Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The problem being addressed in this paper is that using brute force in Natural Language Processing and Machine Learning combined with advanced statistics will only approximate meaning and thus will not deliver in terms of real text understanding. Counting words and tracking word order or parsing by syntax will also result in probability and guesswork at best. Their vendors struggle in delivering accurate...
Law is a research-oriented profession and legal research is an activity that costs time and money. Information Technology is now revolutionising the way in which legal research is being done. In this work, we have implemented an online web-based question answer system for the Mauritian Judiciary where users can enter their queries freely using natural language. The system processes the queries by...
In this paper the Crew Rostering Problem (CRP) from a Brazilian public transit company is modeled and solved by a Genetic Algorithm (GA). The CRP consists of assigning duties on weekdays, Saturdays and Sundays to the crew members of a company over a given planning horizon, minimizing the number of crews and also balancing the workload of the crews, reducing the total number of accumulated overtime...
At the same time as Big Data technologies are being constantly refined, the legislation relating to data privacy is changing. The invalidation by the Court of Justice of the European Union on October 6, 2015, of the agreement known as “Safe Harbor”, negotiated by the European Commission on behalf of the European Union with the United States has two consequences. The first is to announce its replacement...
Role play has a long history as a tool for learning. It is often used to simulate practices in the world in an environment where consequences can be mitigated. Despite its effective use by the armed forces, emergency responders, negotiators, and political campaign managers, role play is a tool seldom used in STEM classrooms. In this paper, we will describe the incorporation of certain aspects of role...
This study aims to investigate the impact of investor protection on external financing. In developing economies like Pakistan, companies having foreign ownership have more access towards external finance as compared to companies having domestic ownership. Data extracted from 70 non-financial sector companies for the period 2003–2013, was analyzed by using fixed effect model. The findings showed that...
An important goal of the renewable energy law is to promote new energy enterprises to better take the social responsibility, so, the research on the impacts of the law to the correlation between CSR and Financial Performance is meaningful. Using the panel data regression model, we make a comparison about the relevance of renewable energy corporate social responsibility and financial performance before...
Ranking similar structure groups/subgraphs can contribute to importantly practical applications, such as finding the most suspicious tax evasion group within a heterogeneous information network. This problem, however lacks attentions in the current research community. Inspired by social network analysis, this paper coins a definition of a taxpayer interest interacted network (TPIIN), in which persons...
Inherently linked to States’ sovereignty and its relationship with third-party stakeholders, the governance of cyberspace has become a subject of great debate and controversies. One of the most prominent of them -the dominance of the United States as an hegemon- has raised concerns and triggered diverging reactions within the international community. Looking at recent events such as the invalidation...
Changes to the EU-US agreements on transatlantic data transmission are accepted. With the updates leading to an adequacy decision for the Privacy Shield, the European Commission further advances US adherence to the General Data Protection Regulation. The regulation comes with increasing territorial scope for the processing of personal data of persons in the EU, and includes the risk of substantial...
Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited research around data privacy law gaps and alignment, and the legal side of the security ecosystem which seems to be in a constant effort to catch-up. There are already issues within...
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
At the same time as Big Data technologies are being constantly refined, the legislation relating to data privacy is changing. The invalidation by the Court of Justice of the European Union on October 6, 2015, of the agreement known as "Safe Harbor", negotiated by the European Commission on behalf of the European Union with the United States has two consequences. The first is to announce...
A software defect that exposes a software system to a cyber security attack is known as a software vulnerability. A software security exploit is an engineered software solution that successfully exploits the vulnerability. Exploits are used to break into computer systems, but exploits are currently used also for security testing, security analytics, intrusion detection, consultation, and other legitimate...
In the corporate world, one comes across titles such as Ethics Counsellor, Compliance Officer, Ethics and Compliance Officer, Ethics Officer and many others. Though the titles differ, all persons working in the Ethics & Compliance programs in corporations share the common goal of promoting responsible conduct in the corporation. With the overarching goal being the same, the approach and strategies...
Seeking for more efficient and more cost effective business model is a constant issue for managers in IT industry, especially in companies like big telecom providers that are incumbents. This paper is dealing with one of those new business models, implementation of Technology Shared Service Center in one of the biggest telecom providers in Europe. To have such an approach, and even more to have it...
European personal data protection laws have set the electronic communication privacy standards for more than two decades. Among these standards, the Commission Decision 2000/520/EC of 26 July 2000 pursuant to Directive 95/46/EC of the European Parliament (The Safe Harbour Decision) stood out as a cornerstone of transatlantic data protection regime. The Court of Justice of the EU decision in Maximillian...
As Ghana slides gradually towards a landlord port management model, there is an increasing trend of private sector participation in port development and service delivery. But these have not been without controversies in the form of legal tussles and labour unrests. This article discussed the issue of port governance, competition and private sector participation, from the point of view of the World...
Significant differences exist among consumers' online shopping behavior in different international markets. This paper compares consumer behavior in four different markets: (1) The US, the largest and most mature market, (2) Germany, a similarly advanced western market (3) China, the fastest growing online market, but one where consumers are plagued by incidents of counterfeits, forgeries, and spoiled...
We explore electronic crowdfunding platforms as a means of receiving money and other resources by an entrepreneur from many parties for financing wearable technology project. The electronic platform determines the cost of funding for the entrepreneur and the return investors will receive per period. This research aims to develop a framework to understand and evaluate the quantitative and qualitative...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.