2016 2nd International Conference on Information Management (ICIM)最新文献

筛选
英文 中文
ERP systems adoption evolution in Iberian companies during the global financial and economic crisis and recession (2007–2014) 在全球金融和经济危机和衰退期间,伊比利亚公司的ERP系统采用演变(2007-2014)
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477544
Raquel Pérez Estébanez, António Trigo, F. Belfo
{"title":"ERP systems adoption evolution in Iberian companies during the global financial and economic crisis and recession (2007–2014)","authors":"Raquel Pérez Estébanez, António Trigo, F. Belfo","doi":"10.1109/INFOMAN.2016.7477544","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477544","url":null,"abstract":"In an increasingly globalized and complex environment, companies are making an effort to implement systems based on Information and Communication Technologies (ICT) to improve their management and organizational performance and competitiveness. Enterprise Resource Planning (ERP) systems are increasingly present in companies. In Spain and Portugal, large, medium and small companies have developed further efforts to implement ERP systems despite the difficult economic and financial situation of recent years. This study presents companies' effort in implementing and using ERP systems during the global financial and economic crisis and recession (2007-2014) comparing company's size and sector of activity in Iberian companies, Spanish and Portuguese.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Developing electronic government success models for G2C and G2B scenarios 开发G2C和G2B情景下的电子政务成功模型
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477527
N. Gorla, Ananth Chiravuri
{"title":"Developing electronic government success models for G2C and G2B scenarios","authors":"N. Gorla, Ananth Chiravuri","doi":"10.1109/INFOMAN.2016.7477527","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477527","url":null,"abstract":"This study aims to develop models for studying e-government success using variables from theory and test them empirically. The first part of this research is to develop generic and theoretical models for e-Government success for G2C (Government-to-Citizen) and G2B (Government-to-Business) environments using case studies of best practices from UAE and other countries and existing literature on e-Government and Information Systems success. The second part of the study then aims to validate the developed models using real world data collected through surveys. This study will be the first to develop such a comprehensive model as there are no models at present examining e-government success specifically. Furthermore, the need for comprehensive models for e-Government success and the available theory to support the proposed models also should result in successful outcome of this study.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116031267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent immediately help system 智能即时求助系统
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477548
Chiun-Li Chin, Jian-Shiun Wu, Wan-Jou Li, Ting-Yu Liu
{"title":"Intelligent immediately help system","authors":"Chiun-Li Chin, Jian-Shiun Wu, Wan-Jou Li, Ting-Yu Liu","doi":"10.1109/INFOMAN.2016.7477548","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477548","url":null,"abstract":"In the world, more and more people need to be helped. People often donate money or goods to social welfare institutions. But it can take care of people is limited. And people who need help also can only help them by social welfare institutions. And related events such as corruption also emerge in endlessly. Let people love are overshadowed. According to the statistics, Global smartphone users will grow to 1.75 billion in 2014. It will continue to grow in the future. Therefore smartphone is an indispensable part of life. While most of social care related App are based on money or goods related function. The lack of identity recognition is to prevent the abuse of people love. Therefore, by smartphone immediacy, universal is not restricted by region. In this paper, we develop an “intelligent immediately help system”. In this system, we use image recognition technology, and use big data analytics way to complete identity identification and to increase the credibility of the case. Through the integration of GPS positioning and use 3D way to construct the helper's flow pattern. We design “Instant help machine” to help people instantly, which let people who is near can donated in “Instant help machine”. Members can use this system to login account and password to withdraw money or goods. It can immediately help who need help. “Intelligent immediately help system” also used mobile phone camera to the character recognition technology to read the receipt. Love correct help who need help. Finally, cases are in the cloud. It may be produce more privacy. In order to protect all the data in the cloud, we use cloud encrypted to prevent hacker intrusion.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agent-based modeling of deshopping behavior: A single shop model with multiple deshoppers 基于代理的购物行为建模:具有多个购物者的单个商店模型
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477539
S. Rahman, Shuliang Li
{"title":"Agent-based modeling of deshopping behavior: A single shop model with multiple deshoppers","authors":"S. Rahman, Shuliang Li","doi":"10.1109/INFOMAN.2016.7477539","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477539","url":null,"abstract":"Deshopping is rapidly turning into a modern day scourge for the retailers worldwide due to its prevalence and regularity. The presence of flexible return policies have made retail return management a real challenging issue for both the present and the future. In this study, we propose and develop a multi-agent simulation model for deshopper behavior in a single shop context. The background, theoretical underpinning, logical and computational model, experiment design and simulation results are reported and discussed in the paper.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123518776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TimeSpiral, an enhanced interactive visual system for time series data timspiral,一个增强的交互式可视化时间序列数据系统
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477546
Di Zhang, Ligu Zhu, Chengcheng Wang, Lei Zhang
{"title":"TimeSpiral, an enhanced interactive visual system for time series data","authors":"Di Zhang, Ligu Zhu, Chengcheng Wang, Lei Zhang","doi":"10.1109/INFOMAN.2016.7477546","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477546","url":null,"abstract":"Time dimension has always been an important measurement scale of human society, producing large amounts of time-series data all the time in the fields of science, engineering, economics and so on. Exploring correlation features and periodic trends of multi-dimensional time-series data is the emphasis in the research of visual analytics. A visual interactive system named TimeSprial is proposed on the basis of past cases and visualization methods in this paper. The system is designed based on the concepts of time granularity and time primitive, so as to explore correlation features and periodic trends of data dimensions through visual analysis. TimeSprial integrates various visualization layout methods of periodic data, such as ring diagram and curve graph, assisted by a variety of interactive models. Finally, case analysis of actual data sets shows the effectiveness of our approach in the exploration and understanding of multi-dimensional time-series data.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The development of a postgraduate management system 研究生管理系统的开发
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477540
Muneer Nusir
{"title":"The development of a postgraduate management system","authors":"Muneer Nusir","doi":"10.1109/INFOMAN.2016.7477540","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477540","url":null,"abstract":"Because of the increasing number of the postgraduate students in the universities, it usually takes quite a long time to fill the postgraduate project applications and to process these applications after being submitted. Therefore, developing a system that helps students and staff face these obstacles and saves time and efforts is being a must. This paper aims to develop a prototype system for postgraduate students in the University of Utara Malaysia (UUM), especially students in the Graduate Department of Information Technology and Computer Science, focusing on the entry requirements for the final project. The system development life cycle (SDLC) methodology will be used in this study as it is considered one of the best methodologies for system development.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"11252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124052081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Taking promotion and prevention mechanisms matter for information systems security policy in Chinese SMEs 建立促进和预防机制对中国中小企业信息系统安全政策至关重要
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477543
Hung-Pin Shih, K. Lai, Xitong Guo, T. Cheng
{"title":"Taking promotion and prevention mechanisms matter for information systems security policy in Chinese SMEs","authors":"Hung-Pin Shih, K. Lai, Xitong Guo, T. Cheng","doi":"10.1109/INFOMAN.2016.7477543","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477543","url":null,"abstract":"Deterrence and rational choice calculus theories can regulate or motivate employees' compliance with information systems security policy (ISSP). However, the two well-developed theories may not fully induce compliance behavior of ISSP given the growing trend of IS security violation in China. Deterrence and rational choice calculus employ an assumption of general awareness of ISSP to address compliance behavior. However, employees may judge their compliance behavior of ISSP in terms of positive and negative emotions but not the trade-off of benefits and costs (risks) only in the compliance. Grounded in regulatory focus theory (RFT), we propose a research model that addresses the motivational mechanisms for employees to comply with ISSP. We adopt a scenario-based questionnaire to survey employees of Chinese SMEs for model testing. The empirical results indicate that promotion-approach is better than promotion-avoidance in motivating compliance intention when employees are aware of the ISSP in their companies. However, promotion-approach and promotion-avoidance are ineffective in inducing compliance intention when employees are unaware of ISSP in Chinese SMEs. Information security awareness is not a necessary condition of the compliance of ISSP. Additionally, prevention-approach is better than prevention-avoidance in motivating compliance intention regardless of whether employees are aware or unaware of ISSP in the workplace. Our empirical results can provide meaningful implications for academics and practitioners.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130032042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Relationships between network's structure features and link prediction algorithms 网络结构特征与链路预测算法之间的关系
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477535
J. Jun, Hu Xiao-feng
{"title":"Relationships between network's structure features and link prediction algorithms","authors":"J. Jun, Hu Xiao-feng","doi":"10.1109/INFOMAN.2016.7477535","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477535","url":null,"abstract":"The first essential thing on the application of link prediction is how to choose the right prediction algorithm. We experimented with five virtual networks and analyzed the relationship between those networks' structure features and six typical link prediction algorithms by the experiment's data in this paper. We found that if the network's assortativity coefficient is positive and the clustering coefficient is greater than the threshold which is about 0.1, the algorithms based on local information would get higher prediction results, otherwise the based global information would be better. And the clustering coefficient and efficiency are proportional to the accuracy of algorithms based local information and are reverse proportional to the algorithms based global information. These conclusions provide the quantitative basis for selecting the right algorithms in link prediction application.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The benign and Malignant Recognition System of Nasopharynx in MRI image with Neural-Fuzzy based Adaboost classifier 基于神经模糊Adaboost分类器的MRI鼻咽部良恶性识别系统
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477532
Ming-Chi Wu, Wen-Chi Chin, Ting-Chen Tsan, Chiun-Li Chin
{"title":"The benign and Malignant Recognition System of Nasopharynx in MRI image with Neural-Fuzzy based Adaboost classifier","authors":"Ming-Chi Wu, Wen-Chi Chin, Ting-Chen Tsan, Chiun-Li Chin","doi":"10.1109/INFOMAN.2016.7477532","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477532","url":null,"abstract":"The current state of diagnosis of nasopharyngeal approach to image interpretation is artificial, but this way will be sentenced to cross-cultural experience for each practice discrimination and may lead to refractory time delay. We used the image taken from radiologists and applied the Unsharp Mask to enhance the image edge. In order to reduce the computation time and increase the efficiency, the doctor may specify an ellipse region of interest (ROIs) of nasopharynx in the image. After that, we use histogram equalization to denoise and use Otsu methods to obtain the threshold value to binaries it in this region. After performing the above two methods, we can successfully segment the tumor region of the nasopharynx. Then, we use texture and geometric feature extraction method to extract the tumor region feature, and trained the data by Neural-Fuzzy based AdaBoost classifier to recognize benign or malignant tumors of the nasopharynx. This paper hope that it can improve nasopharyngeal malignant cancer identification accuracy, and assist doctors make more accurate diagnosis through using tumor texture, hypertrophy and symmetrical distribution features in Neural-Fuzzy based Adaboost classifier.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124464752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on massive tile data management based on Hadoop 基于Hadoop的海量tile数据管理研究
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477528
Kun Gao, Xue-ming Mao
{"title":"Research on massive tile data management based on Hadoop","authors":"Kun Gao, Xue-ming Mao","doi":"10.1109/INFOMAN.2016.7477528","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477528","url":null,"abstract":"Owing to the continuous development of GIS technology, massive GIS data is born at the right moment. In terms of the storage of massive GIS data, to guarantee the robustness of the system, the cloud storage has been gradually used. This paper focuses on the storage of massive tile data, by the use of Hadoop technology along with SequenceFile to merge multiple tile data into a big file to address the issue that Hadoop is unsuitable for storing multiple small files. During the process of writing the tile data into a big file, the Hilbert space-filling curve is also used to map the tile data from 2-dimensional to 1-dimensional in orde to use one-dimensional indexing to significantly improve the efficiency of later data retrieval.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115478296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信