International Conference on Enterprise Information Systems最新文献

筛选
英文 中文
A Canonical Data Model for Records Management in the Portuguese Public Administration 葡萄牙公共行政档案管理的规范化数据模型
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_11
C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora
{"title":"A Canonical Data Model for Records Management in the Portuguese Public Administration","authors":"C. Viegas, André Vasconcelos, J. Borbinha, Zaida Chora","doi":"10.1007/978-3-030-40783-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_11","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130611658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Manage Privacy in Photos after Publication 照片发布后如何管理隐私
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007614001620168
Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury
{"title":"How to Manage Privacy in Photos after Publication","authors":"Srinivas Madhisetty, Mary-Anne Williams, John Massy-Greene, Luke Franco, Mark El Khoury","doi":"10.5220/0007614001620168","DOIUrl":"https://doi.org/10.5220/0007614001620168","url":null,"abstract":"Photos and videos once published may stay available for people to view it unless they are deleted by the publisher of the photograph. If the content is downloaded and uploaded by others then they lose all the privacy settings once afforded by the publisher of the photograph or video via social media settings. This means that they could be modified or in some cases misused by others. Photos also contain tacit information, which cannot be completely interpreted at the time of their publication. Sensitive information may be revealed to others as the information is coded as tacit information. Tacit information allows different interpretations and creates difficulty in understanding loss of privacy. Free flow and availability of tacit information embedded in a photograph could have serious privacy problems. Our solution discussed in this paper illuminates the difficulty of managing privacy due the tacit information embedded in a photo. It also provides an offline solution for the photograph such that it cannot be modified or altered and gets automatically deleted over a period of time. By extending the Exif data of a photograph by incorporating an in-built feature of automatic deletion, and the access to an image by scrambling the image via adding a hash value. Only a customized application can unscramble the image therefore making it available. This intends to provide a novel offline solution to manage the availability of the image post publication.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116047952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Template-Driven Documentation for Enterprise Recruitment Best Practices 企业招聘最佳实践的模板驱动文档
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007766602380248
Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp
{"title":"Template-Driven Documentation for Enterprise Recruitment Best Practices","authors":"Saleh Alamro, H. Dogan, Raian Ali, Keith Phalp","doi":"10.5220/0007766602380248","DOIUrl":"https://doi.org/10.5220/0007766602380248","url":null,"abstract":"Recruitment Best Practices (RBPs) are useful when building complex Enterprise Recruitment Architectures \u0000(ERAs). However, they have some limitations that reduce their reusability. A key limitation is the lack of \u0000capturing and documenting recruitment problems and their solutions from an enterprise perspective. To \u0000address this gap, a template for Enterprise Recruitment Best Practice (ERBP) documentation is defined. This \u0000template provides a model-driven environment and incorporates all elements that must be considered for a \u0000better documentation, sharing and reuse of ERBPs. For this purpose, we develop a precise metamodel and \u0000five UML diagrams to describe the template of the ERBPs. This template will facilitate the identification and \u0000selection of ERBPs and provide enterprise recruitment stakeholders with the guidelines of how to share and \u0000reuse them. The template is produced using design science method and a detailed analysis of three case \u0000studies. The evaluation results demonstrated that the template can contribute to a better documentation of \u0000ERBPs.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122288027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Schema Matching with Frequent Changes on Semi-Structured Input Files: A Machine Learning Approach on Biological Product Data 半结构化输入文件中频繁变化的模式匹配:生物产品数据的机器学习方法
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007723602080215
Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf
{"title":"Schema Matching with Frequent Changes on Semi-Structured Input Files: A Machine Learning Approach on Biological Product Data","authors":"Oliver Schmidts, B. Kraft, Ines Siebigteroth, Albert Zündorf","doi":"10.5220/0007723602080215","DOIUrl":"https://doi.org/10.5220/0007723602080215","url":null,"abstract":"For small to medium sized enterprises matching schemas is still a time consuming manual task. Even expensive commercial solutions perform poorly, if the context is not suitable for the product. In this paper, we provide an approach based on concept name learning from known transformations to discover correspondences between two schemas. We solve schema matching as a classification task. Additionally, we provide a named entity recognition approach to analyze, how the classification task relates to named entity recognition. Benchmarking against other machine learning models shows that when choosing a good learning model, schema matching based on concept name similarity can outperform other approaches and complex algorithms in terms of precision and F1-measure. Hence, our approach is able to build the foundation for improved automation of complex data integration applications for small to medium sized enterprises.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Assessment User Interface: Supporting the Decision-making Process in Participatory Processes 评估用户界面:支持参与式过程中的决策过程
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007719603980409
Lars Schütz, Korinna Bade
{"title":"Assessment User Interface: Supporting the Decision-making Process in Participatory Processes","authors":"Lars Schütz, Korinna Bade","doi":"10.5220/0007719603980409","DOIUrl":"https://doi.org/10.5220/0007719603980409","url":null,"abstract":"We introduce a novel intelligent user interface for assessing contributions submitted in participatory planning and decision processes. It assists public administrations in decision making by recommending ranked contributions that are similar to a reference contribution based on their textual content. This allows the user to group contributions in order to treat them consistently which is crucial in this domain. Presently, the assessment process is done manually with no sophisticated computer-aided support. The assessment user interface provides a two-column layout with a basic list of contributions in the left column and a list of similar contributions in the right column. We present results of a user study that we conducted with 21 public administration workers to evaluate the proposed interface. We found that the assessment user interface is well suited to the assessment task and the related decision-making process. But there are also unclear elements in the ranking visualization as well as some distrust in the ranked contributions or intelligent methods among the participants.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1994 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127320537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Some Heuristics to Find Hyponyms Between Ontologies 评价本体间下义查找的启发式方法
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_13
Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez
{"title":"Evaluating Some Heuristics to Find Hyponyms Between Ontologies","authors":"Ignacio Huitzil, F. Bobillo, E. Mena, Carlos Bobed, J. Bermúdez","doi":"10.1007/978-3-030-40783-4_13","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_13","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124654721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Real-time Big Data Framework for Network Security Situation Monitoring 面向网络安全态势监测的实时大数据框架
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007708301670175
Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei
{"title":"A Real-time Big Data Framework for Network Security Situation Monitoring","authors":"Guanyao Du, Chun Long, Jianjun Yu, Wei Wan, Jing Zhao, Jinxia Wei","doi":"10.5220/0007708301670175","DOIUrl":"https://doi.org/10.5220/0007708301670175","url":null,"abstract":"In this paper, we provide a real-time calculation and visualization framework for network security situation monitoring based on big data technology, and it mainly realizes the real-time massive multi-dimensional network attack dynamic display with Data-Driven Documents (D3). Firstly, we propose an integration and storage management mechanism of massive heterogeneous multi-source data for the network security data fusion. Then, we provide a general real time data computation and visualization framework for massive network security data. Based on the framework, we use the real security data of the network security cloud service platform of Chinese Academy of Sciences (CAS) to realize the visualization monitoring of network security dynamic attacks nationwide and worldwide, respectively. Experiment results are given to analyze the performance of our proposed framework on the efficiency of the data integration and computation stages.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"75 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128057378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Function Point Tree-Based Function Point Analysis: Improving Reproducibility Whilst Maintaining Accuracy in Function Point Counting 基于功能点树的功能点分析:在保持功能点计算准确性的同时提高再现性
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.1007/978-3-030-40783-4_10
Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj
{"title":"Function Point Tree-Based Function Point Analysis: Improving Reproducibility Whilst Maintaining Accuracy in Function Point Counting","authors":"Marcos de Freitas, M. Fantinato, Violeta Sun, L. Thom, V. Garaj","doi":"10.1007/978-3-030-40783-4_10","DOIUrl":"https://doi.org/10.1007/978-3-030-40783-4_10","url":null,"abstract":"","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Future of Data-driven Personas: A Marriage of Online Analytics Numbers and Human Attributes 数据驱动的人物角色的未来:在线分析数字和人类属性的结合
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007744706080615
Joni O. Salminen, Soon-Gyo Jung, B. Jansen
{"title":"The Future of Data-driven Personas: A Marriage of Online Analytics Numbers and Human Attributes","authors":"Joni O. Salminen, Soon-Gyo Jung, B. Jansen","doi":"10.5220/0007744706080615","DOIUrl":"https://doi.org/10.5220/0007744706080615","url":null,"abstract":"The massive volume of online analytics data about customers has led to novel opportunities for user segmentation. However, getting real value from data remains challenging for many organizations. One of the recent innovations in online analytics is data-driven persona generation that can be used to create high-quality human representations from online analytics data. This manuscript (a) summarizes the potential of data-driven persona generation for online analytics, (b) characterizes nine open research questions for data-driven persona generation, and (c) outlines a research agenda for making persona analytics more useful for decision makers.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131086112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Practical Guide to Support Change-proneness Prediction 支持变化倾向预测的实用指南
International Conference on Enterprise Information Systems Pub Date : 2019-05-03 DOI: 10.5220/0007727702690276
Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado
{"title":"A Practical Guide to Support Change-proneness Prediction","authors":"Cristiano Sousa Melo, Matheus Cruz, Antônio Diogo Forte Martins, Tales Matos, J. M. S. M. Filho, Javam C. Machado","doi":"10.5220/0007727702690276","DOIUrl":"https://doi.org/10.5220/0007727702690276","url":null,"abstract":"During the development and maintenance of a system of software, changes can occur due to new features, bug fix, code refactoring or technological advancements. In this context, software change prediction can be very useful in guiding the maintenance team to identify change-prone classes in early phases of software development to improve their quality and make them more flexible for future changes. A myriad of related works use machine learning techniques to lead with this problem based on different kinds of metrics. However, inadequate description of data source or modeling process makes research results reported in many works hard to interpret or reproduce. In this paper, we firstly propose a practical guideline to support change-proneness prediction for optimal use of predictive models. Then, we apply the proposed guideline over a case study using a large imbalanced data set extracted from a wide commercial software. Moreover, we analyze some papers which deal with change-proneness prediction and discuss them about missing points.","PeriodicalId":271024,"journal":{"name":"International Conference on Enterprise Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129334996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书