2019 5th International Conference on Information Management (ICIM)最新文献

筛选
英文 中文
Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example 学校员工数字能力课程:克罗地亚电子学校项目实例
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-10-07 DOI: 10.1109/INFOMAN.2019.8714705
Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić
{"title":"Digital Commpetence Curriculum for Schools' Employees: Croatian e-Schools Project Example","authors":"Nikolina Žajdela Hrustek, R. Mekovec, Valentina Kirinić","doi":"10.1109/INFOMAN.2019.8714705","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714705","url":null,"abstract":"The Curriculum for the Enhancement of Digital Competences of School Employees: Teachers and Associates, Principals and Administrative Staff developed as the result of Croatian e-Schools project is presented. An open curriculum approach has been chosen that characterizes the flexibility of design and is based on recommendations that allow creativity and the introduction of change in the course of implementation. The digital competence curriculum is intended for the training of beneficiaries who are considered adults, therefore specifics related to adult education are implemented. As the digitalization of society, work and education is moving fast, there is a need to set a guidance to improve digital competence. Schools should be leaders on the use of digital technologies for learning, acquiring skills and competences and to emphasize the importance of digital technologies for future education and employment. We believe that this Curriculum can help address some of the key challenges that schools are currently facing.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132623220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing of the Entrepreneurial Phase Cycle Simulation Model: Justification and Prospects 创业阶段周期模拟模型的设计:论证与展望
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-05-14 DOI: 10.1109/INFOMAN.2019.8714695
S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu
{"title":"Designing of the Entrepreneurial Phase Cycle Simulation Model: Justification and Prospects","authors":"S. Smirnov, Tamara Iakovleva, Julia Krylova, A. Kolyshkin, V. Zyabrikov, A. Lupu","doi":"10.1109/INFOMAN.2019.8714695","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714695","url":null,"abstract":"Despite the active expansion of simulation modeling as an approach to research in social science, the practical application of this approach in entrepreneurship is still not widespread. Meanwhile, the system dynamics approach fits some areas of entrepreneurship development research. In the paper, we examine the possibilities and provide justification for designing a simulation model which is based on the systemic dynamics approach. The basis of the model's logic is entrepreneur's phase cycle, admitted at the GEM survey and supplemented with data of statistical agencies. In particular, the paper discusses the prospects of entrepreneurial statistics further development with the aim to enhance and expand the understanding of the whole entrepreneurial process. The conceptual model proposed by the authors can be used in quantitative studies of the entrepreneurs' life cycle, in dynamic displaying of entrepreneur's data at phases of their life cycle, and also for the government agencies policy improvement in the field of entrepreneurship.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121443557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system 基于混合密度的电子病历系统隐私异常点检测模型
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714701
A. Boddy, William Hurst, M. Mackay, A. El Rhalibi
{"title":"A Hybrid Density-Based Outlier Detection Model for Privacy in Electronic Patient Record system","authors":"A. Boddy, William Hurst, M. Mackay, A. El Rhalibi","doi":"10.1109/INFOMAN.2019.8714701","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714701","url":null,"abstract":"This research concerns the detection of unauthorised access within hospital networks through the real-time analysis of audit logs. Privacy is a primary concern amongst patients due to the rising adoption of Electronic Patient Record (EPR) systems. There is growing evidence to suggest that patients may withhold information from healthcare providers due to lack of Trust in the security of EPRs. Yet, patient record data must be available to healthcare providers at the point of care. Ensuring privacy and confidentiality of that data is challenging. Roles within healthcare organisations are dynamic and relying on access control is not sufficient. Through proactive monitoring of audit logs, unauthorised accesses can be detected and presented to an analyst for review. Advanced data analytics and visualisation techniques can be used to aid the analysis of big data within EPR audit logs to identify and highlight pertinent data points. Employing a human-in-the-loop model ensures that suspicious activity is appropriately investigated and the data analytics is continuously improving. This paper presents a system that employs a Human-in-the-Loop Machine Learning (HILML) algorithm, in addition to a density-based local outlier detection model. The system is able to detect 145 anomalous behaviours in an unlabelled dataset of 1,007,727 audit logs. This equates to 0.014% of the EPR accesses being labelled as anomalous in a specialist Liverpool (UK) hospital.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Literature Review of WeChat Friends Circle Advertisement 微信朋友圈广告的文献综述
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714671
G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu
{"title":"Literature Review of WeChat Friends Circle Advertisement","authors":"G. Gao, Jia-Heng Zhang, Weidong Zuo, Leida Li, Jianliang Yu","doi":"10.1109/INFOMAN.2019.8714671","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714671","url":null,"abstract":"In recent years, instant messaging tools have become one of the main channels for people to communicate, and WeChat is one of the most important members. Since WeChat was launched, monthly active users have exceeded 1 billion. In January 2015, WeChat friends circle advertisement was officially launched and used in the form of information flow advertisement, which users praised or criticized differently. Therefore, it is a problem that WeChat research and development team and advertisers must face to improve users' willingness to accept advertisements in the circle of friends. We used “WeChat” and “circle of friends” as key words to search in CNKI, and the number of articles retrieved was 205. After carrying out quantitative analysis and content analysis of relevant documents (2013 – 2018), it is found that most of the studies were carried out from the perspective of the communication mechanism, marketing strategy and comparative analysis of advantages and disadvantages of WeChat circle of friends. In addition, some studies are based on advertisement avoidance, user participation and willingness to accept. At the same time, we also take WeChat as the research background, integrate the development and changes of TAM (technology acceptance model), and summarize the basic situation of users' willingness to accept WeChat friends' circle advertisement in our country so as to provide more direction and space for the optimization research of WeChat friends' circle advertisement.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114304349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigations into the Development of a Knowledge Transfer Platform for Business Productivity 企业生产力知识转移平台开发研究
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714702
W. Hurst, Nathan Shone, David Tully
{"title":"Investigations into the Development of a Knowledge Transfer Platform for Business Productivity","authors":"W. Hurst, Nathan Shone, David Tully","doi":"10.1109/INFOMAN.2019.8714702","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714702","url":null,"abstract":"There is a lack of access to training tools., best practice guides and knowledge repositories to help with the digital switch to Industry 4.0. Consequently., in this paper., the ProAccel (Productivity Accelerator) platform design is outlined. The system is a modular cloud-based multimedia platform that employs advanced data analytics and gamification techniques., such as Virtual Reality (VR)., to revolutionise the way productivity information is shared to support businesses in their uptake of digital technologies in the Industry 4.0 environment. We present our findings from a 4 month case study., involving over 100 UK-based companies. The resulting research was used to construct a prototype of the ProAccel platform. As an evaluation., a simulated user evaluation of the platform using a guestimate model derived from a KLM analysis is conducted as an analysis of the platform”s functionality.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134098406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Design Approach for Automated Prevention of Cyberbullying Using Language Features on Social Media 利用社交媒体上的语言特征自动预防网络欺凌的设计方法
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714683
Wanqi Li
{"title":"A Design Approach for Automated Prevention of Cyberbullying Using Language Features on Social Media","authors":"Wanqi Li","doi":"10.1109/INFOMAN.2019.8714683","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714683","url":null,"abstract":"Existing studies point out that the increased use of Information and Communication Technologies (ICT) has introduced new platforms, across which cyberbullying can occur. Most of the studies focus on the causes and consequences of cyberbullying among adolescents, however, few focus on the detection and prevention of cyberbullying, and even fewer focus on detecting cyberbullying in the Chinese language. Against this backdrop, an ethical approach to information filtering and regulation should be implemented and research into language features and language management is required. This research uses Sina Weibo as a case study, focusing on the features of language that occur in cyberbullying and the machine technique system that should be included as principles for managing and regulating cyberbullying contents on social media. Based on the Language Management Theory (LMT), inductive content analysis has been used to analyse offensive language features from the selected samples. The findings of this project will help refine theories, particularly those on offensive information and behaviour, and benefit academic understanding of cyberbullying and media, including the detection, regulation and governance.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"73 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance 基于最小跳数校正和重新评估跳距的改进DV-Hop算法
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714669
Wangsheng Fang, Haomin Xu, Geng Yang
{"title":"Improved DV-Hop Algorithm Based on Minimum Hops Correction and Reevaluate Hop Distance","authors":"Wangsheng Fang, Haomin Xu, Geng Yang","doi":"10.1109/INFOMAN.2019.8714669","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714669","url":null,"abstract":"In the DV -HOP algorithm of the wireless sensor network, an inaccurate estimation of the minimum hop count and the average hop distance produces a positioning error. Therefore, this paper proposes an improved DV-HOP algorithm. The algorithm reevaluates the average hop distance of the anchor node and corrects the minimum hop count of the node to be located and the anchor node, which reduces the above error. First, the average hop distance of the anchor node closest to the positioned node is reassessed according to the error. Then, the minimum hop count is obtained by the average hop distance of the revaluation, and the correction coefficient of the ratio of the minimum hop count to the actual minimum hop count is obtained, and the minimum hop count of the node to be positioned is corrected by the correction coefficient. Finally, the distance between the node to be located and the anchor node is calculated, and the position of the node to be positioned is calculated by the least squares method. Simulation results show that the improved dv-hop algorithm can reduce the node positioning error and improve the positioning accuracy.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121627751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
XCFG Based Data Flow Analysis of Business Processes 基于XCFG的业务流程数据流分析
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714686
Shunhui Ji, Bixin Li, Pengcheng Zhang
{"title":"XCFG Based Data Flow Analysis of Business Processes","authors":"Shunhui Ji, Bixin Li, Pengcheng Zhang","doi":"10.1109/INFOMAN.2019.8714686","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714686","url":null,"abstract":"A lot of service-based business processes have been developed with the rapid growth of cloud computing. Ensuring the data flow correctness of business processes is very important, which needs capturing the data flow firstly. In this article, an XCFG(eXtended Control Flow Graph) based approach is proposed for the data flow analysis of business processes defined in BPEL specification. With XCFG modeling BPEL process, the improved equations for reaching definitions are defined to take the new characters of XCFG into consideration. Then iterative algorithm is adopted to solve the equations so that the definitions that may reach each XCFG node are computed. Case study shows the effectiveness of the proposed approach.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122390978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Research on Online Rumors 网络谣言研究分析
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714707
Anjan Pal, A. Chua
{"title":"Analysis of Research on Online Rumors","authors":"Anjan Pal, A. Chua","doi":"10.1109/INFOMAN.2019.8714707","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714707","url":null,"abstract":"The prevalence of online rumors has now become a serious concern. They have also been attracting much scholarly attention from various academic disciplines. This study seeks to investigate the following research question: How do scholars tackle the phenomenon of online rumors? Specifically, it identifies (a) the research aims that have been explored, and (b) the disciplines as well as authors' collaboration trends in the exploration. For this purpose, the study conducts a content analysis of 202 scholarly articles to review the landscape of research on online rumors. The findings are as follows: There are four groups of research aims: (1) how rumors spread, (2) how rumors can be detected, (3) how rumors are perceived by humans, and (4) how rumors can be mitigated. In terms of the disciplines and authors' collaboration trends, while 128 (63.37%) articles showed intra-disciplinary collaboration, 74 (36.63%) articles involved inter-disciplinary collaboration trends. This study identifies directions for future research.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114391043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Integration of Multi-source BIM Models Based on GIS Platform 基于GIS平台的多源BIM模型集成研究
2019 5th International Conference on Information Management (ICIM) Pub Date : 2019-03-24 DOI: 10.1109/INFOMAN.2019.8714651
Weiguo Xiang, Fuzhang Wang, Xianwu Zhang
{"title":"Research on Integration of Multi-source BIM Models Based on GIS Platform","authors":"Weiguo Xiang, Fuzhang Wang, Xianwu Zhang","doi":"10.1109/INFOMAN.2019.8714651","DOIUrl":"https://doi.org/10.1109/INFOMAN.2019.8714651","url":null,"abstract":"Aiming at solving the problems of low success rate and low efficiency in converting BIM models to GIS platform, this paper proposes a multi-source model integration and publishment method based on two main software, i.e., Bentley Microstation and Weijingxing CityMaker. First, this paper analyzes the traditional data exchange methods, and gives a recommended method to convert multi-source models to one format, i.e., DGN. Second, it proposes a data analysis and transformation method. This method converts format DGN to FDB, which is to realize the conversion of BIM models to GIS models efficiently. Third, the integrated model in the Weijingxing CityMaker GIS platform is tiled and published. Finally, the Shenzhen Qianhai Project is used as a case to verify the feasibility of the method. The method can integrate BIM models into the Weijingxing CityMaker 3D GIS platform efficiently and accurately, and has the potential to realize the integrated and centralized display of the massive urban-level model.","PeriodicalId":186072,"journal":{"name":"2019 5th International Conference on Information Management (ICIM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信