2016 2nd International Conference on Information Management (ICIM)最新文献

筛选
英文 中文
Study on evaluation model of cross-border e-commerce talent based on AHP-PSO 基于AHP-PSO的跨境电商人才评价模型研究
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477525
Z. Yimin, Guan Ke-qing, Wu Zeshu
{"title":"Study on evaluation model of cross-border e-commerce talent based on AHP-PSO","authors":"Z. Yimin, Guan Ke-qing, Wu Zeshu","doi":"10.1109/INFOMAN.2016.7477525","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477525","url":null,"abstract":"By analyzing the competency requirements of cross-border e-commerce talents for the current industry development, hierarchically extract the corresponding posts and its required abilities in cross-border e-commerce industry, and build the talent evaluation model of cross-border e-commerce based on the AHP(Analytic Hierarchy Process), then calculate the sorting weight by using PSO(Particle Swarm Optimization) algorithm, calculate the maximum vector for judgment matrix in AHP model to get the ranking of weight. This paper also present the actual datum used to verify the feasibility and validity of the evaluation model of cross-border e-commerce talent, in order to guide the cultivation of cross-border e-commerce talents, also to provide evaluation reference for enterprises in the recruitment.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126122106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal information security investment analyses with the consideration of the benefits of investment and using evolutionary game theory 考虑投资收益,运用演化博弈论对信息安全投资进行最优分析
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477542
Qin Wang, Jianming Zhu
{"title":"Optimal information security investment analyses with the consideration of the benefits of investment and using evolutionary game theory","authors":"Qin Wang, Jianming Zhu","doi":"10.1109/INFOMAN.2016.7477542","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477542","url":null,"abstract":"With the development of information security and the occurrence of endless security incidents, information security economics has become a new discipline and gained great attentions in academia. This paper analyzes the issue of optimal information security facing two classic types of attacks. With the consideration of business benefits bought by security investment, we identify the different characteristics compared to the previous studies, which can give meaningful inspirations to firms in reality. In addition, we innovatively use evolutionary game theory to study how firms choose the investment strategy in the long run. At last we give a conclusion and point out some fields for future researches.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125317706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Combining cryptography and digital watermarking for secured transmission of medical images 结合密码学和数字水印技术安全传输医学图像
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477531
A. Al-Haj, Noor Hussein, Gheith A. Abandah
{"title":"Combining cryptography and digital watermarking for secured transmission of medical images","authors":"A. Al-Haj, Noor Hussein, Gheith A. Abandah","doi":"10.1109/INFOMAN.2016.7477531","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477531","url":null,"abstract":"Telemedicine has increased the number of ways in which healthcare can be delivered across places and countries instead of requiring the provider and the recipient to be present in the same place. One application of telemedicine is the exchange of medical images between remotely located healthcare entities. However, a major obstacle telemedicine faces is providing confidentiality, integrity, and authenticity to transmitted medical images. In this paper, we propose a hybrid algorithm which combines encryption and digital watermarking techniques in order to provide the required authenticity and integrity services. A cryptographic watermark and the patient's data are hidden in the cover image before being transmitted over vulnerable public networks. On the receiver's side, the watermarked image is handled by the extraction procedure in order to extract the cryptographic watermarks and the embedded medical data. The proposed algorithm was tested and evaluated using medical images of two different modalities. The experimental results demonstrate the effectiveness of the proposed algorithm.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133016273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A consolidated approach for estimation of data security breach costs 用于估计数据安全漏洞成本的综合方法
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477530
Abdullah M. Algarni, Y. Malaiya
{"title":"A consolidated approach for estimation of data security breach costs","authors":"Abdullah M. Algarni, Y. Malaiya","doi":"10.1109/INFOMAN.2016.7477530","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477530","url":null,"abstract":"Many security breaches have been reported in the past few years impacting both large and small organizations. There has often been considerable disagreement about the overall cost of such breaches. No significant formal studies have yet addressed this issue, though some proprietary approaches exist. A few computational models for evaluating partial data breach costs have been implemented, but these approaches have not been formally compared and have not been systematically optimized. There is a need to develop a more complete and formal model that will minimize redundancy among the factors considered and will confirm with the available data regarding the costs of data breaches. Existing approaches also need to be validated using the data for some of the well documented breaches. It is noted that the existing models yield widely different estimates. The reasons for this variation are examined, and the need for better models is identified.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"4 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120870879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Next word prediction for phonetic typing by grouping language models 通过分组语言模型预测语音类型的下一个单词
2016 2nd International Conference on Information Management (ICIM) Pub Date : 2016-05-07 DOI: 10.1109/INFOMAN.2016.7477536
Sheikh Muhammad Sarwar, Abdullah Al-Mamun
{"title":"Next word prediction for phonetic typing by grouping language models","authors":"Sheikh Muhammad Sarwar, Abdullah Al-Mamun","doi":"10.1109/INFOMAN.2016.7477536","DOIUrl":"https://doi.org/10.1109/INFOMAN.2016.7477536","url":null,"abstract":"In this paper, we present a language model based framework for instant messaging, that can predict probable next word given a set of current words. Our goal is to facilitate the task of instant messaging by suggesting relevant words to the user. Generally, at the time of sending personal messages, a user follows a specific style of communication with a specific group of people. This phenomenon is much more evident in other languages apart from English. For example, in Bengali language, there are three counterparts of you, that is used to address the second person in English. Considering this fact, there are at least three styles of writing texts in Bengali language: informal, semi-formal and formal. Therefore, it is quite necessary to generate next words based on the linguistic style adopted by a user, when sending messages to a specific set of people. In this paper, we develop a solution to this issue by adopting different language models when exchanging messages with different groups of people. Our method clusters language models based on user interactions, and we show the effectiveness of our method using a popular metric hit ratio. This model can be widely adapted for predicting next words in smart-phone devices and expedite the communication between users, specifically at the time of phonetic typing.","PeriodicalId":182252,"journal":{"name":"2016 2nd International Conference on Information Management (ICIM)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116790160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信