics, those sentences are clustered...
Analysis of sentiment expressed in political systems' communication over long periods of time has been difficult. This research illustrates a method based on network analysis, the Sentiment Network Analyzer (SNAZ). It identifies weighted shortest paths between seed words and 3,500 target sentiment words as these occur in semantic networks extracted from open-source documents sliced into time intervals...
In the field of Human-Computer Interaction, the Personas methodology is used to communicate the user's preferences, goals, frustrations and requirements. Although a widely used method, little progress has been made in creating a personas model. This paper aims to provide such a conceptual model, which includes concepts and properties used in the personas methodology, via an OWL specification.
When large values are at stake, the attacker and the attacker's motives cannot be easily modeled, since both the organization at stake and the possible attackers are unique and have complex motives. Hence, rather than using stereotypical attacker models, recent work proposes realistic profiling of the opponent by the use of user-centered design principles in form of the persona methodology. Today,...
The prediction of HR supply is an important item of HR management in enterprises. This thesis proposes the prediction method of Markov chain, highlights the relevant principle, and indicates the specific application with instances.
The purpose of this paper is to interpret and address the unique challenges faced by Human Intensive IT Services Organizations*1 using a Cybernetics Lens. A framework is being proposed based on Ashby's Law of Requisite Variety and Stafford Beer's Viable Systems Model. Software is an artifact requiring large-scale human effort. IT is unlike other engineering industries because it produces non-material...
For some years, competency-based learning and training has known a growing interest, especially in conjunction with proliferation of the terms "knowledge society", "citizen mobility", or "globalization". Competency modeling becomes an important concept in many domains, especially in human resource development and e-Learning. In this paper, we present a review of relevant...
Virtual Organizations are a specific type of Multi-Agent Systems that look for modeling agent organizations by means of elements typically used in Organizational Theory, such as roles, organizational goals, or services. The Organizational Theory considers that the structure of a human organization is likely to change through time, being the external and internal forces that drive organizational change...
The paper is devoted to the safety of complex technical systems of systems (SoS) through the improvement of engineering processes at all system lifecycle stages. The safety of complex technical facilities (such as nuclear and conventional power plants, offshore oil and gas platforms and chemical processing plants) is analyzed based on the systems theory and SoS engineering. The safety concept discussed...
The purpose of this study is to explore the characteristics and the process of family business. The research findings indicate: (1) The team of family entrepreneurship explains that as an entrepreneurial main body, it is quite different than the entrepreneur or team in general entrepreneurial management meaning. It has unique resource to solve entrepreneurial risk and uncertainty issue. Moreover,...
Most early work on high-performance work systems (HPWS) examines only the direct relationship between a set of management practices and performance outcomes and seldom investigates the black box between them. On top of the previous individual approach, our study would take a group level approach and investigate how the HPWS may change the performance, especially the innovation performance, through...
Insider threats are a growing problem in today's organizations. Detecting such attacks is especially challenging because most system owners and system administrators use networks to remotely manage the systems they are responsible for. In previous work, we introduced the Autonomic Violation Prevention System (AVPS) that has a scalable architecture to deal with such threats. This system uses low level...
Business Process Management (BPM) software provides visibility into business processes in organizations of all sizes and helps increase process efficiency continuously. However, the time and effort involved in modeling, deploying and executing a business process is tremendous and as a result organizations struggle to agilely adapt business processes to dynamic business requirements. On the other hand,...
Bisphenol A (BPA) is an environmental pollutant to which humans are universally exposed, evident as low BPA concentrations present in biological samples in the majority of individuals in developed countries. Although BPA is widely detected in blood, the main source of human exposure is through ingestion, as BPA is broadly used in the plastic industry and therefore present in food containers. In this...
This study aims to investigate factors influencing attitude towards knowledge sharing (KS). KS is an organized attempt to accelerate sharing of knowledge and experiences, in any format, among individuals or groups. However, in many situations, people in organizations avoid sharing their knowledge. Prior studies show that existing knowledge in organizations is not being effectively shared. This is...
The objective of the paper is to identify the factors and principles of soft skills and emotional intelligence which is lacked among the junior executive and is the primary cause of leadership failure in business organization today. This paper examines the gap, characteristics of soft skills and emotionally intelligence. It further highlighted the needs, systematic and step-by-step experiential approach...
IT services are getting increasingly complicated, and require IT support organization to manage them. IT support organization are in charge of the incident management process and represent mission-critical structures whose performance needs to be frequently assessed and optimized. State-of-the-art research in the performance optimization of IT support organization proposes user-driven performance...
Knowledge hoarding in Requirements Elicitation (RE) phase could lead to Information Systems Development (ISD) project failure. Many researchers have discussed important factors in knowledge sharing. Nevertheless, the success rate for ISD projects is low and there are other major factors for consideration. Review was conducted to identify potential gaps in existing literature and to explore new factors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.