{"title":"Study on evaluation model of cross-border e-commerce talent based on AHP-PSO","authors":"Z. Yimin, Guan Ke-qing, Wu Zeshu","doi":"10.1109/INFOMAN.2016.7477525","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477525","url":null,"abstract":"By analyzing the competency requirements of cross-border e-commerce talents for the current industry development, hierarchically extract the corresponding posts and its required abilities in cross-border e-commerce industry, and build the talent evaluation model of cross-border e-commerce based on the AHP(Analytic Hierarchy Process), then calculate the sorting weight by using PSO(Particle Swarm Optimization) algorithm, calculate the maximum vector for judgment matrix in AHP model to get the ranking of weight. This paper also present the actual datum used to verify the feasibility and validity of the evaluation model of cross-border e-commerce talent, in order to guide the cultivation of cross-border e-commerce talents, also to provide evaluation reference for enterprises in the recruitment.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal information security investment analyses with the consideration of the benefits of investment and using evolutionary game theory","authors":"Qin Wang, Jianming Zhu","doi":"10.1109/INFOMAN.2016.7477542","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477542","url":null,"abstract":"With the development of information security and the occurrence of endless security incidents, information security economics has become a new discipline and gained great attentions in academia. This paper analyzes the issue of optimal information security facing two classic types of attacks. With the consideration of business benefits bought by security investment, we identify the different characteristics compared to the previous studies, which can give meaningful inspirations to firms in reality. In addition, we innovatively use evolutionary game theory to study how firms choose the investment strategy in the long run. At last we give a conclusion and point out some fields for future researches.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining cryptography and digital watermarking for secured transmission of medical images","authors":"A. Al-Haj, Noor Hussein, Gheith A. Abandah","doi":"10.1109/INFOMAN.2016.7477531","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477531","url":null,"abstract":"Telemedicine has increased the number of ways in which healthcare can be delivered across places and countries instead of requiring the provider and the recipient to be present in the same place. One application of telemedicine is the exchange of medical images between remotely located healthcare entities. However, a major obstacle telemedicine faces is providing confidentiality, integrity, and authenticity to transmitted medical images. In this paper, we propose a hybrid algorithm which combines encryption and digital watermarking techniques in order to provide the required authenticity and integrity services. A cryptographic watermark and the patient's data are hidden in the cover image before being transmitted over vulnerable public networks. On the receiver's side, the watermarked image is handled by the extraction procedure in order to extract the cryptographic watermarks and the embedded medical data. The proposed algorithm was tested and evaluated using medical images of two different modalities. The experimental results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A consolidated approach for estimation of data security breach costs","authors":"Abdullah M. Algarni, Y. Malaiya","doi":"10.1109/INFOMAN.2016.7477530","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477530","url":null,"abstract":"Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial data breach costs have been implemented, but these approaches have not been formally compared and have not been systematically optimized. There is a need to develop a more complete and formal model that will minimize redundancy among the factors considered and will confirm with the available data regarding the costs of data breaches. Existing approaches also need to be validated using the data for some of the well documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined, and the need for better models is identified.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"4 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Next word prediction for phonetic typing by grouping language models","authors":"Sheikh Muhammad Sarwar, Abdullah Al-Mamun","doi":"10.1109/INFOMAN.2016.7477536","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477536","url":null,"abstract":"In this paper, we present a language model based framework for instant messaging, that can predict probable next word given a set of current words. Our goal is to facilitate the task of instant messaging by suggesting relevant words to the user. Generally, at the time of sending personal messages, a user follows a specific style of communication with a specific group of people. This phenomenon is much more evident in other languages apart from English. For example, in Bengali language, there are three counterparts of you, that is used to address the second person in English. Considering this fact, there are at least three styles of writing texts in Bengali language: informal, semi-formal and formal. Therefore, it is quite necessary to generate next words based on the linguistic style adopted by a user, when sending messages to a specific set of people. In this paper, we develop a solution to this issue by adopting different language models when exchanging messages with different groups of people. Our method clusters language models based on user interactions, and we show the effectiveness of our method using a popular metric hit ratio. This model can be widely adapted for predicting next words in smart-phone devices and expedite the communication between users, specifically at the time of phonetic typing.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}