首页 > 最新文献

Enterprise Information Systems最新文献

英文 中文
Empirical research on the impact of customer integration and information sharing on supply chain performance in community-based homestays in China 中国社区民宿客户整合与信息共享对供应链绩效影响的实证研究
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-27 DOI: 10.1080/17517575.2022.2037161
Y. Tang, K. Chau, Y. Ip, Jiaxin Ji
ABSTRACT This study aimed to investigate the relationship between customer integration, information sharing and supply chain performance in China’s community-based homestays. A valid questionnaire was constructed to explore the relationship between the three variables and distributed to Chinese homestay owners, customers, practitioners and researchers. A total of 208 questionnaires were collected and analysed using correlation and regression analysis. Customer integration and information sharing directly and indirectly positively affected supply chain performance. This study has strengthened knowledge of supply chain management activities of community-based homestays. It is benefit from practices to improve performance and provide meaningful theoretical and practical insights for practitioners.
摘要本研究旨在探讨中国社区民宿的客户整合、信息共享与供应链绩效之间的关系。构建了一份有效的问卷来探究这三个变量之间的关系,并将其分发给中国民宿业主、客户、从业者和研究人员。共收集了208份问卷,并采用相关和回归分析进行了分析。客户整合和信息共享直接或间接地对供应链绩效产生积极影响。本研究加强了对社区民宿供应链管理活动的了解。它得益于实践来提高绩效,并为从业者提供有意义的理论和实践见解。
{"title":"Empirical research on the impact of customer integration and information sharing on supply chain performance in community-based homestays in China","authors":"Y. Tang, K. Chau, Y. Ip, Jiaxin Ji","doi":"10.1080/17517575.2022.2037161","DOIUrl":"https://doi.org/10.1080/17517575.2022.2037161","url":null,"abstract":"ABSTRACT This study aimed to investigate the relationship between customer integration, information sharing and supply chain performance in China’s community-based homestays. A valid questionnaire was constructed to explore the relationship between the three variables and distributed to Chinese homestay owners, customers, practitioners and researchers. A total of 208 questionnaires were collected and analysed using correlation and regression analysis. Customer integration and information sharing directly and indirectly positively affected supply chain performance. This study has strengthened knowledge of supply chain management activities of community-based homestays. It is benefit from practices to improve performance and provide meaningful theoretical and practical insights for practitioners.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43860557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Applied sentiment analysis on a real estate advertisement recommendation model 将情感分析应用于房地产广告推荐模型
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-27 DOI: 10.1080/17517575.2022.2037158
Regina Fang-Ying Lin, Jiesheng Wu, K. Tseng, Y. Tang, Lu Liu
ABSTRACT Recently, the data generated are exploding in the information age. In the post-COVID-19 era, some real estate contracts have been signed online, and online advertisement recommendation has become a new way to reduce the searching cost. Therefore, the model in which real estate online recommendations can be made suitable without user preferences has become a tricky problem. This study uses sentiment and economic data to predict real estate sales and then made an advertisement recommendation from the forecast results. The 2SA-RERec (Two Sentiment Analysis of Real Estate Recommendation) model is proposed, which shows the highest accuracy among the others.
摘要最近,在信息时代,生成的数据呈爆炸式增长。在后COVID-19时代,一些房地产合同已经在网上签订,在线广告推荐成为降低搜索成本的新方式。因此,在没有用户偏好的情况下,如何使房地产在线推荐变得合适已经成为一个棘手的问题。本研究使用情绪和经济数据来预测房地产销售,然后根据预测结果进行广告推荐。提出了2SA-RERec(房地产推荐的两种情绪分析)模型,该模型在其他模型中具有最高的准确性。
{"title":"Applied sentiment analysis on a real estate advertisement recommendation model","authors":"Regina Fang-Ying Lin, Jiesheng Wu, K. Tseng, Y. Tang, Lu Liu","doi":"10.1080/17517575.2022.2037158","DOIUrl":"https://doi.org/10.1080/17517575.2022.2037158","url":null,"abstract":"ABSTRACT Recently, the data generated are exploding in the information age. In the post-COVID-19 era, some real estate contracts have been signed online, and online advertisement recommendation has become a new way to reduce the searching cost. Therefore, the model in which real estate online recommendations can be made suitable without user preferences has become a tricky problem. This study uses sentiment and economic data to predict real estate sales and then made an advertisement recommendation from the forecast results. The 2SA-RERec (Two Sentiment Analysis of Real Estate Recommendation) model is proposed, which shows the highest accuracy among the others.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49089002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security and privacy of smart-X systems smart-X系统的安全和隐私
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-27 DOI: 10.1080/17517575.2021.1923066
S. Tsai, D. Agrawal, Yong Deng
Smart-X is a combination of existing smart technologies that can solve various real-time problems. It is also an emerging trend that can be viewed to be slightly disruptive. There are several technological and regulatory challenges to be addressed. The most important of them are data ownership, security, privacy, and information sharing. The security and privacy issues of the underlying technologies used are carried over to Smart-X systems (Fabisiak 2018). Privacy is a serious concern with IoT technologies. WSN systems have their fair share of flaws in the security aspect. These chinks in the armour have to be ironed out before the technologies can be reliably used as a part of smart X systems. Conclusively, one can confidently state that Smart X is still striding away from being implementable in smart cities and smart grids as a standalone system (Khatwani and Srivastava 2018). These motivations have attracted significant attention recently. In this special issue, we focus on the Security and Privacy of Smart-X Systems, addressing both original algorithmic development and new applications (Zhang, Mouritsen, and Miller 2019). By bringing together original contributions of leading researchers and practitioners from academia as well as industry, we have solicited seven papers for publication after a rigorous peerreview process. They address a wide range of theoretical and application issues in this domain. An integrative perspective of this special issue is provided here by summarising each contribution contained therein. As a massive coordinated attack on the availability of services through many compromised systems, distributed denial of service (DDoS) flooding attack has become one of the critical challenges to security professionals. To defend against DDoS attack along with maintaining Quality of Service (QoS) for legitimate users, a policy-based network management (PBNM) strategy has been proposed by Dahiya and Gupta. The strategy is used to enable users to negotiate with the service provider dynamically on cost and types of services. With the expanding range of channels for customers to acquire products, the Smart-X system plays an essential role in pricing strategies in that fairness concerns could significantly impact the price. If customers in the BM store have concerns, the firm is induced to lower product prices in stores, leading to total profit reduction. Meanwhile, it is better for the firm to operate in dual channels when customers do not have fairness concerns. Through comparison among three models with or without customers’ fairness concerns, security and privacy concerns, L. Yang et al. researched how to examine the impacts of customers’ fairness concerns on the firm’s optimal pricing strategy as well as total profit. It is also vital to investigate the impact of privacy concerns on purchasing decisions of customers and pricing strategies of service providers in Smart-X systems. S. Dong et al. develop profit maximisation models to
smart - x是现有智能技术的组合,可以解决各种实时问题。这也是一种新兴趋势,可以被视为具有轻微的破坏性。有几个技术和监管方面的挑战需要解决。其中最重要的是数据所有权、安全性、隐私和信息共享。所使用的底层技术的安全和隐私问题被转移到Smart-X系统(Fabisiak 2018)。隐私是物联网技术的一个严重问题。无线传感器网络系统在安全方面存在一定的缺陷。在这些技术能够作为智能X系统的一部分可靠地使用之前,这些装甲上的裂缝必须被消除。最后,我们可以自信地说,智能X距离作为一个独立的系统在智能城市和智能电网中实施还有很长的路要走(Khatwani和Srivastava 2018)。这些动机最近引起了极大的关注。在本期特刊中,我们将重点关注Smart-X系统的安全性和隐私性,讨论原始算法开发和新应用(Zhang, Mouritsen, and Miller 2019)。通过汇集来自学术界和工业界的主要研究人员和实践者的原创贡献,我们在严格的同行评审过程后征集了七篇论文发表。它们解决了该领域广泛的理论和应用问题。这里通过总结其中所载的每一篇文章,对这个特别问题提供一个综合的观点。分布式拒绝服务(DDoS)泛洪攻击是一种通过多个受损系统对服务可用性进行大规模协同攻击的攻击,已成为安全专业人员面临的关键挑战之一。为了防御DDoS攻击,同时保证合法用户的服务质量(QoS), Dahiya和Gupta提出了基于策略的网络管理(PBNM)策略。该策略用于使用户能够与服务提供者就服务的成本和类型进行动态协商。随着消费者获取产品渠道的扩大,Smart-X系统在定价策略中起着至关重要的作用,因为公平性问题可能会对价格产生重大影响。如果BM店的顾客有顾虑,就会诱使公司降低店内产品价格,导致总利润减少。同时,当客户不担心公平问题时,公司最好采用双渠道运营。L. Yang等人通过对比考虑和不考虑顾客公平关注、安全和隐私关注的三种模型,研究了如何检验顾客公平关注对企业最优定价策略和总利润的影响。在Smart-X系统中,研究隐私问题对客户购买决策和服务提供商定价策略的影响也至关重要。S. Dong等人建立了利润最大化模型来测试垄断和竞争市场中高级服务和基本服务的采购决策和定价策略。研究发现,各服务提供商的定价决策及其相对市场地位由《企业信息系统2022》第16卷第1期决定。3,403 - 405 https://doi.org/10.1080/17517575.2021.1923066
{"title":"Security and privacy of smart-X systems","authors":"S. Tsai, D. Agrawal, Yong Deng","doi":"10.1080/17517575.2021.1923066","DOIUrl":"https://doi.org/10.1080/17517575.2021.1923066","url":null,"abstract":"Smart-X is a combination of existing smart technologies that can solve various real-time problems. It is also an emerging trend that can be viewed to be slightly disruptive. There are several technological and regulatory challenges to be addressed. The most important of them are data ownership, security, privacy, and information sharing. The security and privacy issues of the underlying technologies used are carried over to Smart-X systems (Fabisiak 2018). Privacy is a serious concern with IoT technologies. WSN systems have their fair share of flaws in the security aspect. These chinks in the armour have to be ironed out before the technologies can be reliably used as a part of smart X systems. Conclusively, one can confidently state that Smart X is still striding away from being implementable in smart cities and smart grids as a standalone system (Khatwani and Srivastava 2018). These motivations have attracted significant attention recently. In this special issue, we focus on the Security and Privacy of Smart-X Systems, addressing both original algorithmic development and new applications (Zhang, Mouritsen, and Miller 2019). By bringing together original contributions of leading researchers and practitioners from academia as well as industry, we have solicited seven papers for publication after a rigorous peerreview process. They address a wide range of theoretical and application issues in this domain. An integrative perspective of this special issue is provided here by summarising each contribution contained therein. As a massive coordinated attack on the availability of services through many compromised systems, distributed denial of service (DDoS) flooding attack has become one of the critical challenges to security professionals. To defend against DDoS attack along with maintaining Quality of Service (QoS) for legitimate users, a policy-based network management (PBNM) strategy has been proposed by Dahiya and Gupta. The strategy is used to enable users to negotiate with the service provider dynamically on cost and types of services. With the expanding range of channels for customers to acquire products, the Smart-X system plays an essential role in pricing strategies in that fairness concerns could significantly impact the price. If customers in the BM store have concerns, the firm is induced to lower product prices in stores, leading to total profit reduction. Meanwhile, it is better for the firm to operate in dual channels when customers do not have fairness concerns. Through comparison among three models with or without customers’ fairness concerns, security and privacy concerns, L. Yang et al. researched how to examine the impacts of customers’ fairness concerns on the firm’s optimal pricing strategy as well as total profit. It is also vital to investigate the impact of privacy concerns on purchasing decisions of customers and pricing strategies of service providers in Smart-X systems. S. Dong et al. develop profit maximisation models to","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45407126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Deep Learning-based Sentiment Analysis Method Enhanced with Emojis in Microblog Social Networks 一种基于深度学习的微博社交网络情绪分析方法
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-27 DOI: 10.1080/17517575.2022.2037160
Xianyong Li, Jiabo Zhang, Yajun Du, Jian Zhu, Yongquan Fan, Xiaoliang Chen
ABSTRACT To exactly classify sentiments of microblog reviews with emojis in microblog social networks, this paper first proposes an emoji vectorisation method to achieve emoji vectors. Then, an emoji-text integrated bidirectional LSTM (ET-BiLSTM) model for sentiment analysis is proposed. In this model, review text-based sentence representations are extracted by a bidirectional LSTM network. Emoji-based auxiliary representations are obtained by a new attention mechanism. The two representations are further integrated into final review representation vectors. Finally, experimental results indicate that the proposed ET-BiLSTM model improves the performance of sentiment classification evaluated by macro-P, macro-R and macro-F1 scores in microblog social networks.
摘要为了准确地对微博社交网络中带有表情符号的微博评论情感进行分类,本文首先提出了一种表情符号向量化方法来实现表情符号向量。然后,提出了一种用于情绪分析的表情-文本集成双向LSTM(ET-BiLSTM)模型。在该模型中,通过双向LSTM网络提取基于评论文本的句子表示。基于表情的辅助表征是通过一种新的注意机制获得的。这两个表示被进一步集成到最终审查表示向量中。最后,实验结果表明,所提出的ET-BiLSTM模型提高了微博社交网络中用macro-P、macro-R和macro-F1评分进行情感分类的性能。
{"title":"A Novel Deep Learning-based Sentiment Analysis Method Enhanced with Emojis in Microblog Social Networks","authors":"Xianyong Li, Jiabo Zhang, Yajun Du, Jian Zhu, Yongquan Fan, Xiaoliang Chen","doi":"10.1080/17517575.2022.2037160","DOIUrl":"https://doi.org/10.1080/17517575.2022.2037160","url":null,"abstract":"ABSTRACT To exactly classify sentiments of microblog reviews with emojis in microblog social networks, this paper first proposes an emoji vectorisation method to achieve emoji vectors. Then, an emoji-text integrated bidirectional LSTM (ET-BiLSTM) model for sentiment analysis is proposed. In this model, review text-based sentence representations are extracted by a bidirectional LSTM network. Emoji-based auxiliary representations are obtained by a new attention mechanism. The two representations are further integrated into final review representation vectors. Finally, experimental results indicate that the proposed ET-BiLSTM model improves the performance of sentiment classification evaluated by macro-P, macro-R and macro-F1 scores in microblog social networks.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42714142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure 使用公钥基础设施建立基于区块链的物联网服务的信任
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-24 DOI: 10.1080/17517575.2022.2037162
W. Viriyasitavat, Lida Xu, Assadaporn Sapsomboon, G. Dhiman, D. Hoonsopon
ABSTRACT The advancement of hardware, software, and Internet infrastructure leads to the increasing quantities of smart Internet of Things (IoT) devices. Meanwhile, security issues have increasingly brought to us the concerns due to the evolving IoT scope and mass communications. Trusting service vendors depends on their devices that generate information and provide executions. Blockchain becomes an attractive choice, as evidenced by its wide adoptions. However, trusting IoT-based services becomes an important issue since the implementation of Blockchain-based IoT (BIoT) services is proprietary and independent. This paper introduces a generic architecture design that incorporates Public Key Infrastructure (PKI) to establish trust of BIoT services. This can potentially solve the trust problem and based on our experiment it can be scaled well. We also demonstrate how specification languages can be useful to express requirements. It decouples users from Blockchain and thus they can specify qualities of BIoT services without deep knowledge to work with Blockchain.
摘要硬件、软件和互联网基础设施的进步导致智能物联网(IoT)设备的数量不断增加。与此同时,由于物联网范围和大众通信的不断发展,安全问题越来越引起我们的关注。信任服务供应商取决于他们生成信息和提供执行的设备。区块链成为一个有吸引力的选择,其被广泛采用就是明证。然而,信任基于物联网的服务成为一个重要问题,因为基于区块链的物联网(BIoT)服务的实施是专有和独立的。本文介绍了一种通用的体系结构设计,它结合了公钥基础设施(PKI)来建立对BIoT服务的信任。这可以潜在地解决信任问题,并且基于我们的实验,它可以很好地扩展。我们还展示了规范语言在表达需求方面的作用。它将用户与区块链脱钩,因此他们可以在没有深入知识的情况下指定BIoT服务的质量来使用区块链。
{"title":"Building trust of Blockchain-based Internet-of-Thing services using public key infrastructure","authors":"W. Viriyasitavat, Lida Xu, Assadaporn Sapsomboon, G. Dhiman, D. Hoonsopon","doi":"10.1080/17517575.2022.2037162","DOIUrl":"https://doi.org/10.1080/17517575.2022.2037162","url":null,"abstract":"ABSTRACT The advancement of hardware, software, and Internet infrastructure leads to the increasing quantities of smart Internet of Things (IoT) devices. Meanwhile, security issues have increasingly brought to us the concerns due to the evolving IoT scope and mass communications. Trusting service vendors depends on their devices that generate information and provide executions. Blockchain becomes an attractive choice, as evidenced by its wide adoptions. However, trusting IoT-based services becomes an important issue since the implementation of Blockchain-based IoT (BIoT) services is proprietary and independent. This paper introduces a generic architecture design that incorporates Public Key Infrastructure (PKI) to establish trust of BIoT services. This can potentially solve the trust problem and based on our experiment it can be scaled well. We also demonstrate how specification languages can be useful to express requirements. It decouples users from Blockchain and thus they can specify qualities of BIoT services without deep knowledge to work with Blockchain.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43116489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Intelligent resource management at the network edge using content delivery networks 在网络边缘使用内容交付网络进行智能资源管理
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-16 DOI: 10.1080/17517575.2022.2037159
Mahdi Abbasi, M. Khosravi, A. Ramezani
ABSTRACT In a distributed denial-of-service attack, a large volume of packets is sent to the victim server to prevent service delivery and make it unavailable to valid users and clients at the network edge. In this paper, we use content delivery networks to propose a new intelligent solution that protects the main servers at the network edge by using alternative edge servers and agents. Thus, Internet attacks on the main servers could be prevented. The simulation results show that, the proposed mechanism has considerably increased the processing efficiency at the edge servers, and simultaneously provided the required security against internet attacks.
摘要在分布式拒绝服务攻击中,向受害服务器发送大量报文,阻止服务的传递,使网络边缘的有效用户和客户端无法获得服务。在本文中,我们使用内容交付网络提出了一种新的智能解决方案,通过使用替代边缘服务器和代理来保护网络边缘的主服务器。因此,互联网对主要服务器的攻击可以被阻止。仿真结果表明,该机制大大提高了边缘服务器的处理效率,同时提供了抵御网络攻击所需的安全性。
{"title":"Intelligent resource management at the network edge using content delivery networks","authors":"Mahdi Abbasi, M. Khosravi, A. Ramezani","doi":"10.1080/17517575.2022.2037159","DOIUrl":"https://doi.org/10.1080/17517575.2022.2037159","url":null,"abstract":"ABSTRACT In a distributed denial-of-service attack, a large volume of packets is sent to the victim server to prevent service delivery and make it unavailable to valid users and clients at the network edge. In this paper, we use content delivery networks to propose a new intelligent solution that protects the main servers at the network edge by using alternative edge servers and agents. Thus, Internet attacks on the main servers could be prevented. The simulation results show that, the proposed mechanism has considerably increased the processing efficiency at the edge servers, and simultaneously provided the required security against internet attacks.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44326900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deep learning and intelligent system towards smart manufacturing 面向智能制造的深度学习和智能系统
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-02-01 DOI: 10.1080/17517575.2021.1898050
Mu-Yen Chen, E. Lughofer, E. Eğrioğlu
Machine learning has been applied to solve complex problems in human society for years. The success of machine learning is because of the support of computing capabilities as well as sensing technology. An evolution of artificial intelligence and data-driven approaches will soon cause considerable impacts on the field. Search engines, image recognition, biometrics, speech and handwriting recognition, natural language processing, and even medical diagnostics and financial credit ratings are all common examples. It is clear that many challenges will be brought to public as artificial intelligence infiltrates our world, and more specifically, our lives. With the integration and extensive applications of the new generation of information technologies (such as cloud computing, IoT, big data, deep learning, AVG) in manufacturing industry, a number of countries have put forward their national advanced manufacturing development strategies, such as Industry 4.0 in Germany, Industrial Internet and manufacturing system based on CPS (Cyber-Physical Systems) in the USA, as well as Made in China 2025 and Internet Plus Manufacturing in China. Smart Manufacturing and the Smart Factory enables all information about the manufacturing process to be available when and where it is needed across entire manufacturing supply chains and product lifecycles. Smart Manufacturing is being predicted as the next Industrial Revolution or Industry 4.0. And, as with many other advances throughout recent years, it all has to do with technology connectivity and the advances in the contextualisation of data. However, with neither the intelligent system support nor the support of data science technology, ‘smart’ cannot be achieved.
机器学习已经应用于解决人类社会的复杂问题很多年了。机器学习的成功是因为计算能力和传感技术的支持。人工智能和数据驱动方法的发展将很快对该领域产生重大影响。搜索引擎、图像识别、生物识别、语音和手写识别、自然语言处理,甚至医疗诊断和金融信用评级都是常见的例子。很明显,随着人工智能渗透到我们的世界,更具体地说,渗透到我们的生活中,将给公众带来许多挑战。随着云计算、物联网、大数据、深度学习、AVG等新一代信息技术在制造业领域的融合和广泛应用,多个国家纷纷提出了国家先进制造业发展战略,如德国的工业4.0、美国的工业互联网和基于CPS (Cyber-Physical Systems)的制造系统、中国的“中国制造2025”、“互联网+制造”等。智能制造和智能工厂能够在整个制造供应链和产品生命周期中随时随地提供有关制造过程的所有信息。智能制造被预测为下一次工业革命或工业4.0。而且,与近年来的许多其他进步一样,这一切都与技术连接和数据情境化的进步有关。然而,没有智能系统的支持,也没有数据科学技术的支持,“智能”是无法实现的。
{"title":"Deep learning and intelligent system towards smart manufacturing","authors":"Mu-Yen Chen, E. Lughofer, E. Eğrioğlu","doi":"10.1080/17517575.2021.1898050","DOIUrl":"https://doi.org/10.1080/17517575.2021.1898050","url":null,"abstract":"Machine learning has been applied to solve complex problems in human society for years. The success of machine learning is because of the support of computing capabilities as well as sensing technology. An evolution of artificial intelligence and data-driven approaches will soon cause considerable impacts on the field. Search engines, image recognition, biometrics, speech and handwriting recognition, natural language processing, and even medical diagnostics and financial credit ratings are all common examples. It is clear that many challenges will be brought to public as artificial intelligence infiltrates our world, and more specifically, our lives. With the integration and extensive applications of the new generation of information technologies (such as cloud computing, IoT, big data, deep learning, AVG) in manufacturing industry, a number of countries have put forward their national advanced manufacturing development strategies, such as Industry 4.0 in Germany, Industrial Internet and manufacturing system based on CPS (Cyber-Physical Systems) in the USA, as well as Made in China 2025 and Internet Plus Manufacturing in China. Smart Manufacturing and the Smart Factory enables all information about the manufacturing process to be available when and where it is needed across entire manufacturing supply chains and product lifecycles. Smart Manufacturing is being predicted as the next Industrial Revolution or Industry 4.0. And, as with many other advances throughout recent years, it all has to do with technology connectivity and the advances in the contextualisation of data. However, with neither the intelligent system support nor the support of data science technology, ‘smart’ cannot be achieved.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45282105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A data analytic-based logistics modelling framework for E-commerce enterprise 基于数据分析的电子商务企业物流建模框架
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-01-27 DOI: 10.1080/17517575.2022.2028195
Abhishek Verma, Y. Kuo, M. Kumar, S. Pratap, Velvet Chen
ABSTRACT Data-driven approaches have noteworthy significance in managing and improving logistics in E-commerce enterprises. This study focuses on the development of an integrated framework to analyse the Brazilian E-Commerce enterprise public dataset. From the analysis, it is found that sellers of Ibitinga city of SP state had the most count of late deliveries where 42 sellers are under-performing in terms of estimated delivery time. Locations of customers and sellers were spotted on a map to get a geographical representation. The proposed framework may help E-Commerce enterprise owners and retail merchants to make better decisions related to sales and E-Commerce enterprise logistics.
数据驱动方法对电子商务企业的物流管理和改善具有重要意义。本研究的重点是开发一个综合框架来分析巴西电子商务企业公共数据集。从分析中发现,SP州Ibitinga市的卖家有最多的延迟交货数量,其中42个卖家在预计交货时间方面表现不佳。顾客和卖家的位置被标注在地图上,以获得地理代表。提出的框架可以帮助电子商务企业所有者和零售商更好地做出与销售和电子商务企业物流相关的决策。
{"title":"A data analytic-based logistics modelling framework for E-commerce enterprise","authors":"Abhishek Verma, Y. Kuo, M. Kumar, S. Pratap, Velvet Chen","doi":"10.1080/17517575.2022.2028195","DOIUrl":"https://doi.org/10.1080/17517575.2022.2028195","url":null,"abstract":"ABSTRACT Data-driven approaches have noteworthy significance in managing and improving logistics in E-commerce enterprises. This study focuses on the development of an integrated framework to analyse the Brazilian E-Commerce enterprise public dataset. From the analysis, it is found that sellers of Ibitinga city of SP state had the most count of late deliveries where 42 sellers are under-performing in terms of estimated delivery time. Locations of customers and sellers were spotted on a map to get a geographical representation. The proposed framework may help E-Commerce enterprise owners and retail merchants to make better decisions related to sales and E-Commerce enterprise logistics.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45101347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Intellectual structure of cybersecurity research in enterprise information systems 企业信息系统中网络安全知识结构研究
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-01-09 DOI: 10.1080/17517575.2022.2025545
Nitin Singh, Venkataraghavan Krishnaswamy, Z. Zhang
ABSTRACT Enterprises aspire for ongoing and effective information systems security. Cybersecurity frameworks ensure the availability, confidentiality, and integrity of information. Inspired by the omnipresent challenges and ever-increasing spending by enterprises, we identify the state of research on cybersecurity in enterprises. We employ citation, co-citation, centrality, and citation-path analysis to uncover its intellectual core. Our study reveals five core themes of cybersecurity research: (a) artificial intelligence in cybersecurity, (b) grids, networks, and platform security, (c) algorithms & methods, (d) optimisation & modelling, and (e) cybersecurity management. We discuss the implications for EIS and opportunities for research in each of these themes.
摘要企业渴望持续有效的信息系统安全。网络安全框架确保信息的可用性、机密性和完整性。受无处不在的挑战和企业不断增长的支出的启发,我们确定了企业网络安全的研究现状。我们采用引文、共引、中心性和引文路径分析来揭示其知识核心。我们的研究揭示了网络安全研究的五个核心主题:(a)网络安全中的人工智能,(b)网格、网络和平台安全,(c)算法和方法,(d)优化和建模,以及(e)网络安全管理。我们讨论了环境影响报告书的含义以及在每一个主题中进行研究的机会。
{"title":"Intellectual structure of cybersecurity research in enterprise information systems","authors":"Nitin Singh, Venkataraghavan Krishnaswamy, Z. Zhang","doi":"10.1080/17517575.2022.2025545","DOIUrl":"https://doi.org/10.1080/17517575.2022.2025545","url":null,"abstract":"ABSTRACT Enterprises aspire for ongoing and effective information systems security. Cybersecurity frameworks ensure the availability, confidentiality, and integrity of information. Inspired by the omnipresent challenges and ever-increasing spending by enterprises, we identify the state of research on cybersecurity in enterprises. We employ citation, co-citation, centrality, and citation-path analysis to uncover its intellectual core. Our study reveals five core themes of cybersecurity research: (a) artificial intelligence in cybersecurity, (b) grids, networks, and platform security, (c) algorithms & methods, (d) optimisation & modelling, and (e) cybersecurity management. We discuss the implications for EIS and opportunities for research in each of these themes.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47996575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system 基于物联网的企业信息系统中恶意软件检测的机器学习方法综述
IF 4.4 4区 计算机科学 Q1 Computer Science Pub Date : 2022-01-07 DOI: 10.1080/17517575.2021.2023764
Akshat Gaurav, B. Gupta, P. Panigrahi
ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued academics’ and business information systems’ attention in recent years. The Internet of Things establishes a network that enables smart devices in an organisational information system to connect to one another and exchange data with the central storage. Android apps are placed on Android apps to enhance the user-friendliness of IoT devices in business information systems, making them more interactive and user-friendly. However, the usage of Android apps makes IoT devices susceptible to all forms of malware attacks, including those that attempt to hack into IoT devices and get access to sensitive information stored in the corporate information system. The researchers offered a variety of attack mitigation approaches for detecting harmful malware embedded in an Android application operating on an IoT device. In this context, machine learning offered the most promising strategies to detect malware attacks in IoT-based enterprise information systems because of its better accuracy and precision. Its capacity to adapt to new forms of malware attacks is a result of its learning capabilities. Therefore, we conduct a detailed survey, which discusses emerging machine learning algorithms for detecting malware in business information systems powered by the Internet of Things. This article reviews all available research on malware detection, including static malware detection, dynamic malware detection, promoted malware detection and hybrid malware detection.
摘要物联网(IoT)是一项相对较新的技术,近年来引起了学术界和商业信息系统的关注。物联网建立了一个网络,使组织信息系统中的智能设备能够相互连接,并与中央存储器交换数据。安卓应用程序被放置在安卓应用上,以增强商业信息系统中物联网设备的用户友好性,使其更具互动性和用户友好性。然而,安卓应用程序的使用使物联网设备容易受到各种形式的恶意软件攻击,包括那些试图侵入物联网设备并访问存储在公司信息系统中的敏感信息的设备。研究人员提供了多种攻击缓解方法,用于检测在物联网设备上运行的安卓应用程序中嵌入的有害恶意软件。在这种情况下,机器学习提供了最有前途的策略来检测基于物联网的企业信息系统中的恶意软件攻击,因为它具有更好的准确性和准确性。它适应新形式恶意软件攻击的能力是其学习能力的结果。因此,我们进行了一项详细的调查,讨论了在物联网支持的商业信息系统中检测恶意软件的新兴机器学习算法。本文综述了所有可用的恶意软件检测研究,包括静态恶意软件检测、动态恶意软件检测,推广恶意软件检测和混合恶意软件检测。
{"title":"A comprehensive survey on machine learning approaches for malware detection in IoT-based enterprise information system","authors":"Akshat Gaurav, B. Gupta, P. Panigrahi","doi":"10.1080/17517575.2021.2023764","DOIUrl":"https://doi.org/10.1080/17517575.2021.2023764","url":null,"abstract":"ABSTRACT The Internet of Things (IoT) is a relatively new technology that has piqued academics’ and business information systems’ attention in recent years. The Internet of Things establishes a network that enables smart devices in an organisational information system to connect to one another and exchange data with the central storage. Android apps are placed on Android apps to enhance the user-friendliness of IoT devices in business information systems, making them more interactive and user-friendly. However, the usage of Android apps makes IoT devices susceptible to all forms of malware attacks, including those that attempt to hack into IoT devices and get access to sensitive information stored in the corporate information system. The researchers offered a variety of attack mitigation approaches for detecting harmful malware embedded in an Android application operating on an IoT device. In this context, machine learning offered the most promising strategies to detect malware attacks in IoT-based enterprise information systems because of its better accuracy and precision. Its capacity to adapt to new forms of malware attacks is a result of its learning capabilities. Therefore, we conduct a detailed survey, which discusses emerging machine learning algorithms for detecting malware in business information systems powered by the Internet of Things. This article reviews all available research on malware detection, including static malware detection, dynamic malware detection, promoted malware detection and hybrid malware detection.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4,"publicationDate":"2022-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48554892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
期刊
Enterprise Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1