Sciweavers

126 search results - page 17 / 26
» Information Systems Risk Management: Key Concepts and Busine...
Sort
View
HICSS
1999
IEEE
267views Biometrics» more  HICSS 1999»
15 years 4 months ago
Annotate: A Web-based Knowledge Management Support System for Document Collections
Knowledge management is an increasingly important source of competitive advantage for organizations. Knowledge is a renewable, re-usable and accumulating asset of value to firms t...
Mark Ginsburg, Ajit Kambil
KDD
2010
ACM
300views Data Mining» more  KDD 2010»
14 years 10 months ago
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks
Crisis Management and Disaster Recovery have gained immense importance in the wake of recent man and nature inflicted calamities. A critical problem in a crisis situation is how t...
Li Zheng, Chao Shen, Liang Tang, Tao Li, Steven Lu...
SIGMOD
2011
ACM
242views Database» more  SIGMOD 2011»
14 years 2 months ago
The SystemT IDE: an integrated development environment for information extraction rules
Information Extraction (IE) — the problem of extracting structured information from unstructured text — has become the key enabler for many enterprise applications such as sem...
Laura Chiticariu, Vivian Chu, Sajib Dasgupta, Thil...
CAISE
2009
Springer
15 years 3 months ago
Anomaly Detection Using Process Mining
Abstract. Recently, several large companies have been involved in financial scandals related to mismanagement, resulting in financial damages for their stockholders. In response, c...
Fábio de Lima Bezerra, Jacques Wainer, Wil ...
SRDS
2010
IEEE
14 years 9 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...