Social Network Analysis as a Tool for Improving Enterprise Architecture

Size: px
Start display at page:

Download "Social Network Analysis as a Tool for Improving Enterprise Architecture"

Transcription

1 Proceedings of the 5 th International KES Symposium on Agents and Multi-agent Systems, KES-AMSTA Manchester, UK, June 29 - July 1, 2011 Lecture Notes in Artificial Intelligence LNAI, Volume 6682, 2011, pp DOI: / _67 Social Network Analysis as a Tool for Improving Enterprise Architecture Przemysław Kazienko, Radosław Michalski, Sebastian Palus Institute of Informatics, Wrocław University of Technology Wybrzeże Wyspiańskiego 27, Wrocław, Poland {kazienko, radoslaw.michalski, sebastian.palus}@pwr.wroc.pl Abstract. The paper provides the overview of essential analyses and methods, helpful for enterprise architecture improvement and based on social network approach. The ideas presented in this paper focus on social network, that is built with the use of real-life manufacturing company data. It has been shown that corporate social network analysis, as a decision support system, may be influential for managing a company. Several ideas, measurements, interpretations and evaluation methods are given and discussed, in particular centrality degree, social network extraction, process management. 1 Introduction Nowadays, in the times of strong competition, business organizations constantly look for tools and techniques to beat market opponents and become leaders among other companies. This paper focuses on corporate social network analysis as a possible way to improve enterprise architecture leading to the above mentioned goals. However, the proposed methods are suitable for all kind of organizations with the stable organizational structure, not only the commercial ones. Social network analysis is the well-established way of analyzing relations between persons in the social network. These methods focus on determining user position, extracting groups of users, describing and analyzing changes in such kind of networks [12]. Among many types of social networks, like social web sites, instant messaging systems, it has been found useful to build and analyze corporate social networks [1], [17], because results of such analysis may be found very helpful in improving corporate management. This paper presents findings achieved by using corporate social network analysis in the mid-sized manufacturing company and possible ways of their interpretation as well as further usage of these results. The source data gathered for building the social network were unique and novel in the field of corporate social network analysis, because in other papers [17], only some assumptions about organizational structure were made due to lack of full information. This time, the achieved results have been compared to reliable information about company structure to depict that it is possible to improve organization management using proposed set of techniques as a decision

2 2 Przemysław Kazienko, Radosław Michalski, Sebastian Palus support tool. It has also been shown that only some metrics used in social network analysis are valuable and suitable in the process of the evaluation of a company. Section 2 provides introduction to social networks in the enterprise describing possible ways of gathering and extraction of social network data. Section 3 relates to the idea of corporate network analysis. In Section 4, authors present their results from social networks analysis in the above mentioned company, while Section 5 focuses on discussion regarding these results. Conclusions and future work directions are presented in Section 6. Overall, authors focused on analysis of employee position and process management implications of the achieved results. 2 Social Networks in the Enterprise 2.1 Source Data for Social Network The data for the social network can be gathered from a vast variety of sources. One of the most often used methods is based on questionnaires and interviews. People are asked to identify the frequency of communication with others and the channel of interaction, e.g. face-to-face meetings, telephone, , paper letters, etc. [8]. They need to recall their behavior that has taken place over the long time frames in order to capture as much information as possible. However, if the time frame is too long or the information is too detailed, accuracy and reliability of such a method can be very low. It has been proven in [2], [3] that the data based on recall, although widely used, may be much less reliable than the data gathered from observation. Moreover, recall may be better for perceptions of media usage, while the electronic data may be better for measuring actual usage. Nowadays, when social networking sites have become an essential part of everyday life, questionnaires are no longer needed. These sites allow users to construct an online profile with explicitly defined connections with other users (usually called friends ) [5], [19]. Since web 2.0 sites like Facebook, LinkedIn, MySpace and many others have been established, they have attracted more than one billion users worldwide. People use social networking sites in their daily lives, to communicate with friends, share interests, organize events, find jobs and many more. However, connections in such systems are self-defined by users, which means that it can be subjective. Instead of asking people to provide details of their communication, parallel collected data can be used. Recently, people communicate with each other electronically (by [17], phone [16], or Instant Messenger, etc.), they leave a trace behind them in the form of server logs, phone billings, IM logs, etc. The more facts of communication between users, the stronger they are connected within the social network. Corporate information systems introduce even more possible sources for social network extraction, like directory services (e.g. Microsoft Active Directory [9]) or ERP systems [20] which allow to analyze not only pure communication but users` business relations as well. Figure 1 presents few of all possible data sources for extraction of the social network.

3 Social Network Analysis as a Tool for Improving Enterprise Architecture 3 Observation Phone billings IM logs Questionnaires Social Networking Sites Data sources logs ERP systems Directory services Fig. 1. Data sources for social networks extraction in an enterprise 2.2 Social Network Extraction Social network extraction should be considered as the most important preliminary step in all further activities on the obtained social network. The final results may differ depending on the approach chosen at this stage. As previously stated, there are many diverse source data for enterprise social network extraction. However, when deliberating enterprise architecture improvement ideas, it should be noted that it is essential to obtain the scheme of organizational structure and to gain at least one type of source data for the company social network extraction. Overall, the organizational structure should be treated as the snapshot state of the enterprise representing formal dependencies between individual employees. Those dependencies may vary - from simple ones, as functional structure, through matrix structure, up to complex horizontal designs oriented mostly to processes in the enterprise [6]. Paradoxically, such kind of relatively well-defined corporate relations, i.e. the organizational structure can be hardly extracted automatically, because, depending on size and profile, the companies may have no need to maintain full company structure drill-down from board through departments up to a single employee in their IT systems. That is why, it may be necessary to convert organizational structure, taken from official documents, into graph, where nodes are representing employees and vertices employee-supervisor relations. This was also partly necessary in the analyzed company. Additionally, each node, i.e. each employee, is labeled with the department ID and function what is especially useful in business process analysis. It is also important to have the opportunity to track all the organizational changes during the analyzed period, i.e. employment or dismissals, position or department changes, etc. The company structure, just like real social network, also varies over time and that fact may be crucial in further analysis. Obviously, the process of the social network extraction may differ due to accessibility of the data. The most common case refers a single-layered social network, in which the network is extracted only from one simple data source, e.g. logs about communication [4], IM communication [18], etc. An ERP system is the more sophisticated example of social network source and analysis of transaction logs

4 4 Przemysław Kazienko, Radosław Michalski, Sebastian Palus in such case can be valuable for business process improvement [1]. If there are more data sources available, it is worth building a multi-layered social network, in which each layer represents relations inside one channel of communication or common activities [10], [13]. Further social network analysis (SNA) and enterprise architecture improvement considerations (see Sec. 3 and 4) can analyze those layers separately or flattened with weights assigned to each layer, depending on purpose. It is worth mentioning that the corporate structure can also be used as an additional layer in SNA. In both cases a single-layered and multi-layered social network - there is one more consideration: should a social network be limited only to company employees or should also outside connections matter? In the first case, the number of nodes in the social network will be equal or less than the number of nodes in the corporate structure network. In the second case, it is proposed to limit the output social network to company employees, but instead of including outside nodes, one or more additional labels are added to employee nodes informing about count of external connections or count of s sent outside, etc. Such information can be included further in social network analysis as another factor for calculation. While extracting a social network from one or multiple sources, yet another difficulty may appear user identification. In a single layer, one user can use multiple aliases [14], [4] and in case of many layers a need to identify the same user across the layers is even greater. The suggested way to start such pre-processing is to use the company structure node list first, because such network has only one occurrence of a single employee. All further layers should be mapped and reduced to the company structure nodes list, because in that case all users will be uniquely identified, as shown in Figure 2. Multiple instances of the same employee in a layer should be reduced to one at this stage. Without proper pre-processing the social network may be hard to analyze. n 1 n 2 n 3 n 4 n n Layer 1: s e 3 e 1 e 2 e 4 e n Employee list n 1 n 2 n 3 n 4 n n Layer 2: ERP logs Fig. 2. Mapping social network actors to employee list There are also special cases in the mapping process, strongly depending on company operating model. For example, if a group of employees uses one login in ERP system or a single account, such a functional account cannot be simply mapped to a single employee and sometimes additional internal company knowledge is required to perform mapping correctly. In some cases it is even impossible to merge...

5 Social Network Analysis as a Tool for Improving Enterprise Architecture 5 layers containing functional entities with layers including individuals and then each layer could be analyzed separately. 2.3 Multi-agent Architecture of the System As presented in the previous section, the data used for building the corporate social network may be stored in various, independent systems. That is why the multi-agent architecture is very helpful in the process of obtaining the data and generating the social network. It is proposed to build an agent architecture, where each agent or agent set is responsible for one source representing one social network layer. For example, after identification of possible source data location, one set of agents may gather the organizational structure data in Active Directory catalogue, the other will analyze mail logs, while some others will focus on contacts and meetings data stored in the Microsoft Exchange server. The result of the proposed approach will be a multi-layered social network built effectively and independently. 3 The Idea of Corporate Social Network Analysis The idea of corporate social network analysis consist of application of social network analysis methods (SNA) to social networks built on various company communication and event data. Such analysis can provide an additional information on groups, relations and information flow in a company which may be further used for improving company management in various ways [21]. Also regularities and anomalies in processes, key persons extracted from the social network and many other factors may be found and all these can be considered crucial in finding competitive edge for organizations. Typically, social network actors are persons, i.e. customers, social networking sites users, employees, etc. What may be interesting is that corporate SNA can consider other type of actors functional actors, i.e. warehouse workers threat as one entity or even non-human actors, like IT system, depending on data source availability. Thus, there may be different networks built based on the same data source and analyses may be performed using various combinations of entities. That makes corporate SNA task interesting, but, in some aspects, also complex and challenging. As stated, corporate SNA uses mostly same tools as typical SNA centrality metrics, clustering, group analysis, etc. However, due to its nature, corporate SNA takes into account also some other company information, such as process definitions and HR information. Conjunction of them can facilitate improvement of company organization and management, however, it also requires development of new combined data analysis methods. Interpretation of SNA results in the organization and especially corporate management changes based on these results should be made very carefully, because their straight implementation may be often risky and more disruptive than helpful for organization. This aspect will be discussed further in Section 5.

6 6 Przemysław Kazienko, Radosław Michalski, Sebastian Palus 4 Experiments 4.1 Company Description Researchers gained access to the organizational structure data, logs and (very limited) process definitions in the mid-sized manufacturing company located in Poland. Company employs 300 persons, whereas 1/3 are clerical workers, the rest laborers. The period analyzed was half a year. The type of organizational structure is functional [6]. However, due to organization operating model and its consequences to organizational structure clarity as well as logs interpretation possibility, only a subset of organization have been chosen for analysis: 49 clerical employees not directly related to manufacturing process. There exists three-level management structure in the selected company part: management board (2 persons), managers (11 persons) and regular employees (36 persons) and they work in twelve different departments. 4.2 General Assumptions Social network has been build using logs with the following assumptions: 49 internal identities (employees) analyzed (the reasons described above) s addressed to self, auto responses ( delivered, out of office etc.) and correspondence with IT systems (ERP and helpdesk system) were omitted resulting graph is directed and weighted with the weight of an edge between node i and j is as follows: where is the number of s sent by node i to node j and is a total number of s sent by member i. It means that weight w ij focuses on local neighborhood of an employee rather than on global network characteristic. Because of logs structure, there was no distinction between To, CC and BCC recipients. The resulting set of data contained 11,816 s in total. (1) 4.3 Social Network Profile Basic characteristics of resulting social network are shown in Table 1. Property Value Number of nodes 49 Number of edges Average number of edges per node Range of incoming edges per node <9;32> Range of outgoing edges per node <2;48> Table 1. Characteristic of the social network based on company interactions

7 Social Network Analysis as a Tool for Improving Enterprise Architecture 7 The histogram of node degrees is shown in Figure Fig. 3. Histogram of node degrees Outgoing degree of a node Incoming degree of a node 4.4 Results The analysis focused on opportunities to improve enterprise architecture by means of SNA techniques and, in some cases, comparison to organizational structure or company processes definitions. The first step of social network analysis entities (node) identification showed the difference in number of nodes between the employee list (organizational structure) and social network. As concluded, it was caused by an expatriate delegated to work from other company (part-time), however, still using the previous address. Moreover, the position, which the expatriate occupied, was an important one (head accountant). The lesson learned shows that such situations should be taken into account as a preliminary step before building the social network. The other possible reasons of the same effect: supervisory boards, self-employment, etc. As regards node degree histogram (Figure 3), six persons were contacting with less than ten recipients and these persons were potentially interesting from the process management point of view. Hence, after acquiring information about processes those employees are involved into, it has been found that the process was carried out in non optimal way in three cases. If these persons would use proper IT system or instead of paperwork all of those processes may be improved. Another analysis headed towards finding key persons in each department (partition of social network) and further comparison with the organizational structure. It has been found that among many centrality measures [7], [15], a variant of in-degree centrality IDC w (j) provides very good results in finding department managers in the social network. It is computed in the following way: ( ) (2) where n is the number of all nodes in the social network. In comparison with outdegree centrality, where weight is based not on the number of incoming mails, but on the number of outgoing mails, it has been found, that most managers are rising in indegree centrality rankings (Figure 4). It means that managers are becoming identifiable not due to their relations to the others, but due to the others' relations to these managers.

8 8 Przemysław Kazienko, Radosław Michalski, Sebastian Palus What may be interesting, two non-managers have been found in the top ten nodes of the IDC w rank compared to the organizational structure, but after consultation with the company these two members were also managers at that time: the first person was the formal assistant manager of the before mentioned part-time expatriate and the second one was the executive temporal manager because the original manager was on long-time sick leave (longer than the analyzed period). It is visible in Figures 4(a) and 4(b), where the first step is based only on the social network compared to the organizational structure and the second step reflects those two special cases. 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% (a) rank of identity using IDC w metric 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% (b) rank of identity using ODC w metric Percent of managers identified (the first step) Percent of managers identified (the second step) Department manager Top 10 managers identified (second step) Fig. 4. Managers identified in company social network 5 Discussion on Enterprise Improvements It has been shown that corporate SNA can provide diverse findings. The question is how companies should use the results in a reasonable manner. As previously stated, companies should not base only on SNA, because it is only a support tool. All the results suggesting that some changes can be made should be carefully analyzed and consulted with the management, quality control department, HR department and other authorities involved in the discussed topic. The reason for a such broad discussion is quite simple some facts may be simply hidden for SNA (not stored in any IT system) and consultations can either confirm SNA results or reveal this latent knowledge. For example, the analysis performed on one available layer mail server logs - will prove that one company manager is extremely separated from other department managers or even company board. It may suggest that he is alienated from others, what, in general, is undesired on that type of position. Despite of that, further consultations showed, that he prefers direct meetings with co-employees rather than electronic communication and, for that reason, he should not be relocated or dismissed. That situation is also worth deeper analysis, because it may suggest that there is a need to gather information from more sources in that particular company, i.e. PIM appointment lists as a new layer. Another benefit is that this SNA result may also suggest some changes in case of direct meetings not all decision contents may be written and if there will occur some controversy regarding one of decisions, there would not be a trace to the final decision maker. That is why company management may suggest using communication to that particular manager in order to improve transparency of decision making process.

9 Social Network Analysis as a Tool for Improving Enterprise Architecture 9 The other example worth discussion is the above presented in-degree centrality metric which showed that it is possible to find department managers using SNA. However, why should this metric be considered as the most valuable one? And what decisions should be undertaken by top management if some real managers were found below their subordinates? Or, maybe, if more layers in the same company were analyzed, the rank would differ significantly? There are some more elemental and easier to interpret findings possible. The example of expatriate revealed that some information may be not properly protected, because internal s were stored outside the corporate infrastructure where security policies may be not on desired level. It may lead to some changes in internal communication, improving overall company security. Nodes degree analysis was also valuable in terms of process management shortening the delays in company information flow. Despite all the techniques regarding core data analysis that may be very challenging for SNA experts that the real challenge for companies is to properly interpret and make valuable use of the achieved corporate SNA results. 6 Conclusions and Future Work The analyzed real-world case has proved that corporate social network analysis may be a way to get another point of view on the company. The different channels of communication between employees may be used as a data source to extract corporate social network and results of such network analysis can be used as a valuable decision support tool leading to company architecture improvement. Albeit, as stated in Section 5, the output of this tool should not be used uncritically. The research undertaken shown that some metrics and techniques used in corporate SNA are more valuable than others, especially in-degree centrality may be considered as an important metric in further corporate network analysis. Further work on this topic will include in particular: time-oriented dynamic communication analysis, including sliding windows and weights adapted to time [11], comparison of graphs built separately using different layers as well as the merged ones to analyze metric ranks changes and social network surrounding analysis. Acknowledgments. The work was supported by The Polish Ministry of Science and Higher Education, the development project and the research project References 1. Aalst van der, W.M.P., Song, M.: Mining Social Networks: Uncovering interaction patterns in business processes, In Weske, M., Pernici, B., and Desel, J., (eds.) International Conference on Business Process Management LNCS, vol. 3080, pp Springer-Verlag, Berlin (2004) 2. Bernard, H. R., Killworth, P., Sailer, L.: Summary of research on informant accuracy in network data and the reverse small world problem. Connections, 4(2), pp (1981)

10 10 Przemysław Kazienko, Radosław Michalski, Sebastian Palus 3. Bernard, H. R., Killworth, P., Kronenfeld, D., Sailer, L.: The problem of informant accuracy: the validity of retrospective data. Annual Review of Anthropology, 13, (1984) 4. Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining social networks. In: Proceedings of the 2006 International Workshop on Mining Software Repositories (MSR 2006), ACM, New York, NY, USA, pp (2006) 5. Boyd, D. M., Ellison, N. B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), article 11 (2007) 6. Daft, R. L.: Organization Theory and Design, Tenth Edition. Cengage Learning (2009) 7. Freeman, L. C.: Centrality in social networks conceptual clarification. Social Networks, Volume 1, Issue 3, pp ( ) 8. Haythornthwaite, C., Wellman, B., Mantei, M.: Work relationships and media use: A social network analysis. Group Decision and Negotiation, 4(3), pp (1995) 9. Iseminger, D.: Active Directory Service for Microsoft Windows 2000 Technical Reference. Microsoft Press, Redmond (2000) 10. Kazienko, P., Bródka, P., Musiał, K., Gaworecki, J.: Multi-layered Social Network Creation Based on Bibliographic Data. SocialCom-10, The Second IEEE International Conference on Social Computing, SIN-10 Symposium on Social Intelligence and Networking, IEEE Computer Society Press, 2010, pp (2010) 11. Kazienko, P., Musiał K., Zgrzywa, A.: Evaluation of Node Position Based on Communication. Control and Cybernetics, Vol. 38, No. 1: pp (2009) 12. Krebs, V.: The Social Life of Routers. Internet Protocol Journal 3, pp (2000) 13. Musiał, K., Bródka, P., Kazienko, P., Gaworecki, J.: Extraction of Multi-layered Social Networks from Activity Data. Journal of Global Information Management, in press (2011) 14. Musiał, K., Kazienko, P.: Social Networks on the Internet. World Wide Web, (2011) 15. Musiał, K., Kazienko, P., Bródka, P.: User Position Measures in Social Networks. The third SNA-KDD Workshop on Social Network Mining and Analysis, June 28, 2009, Paris France, ACM Press, Article no. 6 (2009) 16. Onnela, J.-P., Saramaki, J., et al.: Structure and tie strengths in mobile communication networks, Proceedings of the National Academy of Sciences, 104, pp (2007) 17. Palus, S., Bródka, P., Kazienko, P.: Evaluation of Organization Structure based on Interactions. International Journal of Knowledge Society Research, Vol. 2, No. 1 (2011) 18. Resig, J., Santosh Dawara, C.M.H., Teredesai, A.: Extracting social networks from instant messaging populations. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD) Workshop on Link Analysis and Group Detection (2004) 19. Traud, A. L., Kelsic, E. D., Mucha, P. J. and Porter, M. A.: Community structure in online collegiate social networks. American Physical Society, APS March Meeting, abstract #H9.013 (2009) 20. Wagle, D.: The case for ERP systems. The McKinsey Quarterly, 2, pp (1998) 21. Zack, M.H.: Researching organizational systems using social network analysis. Proceedings of the 33rd Annual Hawaii International Conference on System Science (2000)

Matching Organizational Structure and Social Network Extracted from Email Communication

Matching Organizational Structure and Social Network Extracted from Email Communication BIS 2011, 14th International Conference on Business Information Systems Lecture Notes in Business Information Processing LNBIP, vol. 87, pp. 197-206 DOI: 10.1007/978-3-642-21863-7_17 Matching Organizational

More information

Project Knowledge Management Based on Social Networks

Project Knowledge Management Based on Social Networks DOI: 10.7763/IPEDR. 2014. V70. 10 Project Knowledge Management Based on Social Networks Panos Fitsilis 1+, Vassilis Gerogiannis 1, and Leonidas Anthopoulos 1 1 Business Administration Dep., Technological

More information

How to Analyze Company Using Social Network?

How to Analyze Company Using Social Network? How to Analyze Company Using Social Network? Sebastian Palus 1, Piotr Bródka 1, Przemysław Kazienko 1 1 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland {sebastian.palus,

More information

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM

ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM ORGANIZATIONAL KNOWLEDGE MAPPING BASED ON LIBRARY INFORMATION SYSTEM IRANDOC CASE STUDY Ammar Jalalimanesh a,*, Elaheh Homayounvala a a Information engineering department, Iranian Research Institute for

More information

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS

SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS SOCIAL NETWORK ANALYSIS EVALUATING THE CUSTOMER S INFLUENCE FACTOR OVER BUSINESS EVENTS Carlos Andre Reis Pinheiro 1 and Markus Helfert 2 1 School of Computing, Dublin City University, Dublin, Ireland

More information

Multi-agent System for Web Advertising

Multi-agent System for Web Advertising Multi-agent System for Web Advertising Przemysław Kazienko 1 1 Wrocław University of Technology, Institute of Applied Informatics, Wybrzee S. Wyspiaskiego 27, 50-370 Wrocław, Poland kazienko@pwr.wroc.pl

More information

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals

More information

PartJoin: An Efficient Storage and Query Execution for Data Warehouses

PartJoin: An Efficient Storage and Query Execution for Data Warehouses PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE ladjel@imerir.com 2

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

MapReduce Approach to Collective Classification for Networks

MapReduce Approach to Collective Classification for Networks MapReduce Approach to Collective Classification for Networks Wojciech Indyk 1, Tomasz Kajdanowicz 1, Przemyslaw Kazienko 1, and Slawomir Plamowski 1 Wroclaw University of Technology, Wroclaw, Poland Faculty

More information

2.1. The Notion of Customer Relationship Management (CRM)

2.1. The Notion of Customer Relationship Management (CRM) Int. J. Innovative Ideas (IJII) www.publishtopublic.com A Review on CRM and CIS: A Service Oriented Approach A Review on CRM and CIS: A Service Oriented Approach Shadi Hajibagheri 1, *, Babak Shirazi 2,

More information

Implementing Heuristic Miner for Different Types of Event Logs

Implementing Heuristic Miner for Different Types of Event Logs Implementing Heuristic Miner for Different Types of Event Logs Angelina Prima Kurniati 1, GunturPrabawa Kusuma 2, GedeAgungAry Wisudiawan 3 1,3 School of Compuing, Telkom University, Indonesia. 2 School

More information

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10

131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10 1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom

More information

Special Issue on Drivers of Business Process Development: Business, IT, Compliance

Special Issue on Drivers of Business Process Development: Business, IT, Compliance Special Issue on Drivers of Business Process Development: Business, IT, Compliance Selmin Nurcan *, University Paris 1 Panthéon Sorbonne, France Rainer Schmidt, Aalen University, Germany Pnina Soffer,

More information

Dotted Chart and Control-Flow Analysis for a Loan Application Process

Dotted Chart and Control-Flow Analysis for a Loan Application Process Dotted Chart and Control-Flow Analysis for a Loan Application Process Thomas Molka 1,2, Wasif Gilani 1 and Xiao-Jun Zeng 2 Business Intelligence Practice, SAP Research, Belfast, UK The University of Manchester,

More information

Network Analysis of a Large Scale Open Source Project

Network Analysis of a Large Scale Open Source Project 2014 40th Euromicro Conference on Software Engineering and Advanced Applications Network Analysis of a Large Scale Open Source Project Alma Oručević-Alagić, Martin Höst Department of Computer Science,

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS

MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Computer Science 13 (4) 2012 http://dx.doi.org/10.7494/csci.2012.13.4.87 Michał Wrzeszcz Jacek Kitowski MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Abstract In this article, we present an idea of combining

More information

The social network is the m(a)ssage: virtual social capital and realworld business opportunities

The social network is the m(a)ssage: virtual social capital and realworld business opportunities The social network is the m(a)ssage: virtual social capital and realworld business opportunities MILAN BAJIĆ, JOSIP KOLAREC, PETAR JANDRIĆ Department of Informatics and Computing Polytechnic of Zagreb

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

Effective User Navigation in Dynamic Website

Effective User Navigation in Dynamic Website Effective User Navigation in Dynamic Website Ms.S.Nithya Assistant Professor, Department of Information Technology Christ College of Engineering and Technology Puducherry, India Ms.K.Durga,Ms.A.Preeti,Ms.V.Saranya

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

2 Technologies for Security of the 2 Internet

2 Technologies for Security of the 2 Internet 2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu Security Incidents

More information

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko

EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES. Nataliya Golyan, Vera Golyan, Olga Kalynychenko 380 International Journal Information Theories and Applications, Vol. 18, Number 4, 2011 EFFECTIVE CONSTRUCTIVE MODELS OF IMPLICIT SELECTION IN BUSINESS PROCESSES Nataliya Golyan, Vera Golyan, Olga Kalynychenko

More information

Higher Education Management Dashboards

Higher Education Management Dashboards Higher Education Management Dashboards M. Muntean, Gh. Sabau, A.R. Bologa, A. Florea Academy of Economic Studies, Faculty of Economic Cybernetics, Statistics and Informatics, Department of Computer Science,

More information

User Activity Investigation of a Web CRM System Based on the Log Analysis

User Activity Investigation of a Web CRM System Based on the Log Analysis User Activity Investigation of a Web CRM System Based on the Log Analysis Bogdan Trawiski and Marek Wróbel 1 1 Wrocław University of Technology, Institute of Applied Informatics, Wybrzee S. Wyspiaskiego

More information

POLAR IT SERVICES. Business Intelligence Project Methodology

POLAR IT SERVICES. Business Intelligence Project Methodology POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...

More information

Enterprise Organization and Communication Network

Enterprise Organization and Communication Network Enterprise Organization and Communication Network Hideyuki Mizuta IBM Tokyo Research Laboratory 1623-14, Shimotsuruma, Yamato-shi Kanagawa-ken 242-8502, Japan E-mail: e28193@jp.ibm.com Fusashi Nakamura

More information

Business Intelligence and Decision Support Systems

Business Intelligence and Decision Support Systems Chapter 12 Business Intelligence and Decision Support Systems Information Technology For Management 7 th Edition Turban & Volonino Based on lecture slides by L. Beaubien, Providence College John Wiley

More information

A Grid Architecture for Manufacturing Database System

A Grid Architecture for Manufacturing Database System Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies

More information

Data Warehousing and Data Mining in Business Applications

Data Warehousing and Data Mining in Business Applications 133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business

More information

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts

Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Managing and Tracing the Traversal of Process Clouds with Templates, Agendas and Artifacts Marian Benner, Matthias Book, Tobias Brückmann, Volker Gruhn, Thomas Richter, Sema Seyhan paluno The Ruhr Institute

More information

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination

Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination 8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,

More information

LDA Based Security in Personalized Web Search

LDA Based Security in Personalized Web Search LDA Based Security in Personalized Web Search R. Dhivya 1 / PG Scholar, B. Vinodhini 2 /Assistant Professor, S. Karthik 3 /Prof & Dean Department of Computer Science & Engineering SNS College of Technology

More information

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan

A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan , pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak

More information

Network Security Using Job Oriented Architecture (SUJOA)

Network Security Using Job Oriented Architecture (SUJOA) www.ijcsi.org 222 Network Security Using Job Oriented Architecture (SUJOA) Tariq Ahamad 1, Abdullah Aljumah 2 College Of Computer Engineering & Sciences Salman Bin Abdulaziz University, KSA ABSTRACT In

More information

Advanced TTCN-3 Test Suite validation with Titan

Advanced TTCN-3 Test Suite validation with Titan Proceedings of the 9 th International Conference on Applied Informatics Eger, Hungary, January 29 February 1, 2014. Vol. 2. pp. 273 281 doi: 10.14794/ICAI.9.2014.2.273 Advanced TTCN-3 Test Suite validation

More information

Insider Threat Detection Using Graph-Based Approaches

Insider Threat Detection Using Graph-Based Approaches Cybersecurity Applications & Technology Conference For Homeland Security Insider Threat Detection Using Graph-Based Approaches William Eberle Tennessee Technological University weberle@tntech.edu Lawrence

More information

META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING

META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING META DATA QUALITY CONTROL ARCHITECTURE IN DATA WAREHOUSING Ramesh Babu Palepu 1, Dr K V Sambasiva Rao 2 Dept of IT, Amrita Sai Institute of Science & Technology 1 MVR College of Engineering 2 asistithod@gmail.com

More information

Data quality in Accounting Information Systems

Data quality in Accounting Information Systems Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania

More information

Performance Dashboards for Universities

Performance Dashboards for Universities Performance Dashboards for Universities MIHAELA MUNTEAN, GHEORGHE SABAU, ANA-RAMONA BOLOGA, TRAIAN SURCEL, ALEXANDRA FLOREA Department of Computer Science Faculty of Economic Cybernetics, Statistics and

More information

IT services for analyses of various data samples

IT services for analyses of various data samples IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Feature. Applications of Business Process Analytics and Mining for Internal Control. World

Feature. Applications of Business Process Analytics and Mining for Internal Control. World Feature Filip Caron is a doctoral researcher in the Department of Decision Sciences and Information Management, Information Systems Group, at the Katholieke Universiteit Leuven (Flanders, Belgium). Jan

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Viral Marketing in Social Network Using Data Mining

Viral Marketing in Social Network Using Data Mining Viral Marketing in Social Network Using Data Mining Shalini Sharma*,Vishal Shrivastava** *M.Tech. Scholar, Arya College of Engg. & I.T, Jaipur (Raj.) **Associate Proffessor(Dept. of CSE), Arya College

More information

Enterprise System Selection Process in Polish organizations

Enterprise System Selection Process in Polish organizations Przemysław Lech * Enterprise System Selection Process in Polish organizations Introduction The selection of an Enterprise System is a complex and time consuming process (Wei and Wang, 2004), and a systematic

More information

Data Mining Solutions for the Business Environment

Data Mining Solutions for the Business Environment Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania ruxandra_stefania.petre@yahoo.com Over

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree

Predicting the Risk of Heart Attacks using Neural Network and Decision Tree Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,

More information

Application of Social Network Analysis to Collaborative Team Formation

Application of Social Network Analysis to Collaborative Team Formation Application of Social Network Analysis to Collaborative Team Formation Michelle Cheatham Kevin Cleereman Information Directorate Information Directorate AFRL AFRL WPAFB, OH 45433 WPAFB, OH 45433 michelle.cheatham@wpafb.af.mil

More information

Agent-oriented Modeling for Collaborative Learning Environments: A Peer-to-Peer Helpdesk Case Study

Agent-oriented Modeling for Collaborative Learning Environments: A Peer-to-Peer Helpdesk Case Study Agent-oriented Modeling for Collaborative Learning Environments: A Peer-to-Peer Helpdesk Case Study Renata S. S. Guizzardi 1, Gerd Wagner 2 and Lora Aroyo 1 1 Computer Science Department University of

More information

Efficiently Managing Firewall Conflicting Policies

Efficiently Managing Firewall Conflicting Policies Efficiently Managing Firewall Conflicting Policies 1 K.Raghavendra swamy, 2 B.Prashant 1 Final M Tech Student, 2 Associate professor, Dept of Computer Science and Engineering 12, Eluru College of Engineeering

More information

Enhancing Education Quality Assurance Using Data Mining. Case Study: Arab International University Systems.

Enhancing Education Quality Assurance Using Data Mining. Case Study: Arab International University Systems. Enhancing Education Quality Assurance Using Data Mining Case Study: Arab International University Systems. Faek Diko Arab International University Damascus, Syria f-diko@aeu.ac.sy Zaidoun Alzoabi Arab

More information

BUsiness process mining, or process mining in a short

BUsiness process mining, or process mining in a short , July 2-4, 2014, London, U.K. A Process Mining Approach in Software Development and Testing Process: A Case Study Rabia Saylam, Ozgur Koray Sahingoz Abstract Process mining is a relatively new and emerging

More information

A Big Data-driven Model for the Optimization of Healthcare Processes

A Big Data-driven Model for the Optimization of Healthcare Processes Digital Healthcare Empowering Europeans R. Cornet et al. (Eds.) 2015 European Federation for Medical Informatics (EFMI). This article is published online with Open Access by IOS Press and distributed under

More information

Reduce and manage operating costs and improve efficiency. Support better business decisions based on availability of real-time information

Reduce and manage operating costs and improve efficiency. Support better business decisions based on availability of real-time information Data Management Solutions Horizon Software Solution s Data Management Solutions provide organisations with confidence in control of their data as they change systems and implement new solutions. Data is

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Self Organizing Maps for Visualization of Categories

Self Organizing Maps for Visualization of Categories Self Organizing Maps for Visualization of Categories Julian Szymański 1 and Włodzisław Duch 2,3 1 Department of Computer Systems Architecture, Gdańsk University of Technology, Poland, julian.szymanski@eti.pg.gda.pl

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

Data Warehouse Snowflake Design and Performance Considerations in Business Analytics

Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Journal of Advances in Information Technology Vol. 6, No. 4, November 2015 Data Warehouse Snowflake Design and Performance Considerations in Business Analytics Jiangping Wang and Janet L. Kourik Walker

More information

Bisecting K-Means for Clustering Web Log data

Bisecting K-Means for Clustering Web Log data Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining

More information

SCADA System Security, Complexity, and Security Proof

SCADA System Security, Complexity, and Security Proof SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk

More information

Semantic Analysis of Flow Patterns in Business Process Modeling

Semantic Analysis of Flow Patterns in Business Process Modeling Semantic Analysis of Flow Patterns in Business Process Modeling Pnina Soffer 1, Yair Wand 2, and Maya Kaner 3 1 University of Haifa, Carmel Mountain 31905, Haifa 31905, Israel 2 Sauder School of Business,

More information

VISUALIZATION. Improving the Computer Forensic Analysis Process through

VISUALIZATION. Improving the Computer Forensic Analysis Process through By SHELDON TEERLINK and ROBERT F. ERBACHER Improving the Computer Forensic Analysis Process through VISUALIZATION The ability to display mountains of data in a graphical manner significantly enhances the

More information

Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context

Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context Intelligent Analysis of User Interactions in a Collaborative Software Engineering Context Alejandro Corbellini 1,2, Silvia Schiaffino 1,2, Daniela Godoy 1,2 1 ISISTAN Research Institute, UNICEN University,

More information

A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems

A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems Ismail Hababeh School of Computer Engineering and Information Technology, German-Jordanian University Amman, Jordan Abstract-

More information

Automatic Recommendation for Online Users Using Web Usage Mining

Automatic Recommendation for Online Users Using Web Usage Mining Automatic Recommendation for Online Users Using Web Usage Mining Ms.Dipa Dixit 1 Mr Jayant Gadge 2 Lecturer 1 Asst.Professor 2 Fr CRIT, Vashi Navi Mumbai 1 Thadomal Shahani Engineering College,Bandra 2

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

Service Oriented Architecture (SOA) An Introduction

Service Oriented Architecture (SOA) An Introduction Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages

More information

Open Source Software Developer and Project Networks

Open Source Software Developer and Project Networks Open Source Software Developer and Project Networks Matthew Van Antwerp and Greg Madey University of Notre Dame {mvanantw,gmadey}@cse.nd.edu Abstract. This paper outlines complex network concepts and how

More information

Web Document Clustering

Web Document Clustering Web Document Clustering Lab Project based on the MDL clustering suite http://www.cs.ccsu.edu/~markov/mdlclustering/ Zdravko Markov Computer Science Department Central Connecticut State University New Britain,

More information

Process Mining in Big Data Scenario

Process Mining in Big Data Scenario Process Mining in Big Data Scenario Antonia Azzini, Ernesto Damiani SESAR Lab - Dipartimento di Informatica Università degli Studi di Milano, Italy antonia.azzini,ernesto.damiani@unimi.it Abstract. In

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

How Cisco IT Uses SAN to Automate the Legal Discovery Process

How Cisco IT Uses SAN to Automate the Legal Discovery Process How Cisco IT Uses SAN to Automate the Legal Discovery Process Cisco dramatically reduces the cost of legal discovery through better data management. Cisco IT Case Study / Storage Networking / : This case

More information

Data-Aware Service Choreographies through Transparent Data Exchange

Data-Aware Service Choreographies through Transparent Data Exchange Institute of Architecture of Application Systems Data-Aware Service Choreographies through Transparent Data Exchange Michael Hahn, Dimka Karastoyanova, and Frank Leymann Institute of Architecture of Application

More information

Discovery of User Groups within Mobile Data

Discovery of User Groups within Mobile Data Discovery of User Groups within Mobile Data Syed Agha Muhammad Technical University Darmstadt muhammad@ess.tu-darmstadt.de Kristof Van Laerhoven Darmstadt, Germany kristof@ess.tu-darmstadt.de ABSTRACT

More information

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT

APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.2 APPLICATION OF INTELLIGENT METHODS IN COMMERCIAL WEBSITE MARKETING STRATEGIES DEVELOPMENT Algirdas Noreika Department of Practical

More information

A To Do List to Improve Supply Chain Risk Management Capabilities

A To Do List to Improve Supply Chain Risk Management Capabilities A To Do List to Improve Supply Chain Risk Management Capabilities Investigators: Debra Elkins General Motors R&D Center Mailcode 480-106-359 30500 Mound Road Warren, MI 48090 Phone: 586-986-2750 FAX: 586-986-0574

More information

Florida International University - University of Miami TRECVID 2014

Florida International University - University of Miami TRECVID 2014 Florida International University - University of Miami TRECVID 2014 Miguel Gavidia 3, Tarek Sayed 1, Yilin Yan 1, Quisha Zhu 1, Mei-Ling Shyu 1, Shu-Ching Chen 2, Hsin-Yu Ha 2, Ming Ma 1, Winnie Chen 4,

More information

Taking Data Analytics to the Next Level

Taking Data Analytics to the Next Level Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,

More information

Chapter 14 Managing Operational Risks with Bayesian Networks

Chapter 14 Managing Operational Risks with Bayesian Networks Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian

More information

Requirements Management in Distributed Projects

Requirements Management in Distributed Projects Journal of Universal Knowledge Management, vol. 1, no. 2 (2006), 69-76 submitted: 15/5/06, accepted: 15/6/06, appeared: 28/9/06 J.UKM Requirements Management in Distributed Projects Darja Šmite (Riga Information

More information

Solve your toughest challenges with data mining

Solve your toughest challenges with data mining IBM Software IBM SPSS Modeler Solve your toughest challenges with data mining Use predictive intelligence to make good decisions faster Solve your toughest challenges with data mining Imagine if you could

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

LINKING ORGANIZATIONAL PROCESSES TO KNOWLEDGE MANAGEMENT PROCESSES IN THE CASE OF KNOWLEDGE INTENSIVE ORGANIZATIONS: A THEORETICAL FRAMEWORK

LINKING ORGANIZATIONAL PROCESSES TO KNOWLEDGE MANAGEMENT PROCESSES IN THE CASE OF KNOWLEDGE INTENSIVE ORGANIZATIONS: A THEORETICAL FRAMEWORK LINKING ORGANIZATIONAL PROCESSES TO KNOWLEDGE MANAGEMENT PROCESSES IN THE CASE OF KNOWLEDGE INTENSIVE ORGANIZATIONS: A THEORETICAL FRAMEWORK, CREPA Laboratory, Paris-Dauphine University, France Mouna.Benchouikha@dauphine.fr

More information

Optimization of ETL Work Flow in Data Warehouse

Optimization of ETL Work Flow in Data Warehouse Optimization of ETL Work Flow in Data Warehouse Kommineni Sivaganesh M.Tech Student, CSE Department, Anil Neerukonda Institute of Technology & Science Visakhapatnam, India. Sivaganesh07@gmail.com P Srinivasu

More information

Structural Detection of Deadlocks in Business Process Models

Structural Detection of Deadlocks in Business Process Models Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de

More information

A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1

A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.

More information

EMiT: A process mining tool

EMiT: A process mining tool EMiT: A process mining tool B.F. van Dongen and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands. b.f.v.dongen@tue.nl

More information

Mobile Phone APP Software Browsing Behavior using Clustering Analysis

Mobile Phone APP Software Browsing Behavior using Clustering Analysis Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis

More information

AWERProcedia Information Technology & Computer Science

AWERProcedia Information Technology & Computer Science AWERProcedia Information Technology & Computer Science Vol 03 (2013) 1157-1162 3 rd World Conference on Information Technology (WCIT-2012) Webification of Software Development: General Outline and the

More information

Most Effective Communication Management Techniques for Geographically Distributed Project Team Members

Most Effective Communication Management Techniques for Geographically Distributed Project Team Members Most Effective Communication Management Techniques for Geographically Distributed Project Team Members Jawairia Rasheed, Farooque Azam and M. Aqeel Iqbal Department of Computer Engineering College of Electrical

More information

Process Aware Host-based Intrusion Detection Model

Process Aware Host-based Intrusion Detection Model Process Aware Host-based Intrusion Detection Model Hanieh Jalali 1, Ahmad Baraani 1 1 University of Isfahan, Computer Department, Isfahan, Iran {jalali, ahmadb}@eng.ui.ac.ir 117 Abstract: Nowadays, many

More information

Organization of data warehousing in large service companies - A matrix approach based on data ownership and competence centers

Organization of data warehousing in large service companies - A matrix approach based on data ownership and competence centers Organization of data warehousing in large service companies - A matrix approach based on data ownership and competence centers Robert Winter and Markus Meyer Institute of Information Management, University

More information

Detection and mitigation of Web Services Attacks using Markov Model

Detection and mitigation of Web Services Attacks using Markov Model Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan RELAN1@UMBC.EDU Bhushan Sonawane BHUSHAN1@UMBC.EDU Department of Computer Science and Engineering, University of Maryland,

More information

Understanding Web personalization with Web Usage Mining and its Application: Recommender System

Understanding Web personalization with Web Usage Mining and its Application: Recommender System Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,

More information

Social Media Mining. Network Measures

Social Media Mining. Network Measures Klout Measures and Metrics 22 Why Do We Need Measures? Who are the central figures (influential individuals) in the network? What interaction patterns are common in friends? Who are the like-minded users

More information