Responsible Design, Implementation and Use of Information and Communication Technology最新文献

筛选
英文 中文
Predicting Information Diffusion on Twitter a Deep Learning Neural Network Model Using Custom Weighted Word Features 使用自定义加权词特征的深度学习神经网络模型预测Twitter上的信息扩散
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_38
A. Kushwaha, A. K. Kar, P. Ilavarasan
{"title":"Predicting Information Diffusion on Twitter a Deep Learning Neural Network Model Using Custom Weighted Word Features","authors":"A. Kushwaha, A. K. Kar, P. Ilavarasan","doi":"10.1007/978-3-030-44999-5_38","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_38","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124206581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Unsupervised Anomaly Detection of Healthcare Providers Using Generative Adversarial Networks 使用生成对抗网络的医疗保健提供者的无监督异常检测
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_35
K. Naidoo, Vukosi Marivate
{"title":"Unsupervised Anomaly Detection of Healthcare Providers Using Generative Adversarial Networks","authors":"K. Naidoo, Vukosi Marivate","doi":"10.1007/978-3-030-44999-5_35","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_35","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132611539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Role of Information Technology in Fintech Innovation: Insights from the New York City Ecosystem 信息技术在金融科技创新中的作用:来自纽约市生态系统的见解
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_26
S. Mamonov
{"title":"The Role of Information Technology in Fintech Innovation: Insights from the New York City Ecosystem","authors":"S. Mamonov","doi":"10.1007/978-3-030-44999-5_26","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_26","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132001637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a Strategic Model for Safeguarding the Preservation of Business Value During Human Interactions with Information Systems 在人与信息系统的交互过程中,建立保护业务价值的战略模型
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_29
C. Grobler, T. M. V. D. Merwe
{"title":"Towards a Strategic Model for Safeguarding the Preservation of Business Value During Human Interactions with Information Systems","authors":"C. Grobler, T. M. V. D. Merwe","doi":"10.1007/978-3-030-44999-5_29","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_29","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124142137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation Considerations for Big Data Analytics (BDA): A Benefit Dependency Network Approach 大数据分析(BDA)的实施考虑:利益依赖网络方法
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_40
J. Maritz, S. Eybers, M. Hattingh
{"title":"Implementation Considerations for Big Data Analytics (BDA): A Benefit Dependency Network Approach","authors":"J. Maritz, S. Eybers, M. Hattingh","doi":"10.1007/978-3-030-44999-5_40","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_40","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115987240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Zachman Framework for Enterprise Architecture: An Explanatory IS Theory 企业架构的Zachman框架:一个解释性的IS理论
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_32
A. Gerber, P. L. Roux, Carike Kearney, A. V. D. Merwe
{"title":"The Zachman Framework for Enterprise Architecture: An Explanatory IS Theory","authors":"A. Gerber, P. L. Roux, Carike Kearney, A. V. D. Merwe","doi":"10.1007/978-3-030-44999-5_32","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_32","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Requirements of Data Visualisation Tools to Analyse Big Data: A Structured Literature Review 数据可视化工具对大数据分析的要求:结构化文献综述
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_39
Joy Lowe, M. Matthee
{"title":"Requirements of Data Visualisation Tools to Analyse Big Data: A Structured Literature Review","authors":"Joy Lowe, M. Matthee","doi":"10.1007/978-3-030-44999-5_39","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_39","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"290 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115217624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Broker-Based Framework for the Recommendation of Cloud Services: A Research Proposal 基于代理的云服务推荐框架:研究建议
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_34
Raoul Hentschel, Susanne Strahringer
{"title":"A Broker-Based Framework for the Recommendation of Cloud Services: A Research Proposal","authors":"Raoul Hentschel, Susanne Strahringer","doi":"10.1007/978-3-030-44999-5_34","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_34","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129598180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Exploring the Disruptiveness of Cryptocurrencies: A Causal Layered Analysis-Based Approach 探索加密货币的破坏性:一种基于因果分层分析的方法
Matti Mäntymäki, Milla Wirén, A. Islam
{"title":"Exploring the Disruptiveness of Cryptocurrencies: A Causal Layered Analysis-Based Approach","authors":"Matti Mäntymäki, Milla Wirén, A. Islam","doi":"10.1007/978-3-030-44999-5_3","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_3","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127730992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Governance Challenges Constraining Business Process Management: The Case of a Large South African Financial Services Corporate 制约业务流程管理的治理挑战:以一家大型南非金融服务公司为例
Responsible Design, Implementation and Use of Information and Communication Technology Pub Date : 2020-03-06 DOI: 10.1007/978-3-030-44999-5_27
Carmen Doyle, Lisa F. Seymour
{"title":"Governance Challenges Constraining Business Process Management: The Case of a Large South African Financial Services Corporate","authors":"Carmen Doyle, Lisa F. Seymour","doi":"10.1007/978-3-030-44999-5_27","DOIUrl":"https://doi.org/10.1007/978-3-030-44999-5_27","url":null,"abstract":"","PeriodicalId":341075,"journal":{"name":"Responsible Design, Implementation and Use of Information and Communication Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信