首页 > 最新文献

International Conference on Information Society (i-Society 2011)最新文献

英文 中文
Design a mobile game for home computer users to prevent from “phishing attacks” 为家用电脑用户设计一款手机游戏,防止“网络钓鱼攻击”
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978543
N. Arachchilage, Melissa Cole
This research aims to design an educational mobile game for home computer users to protect against phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance motivation and behaviour of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.
本研究旨在为家庭电脑用户设计一个教育手机游戏,以防止网络钓鱼攻击。网络钓鱼是一种网络身份盗窃,旨在窃取受害者的敏感信息,如用户名、密码和网上银行详细信息。为了防止这种情况,需要考虑进行网络钓鱼教育。手机游戏有助于将学习融入自然环境中。本文介绍了一种基于故事的手机游戏设计方法,这种方法对现实生活进行了简化和夸张。我们使用源自技术威胁避免理论(TTAT)的理论模型来解决游戏设计问题,并将游戏设计原则用作构建和呈现信息的一套指导方针。整体的手机游戏设计旨在提高家庭电脑用户的回避动机和行为,以防止网络钓鱼威胁。在Google App Inventor模拟器上展示了游戏原型设计。我们相信,通过培训家庭电脑用户防范网络钓鱼攻击,将有助于使网络空间成为一个安全的环境。
{"title":"Design a mobile game for home computer users to prevent from “phishing attacks”","authors":"N. Arachchilage, Melissa Cole","doi":"10.1109/I-SOCIETY18435.2011.5978543","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978543","url":null,"abstract":"This research aims to design an educational mobile game for home computer users to protect against phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance motivation and behaviour of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126216879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Effective Web service selection for composition using centrality measures 使用中心性度量对组合进行有效的Web服务选择
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978439
S. Bansal, A. Bansal
With the increasing popularity of Web services and Service-Oriented Architecture, we need sophisticated infrastructure to discover and compose Web services. Dynamic Web service Composition will gain wider acceptance only when users know that the solutions obtained are comprised of trustworthy services. In this paper, we extend our Web service Composition framework to include selection and ranking of services based on their reputation score. We present a technique to calculate a reputation score per service using centrality measure of Social Networks.
随着Web服务和面向服务的体系结构的日益流行,我们需要复杂的基础设施来发现和组合Web服务。只有当用户知道所获得的解决方案由值得信赖的服务组成时,动态Web服务组合才会得到更广泛的接受。在本文中,我们扩展了我们的Web服务组合框架,以包括基于其信誉评分的服务选择和排名。我们提出了一种使用社交网络的中心性度量来计算每个服务的声誉得分的技术。
{"title":"Effective Web service selection for composition using centrality measures","authors":"S. Bansal, A. Bansal","doi":"10.1109/I-SOCIETY18435.2011.5978439","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978439","url":null,"abstract":"With the increasing popularity of Web services and Service-Oriented Architecture, we need sophisticated infrastructure to discover and compose Web services. Dynamic Web service Composition will gain wider acceptance only when users know that the solutions obtained are comprised of trustworthy services. In this paper, we extend our Web service Composition framework to include selection and ranking of services based on their reputation score. We present a technique to calculate a reputation score per service using centrality measure of Social Networks.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transparent authentication in E-learning E-learning中的透明认证
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978465
Nawfal F. Fadhel, G. Wills, David Argles
In the context of on-line assessment in E-learning a problem arises is that someone taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam. This differs from authenticating for on-line banking where it is in the user interest to ensure safe and correct authentication. Our proposed solution is to digitally sign the student work by embedding voice samples in the exam paper at regular intervals. In this investigation we have demonstrated that transparent steganography can provide an effective mechanism for achieving such a good goal.
在电子学习的在线评估环境中,出现了一个问题,即参加考试的人可能希望通过将个人证书交给其他人来代替他们参加考试来作弊。这与在线银行的身份验证不同,在网上银行,确保安全正确的身份验证符合用户的利益。我们提出的解决方案是通过定期在试卷中嵌入语音样本来对学生的作业进行数字签名。在这项调查中,我们已经证明,透明隐写术可以提供一个有效的机制,以实现这样一个良好的目标。
{"title":"Transparent authentication in E-learning","authors":"Nawfal F. Fadhel, G. Wills, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978465","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978465","url":null,"abstract":"In the context of on-line assessment in E-learning a problem arises is that someone taking an exam may wish to cheat by handing over personal credentials to someone to take their place in an exam. This differs from authenticating for on-line banking where it is in the user interest to ensure safe and correct authentication. Our proposed solution is to digitally sign the student work by embedding voice samples in the exam paper at regular intervals. In this investigation we have demonstrated that transparent steganography can provide an effective mechanism for achieving such a good goal.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117285583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reengineering of a virtual library in science technology and innovation: Improvements on information access 科技创新中的虚拟图书馆再造:信息获取的改进
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978437
D. Ucha, Fabiana Andrade Pereira
Ensuring information access has become a critical issue in modern society. Information is considered nowadays one of the most valuable and strategic asset. Information access improvements aim to reduce the barrier between information creators and information seekers. Aligned to this definition, five improvements (Search Engine Optimization, Information Architecture, Usability, Accessibility and Social Media) were selected as a main guideline for VLs' information access upgrade, which are under development in FAPESP's VL.
确保信息获取已成为现代社会的一个关键问题。信息被认为是当今最有价值的战略资产之一。信息访问改进的目的是减少信息创造者和信息寻求者之间的障碍。根据这一定义,我们选择了五项改进(搜索引擎优化、信息架构、可用性、可访问性和社交媒体)作为VLs信息访问升级的主要指导方针,这些改进正在FAPESP的VL中开发。
{"title":"Reengineering of a virtual library in science technology and innovation: Improvements on information access","authors":"D. Ucha, Fabiana Andrade Pereira","doi":"10.1109/I-SOCIETY18435.2011.5978437","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978437","url":null,"abstract":"Ensuring information access has become a critical issue in modern society. Information is considered nowadays one of the most valuable and strategic asset. Information access improvements aim to reduce the barrier between information creators and information seekers. Aligned to this definition, five improvements (Search Engine Optimization, Information Architecture, Usability, Accessibility and Social Media) were selected as a main guideline for VLs' information access upgrade, which are under development in FAPESP's VL.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121535605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using open-source tools for web crawling and indexing of open content 使用开源工具进行网络抓取和开放内容索引
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978485
André Ricardo, C. Serrão
The Internet has made possible the access to thousands of freely available music tracks under the Creative Commons or Public Domain licenses. This number keeps growing on a yearly basis. In practical terms, it is extremely difficult to browse this huge music collection, because it is widely dispersed throughout multiple websites. The work presented on this paper addresses the problem of indexing this large collection of free music. This is a very relevant problem because currently there are no integrated database or index holding information about this music material. Indexing this content will allow, for instance, the development of music recommendation systems that will also work with noncommercial content. In this paper the authors present a system proposal that has been developed to tackle the available free music indexing problem and how this system can be integrated with other systems (such as music recommendation systems) to allow the end users to enjoy free and open music content.
在知识共享或公共领域许可下,互联网使访问成千上万的免费音乐曲目成为可能。这个数字每年都在增长。实际上,浏览这个庞大的音乐收藏是非常困难的,因为它广泛地分布在多个网站上。本文提出的工作解决了索引这一大型免费音乐集合的问题。这是一个非常相关的问题,因为目前还没有集成的数据库或索引来保存有关这种音乐材料的信息。例如,对这些内容进行索引将允许开发音乐推荐系统,该系统也将适用于非商业内容。在这篇论文中,作者提出了一个已经开发的系统建议,以解决可用的免费音乐索引问题,以及如何将该系统与其他系统(如音乐推荐系统)集成,以允许最终用户享受免费和开放的音乐内容。
{"title":"Using open-source tools for web crawling and indexing of open content","authors":"André Ricardo, C. Serrão","doi":"10.1109/I-SOCIETY18435.2011.5978485","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978485","url":null,"abstract":"The Internet has made possible the access to thousands of freely available music tracks under the Creative Commons or Public Domain licenses. This number keeps growing on a yearly basis. In practical terms, it is extremely difficult to browse this huge music collection, because it is widely dispersed throughout multiple websites. The work presented on this paper addresses the problem of indexing this large collection of free music. This is a very relevant problem because currently there are no integrated database or index holding information about this music material. Indexing this content will allow, for instance, the development of music recommendation systems that will also work with noncommercial content. In this paper the authors present a system proposal that has been developed to tackle the available free music indexing problem and how this system can be integrated with other systems (such as music recommendation systems) to allow the end users to enjoy free and open music content.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1240 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A conflict-solving perspective on collaborative knowledge classification - Application of a non compensatory multicriteria model 协同知识分类的冲突解决视角——非补偿多准则模型的应用
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978500
I. Brigui-Chtioui, I. Saad
In this paper we propose a non compensatory aggregation model based on two reference points: the aspiration point and the reservation point in order to automate the resolution of conflicts between decision makers for identifying knowledge that need to be capitalized. We follow a multi-agent system based on a mediator agent. This new approach allows to elicit preferences of decision makers which can be different while exploiting their multiple points of view to identify organizational knowledge to be acquired, preserved and transferred.
本文提出了一种基于期望点和保留点两个参考点的非补偿聚合模型,以自动解决决策者之间的冲突,从而识别需要资本化的知识。我们遵循基于中介代理的多代理系统。这种新方法可以引出决策者的偏好,这些偏好可能是不同的,同时利用他们的多个观点来确定要获得、保存和转移的组织知识。
{"title":"A conflict-solving perspective on collaborative knowledge classification - Application of a non compensatory multicriteria model","authors":"I. Brigui-Chtioui, I. Saad","doi":"10.1109/I-SOCIETY18435.2011.5978500","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978500","url":null,"abstract":"In this paper we propose a non compensatory aggregation model based on two reference points: the aspiration point and the reservation point in order to automate the resolution of conflicts between decision makers for identifying knowledge that need to be capitalized. We follow a multi-agent system based on a mediator agent. This new approach allows to elicit preferences of decision makers which can be different while exploiting their multiple points of view to identify organizational knowledge to be acquired, preserved and transferred.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133598736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Anti-Phishing mechanism for single sign-on based on QR-code 基于qr码的单点登录反钓鱼机制
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978554
Syamantak Mukhopadhyay, David Argles
Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle & reply attacks.
今天,互联网用户使用单一身份访问多个服务。使用单点登录(SSO),用户不必为每个服务提供商记住单独的用户名/密码,这有助于用户无缝地浏览web。然而,SSO很容易受到网络钓鱼攻击。本文提出了一种新的基于移动二维码的防钓鱼单点登录模型。除了防止网络钓鱼攻击外,这种新模式还可以安全抵御中间人和回复攻击。
{"title":"An Anti-Phishing mechanism for single sign-on based on QR-code","authors":"Syamantak Mukhopadhyay, David Argles","doi":"10.1109/I-SOCIETY18435.2011.5978554","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978554","url":null,"abstract":"Today internet users use a single identity to access multiple services. With single sign-on (SSO), users don't have to remember separate username/password for each service provider, which helps the user to browse through the web seamlessly. SSO is however susceptible to phishing attacks. This paper describes a new anti phishing SSO model based on mobile QR code. Apart from preventing phishing attacks this new model is also safe against man in the middle & reply attacks.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132484096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Biometric implementation in autonomous systems with an emphasis on smart home applicability 自主系统中的生物识别实现,重点是智能家居的适用性
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978475
P. Matthew
With an aging population and the increase in serious diseases smart homes and telehealth is becoming more and more prevalent. As these computer systems become increasingly widespread and complex, they become progressively harder to update, troubleshoot and configure without a large expert team of maintainers. One solution is to use autonomous systems to do the work much more quickly and efficiently. As autonomous systems become more sophisticated and understood, security concerns and authentication are coming to the fore as important areas in which more research is needed. With the constant search for the illusive ideal security identifier biometric systems have become more widespread and have entered the public eye. This paper will look at the connection between smart homes, biometrics devices and autonomous systems. into biometrics.
随着人口老龄化和严重疾病的增加,智能家居和远程医疗变得越来越普遍。随着这些计算机系统变得越来越广泛和复杂,如果没有一个庞大的专家维护团队,它们变得越来越难以更新、故障排除和配置。一个解决方案是使用自主系统来更快、更有效地完成工作。随着自治系统变得越来越复杂和容易理解,安全问题和身份验证成为需要更多研究的重要领域。随着人们对虚幻的理想安全标识的不断追求,生物识别系统已经变得越来越普遍,并进入了公众的视野。本文将探讨智能家居、生物识别设备和自主系统之间的联系。生物识别技术。
{"title":"Biometric implementation in autonomous systems with an emphasis on smart home applicability","authors":"P. Matthew","doi":"10.1109/I-SOCIETY18435.2011.5978475","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978475","url":null,"abstract":"With an aging population and the increase in serious diseases smart homes and telehealth is becoming more and more prevalent. As these computer systems become increasingly widespread and complex, they become progressively harder to update, troubleshoot and configure without a large expert team of maintainers. One solution is to use autonomous systems to do the work much more quickly and efficiently. As autonomous systems become more sophisticated and understood, security concerns and authentication are coming to the fore as important areas in which more research is needed. With the constant search for the illusive ideal security identifier biometric systems have become more widespread and have entered the public eye. This paper will look at the connection between smart homes, biometrics devices and autonomous systems. into biometrics.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Essentials for the e-government security 电子政务安全要点
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978443
F. Hadi, Fahad T. Bin Muhaya
In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why the governments of today's world are transforming their manual government services to electronic government services frequently. In the meantime the entire digitization of the system is prone to various security issues. Clear steps must be taken to ensure the privacy, authentication, integrity, and availability etc. This paper outlines some essential measures related to the e-government security. It also adds the security index into the e-government assessment method of the Department of Economic and Social Affairs (ESA) of United Nations (UN). The security index is based upon the international standard ISO 27001. Authors believe that the paper is useful for the policy makers, implementers and users of the e-government.
在现代数字时代,世界变成了一个地球村。让所有政府服务触手可及是每个政府的目标。这就是为什么当今世界各国政府正在频繁地将人工政务服务转变为电子政务服务的原因。同时整个系统的数字化也容易产生各种安全问题。必须采取明确的步骤来确保隐私、身份验证、完整性和可用性等。本文概述了与电子政务安全相关的一些基本措施。并在联合国经济和社会事务部(ESA)的电子政务评估方法中加入了安全指标。安全指数是基于国际标准ISO 27001。作者认为,本文对电子政务的决策者、实施者和使用者都有一定的参考价值。
{"title":"Essentials for the e-government security","authors":"F. Hadi, Fahad T. Bin Muhaya","doi":"10.1109/I-SOCIETY18435.2011.5978443","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978443","url":null,"abstract":"In the modern digital age the world became a global village. Finger tips availability of all government services is the goal of every government. That's why the governments of today's world are transforming their manual government services to electronic government services frequently. In the meantime the entire digitization of the system is prone to various security issues. Clear steps must be taken to ensure the privacy, authentication, integrity, and availability etc. This paper outlines some essential measures related to the e-government security. It also adds the security index into the e-government assessment method of the Department of Economic and Social Affairs (ESA) of United Nations (UN). The security index is based upon the international standard ISO 27001. Authors believe that the paper is useful for the policy makers, implementers and users of the e-government.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
SCM — A simple, modular and flexible customer interaction management system SCM -一个简单,模块化和灵活的客户交互管理系统
Pub Date : 2011-06-27 DOI: 10.1109/I-SOCIETY18435.2011.5978528
Jorg Schuster, Yeong Su Lee, Despina Kobothanassi, Matthias Bargel, Michaela Geierhos
SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/…? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM.
SCM是一个简单、模块化和灵活的系统,用于web监控和客户交互管理。在我们看来,它的主要优点如下:它完全是基于网络的。它结合了监控和客户交互过程中涉及的所有技术、数据、软件代理和人工代理。它可以用于用任何自然语言编写的消息。虽然SCM的原型是为分类和处理社交网络中与移动电话相关的问题的消息而设计的,但SCM可以很容易地适应其他文本类型,如讨论板帖子、博客或电子邮件。与可比较的系统不同,SCM使用语言技术对消息进行分类并识别产品名称的释义。出于两个原因,产品名称释义在SCM中扮演着重要的角色:首先,产品名称通常有许多,有时是数百或数千种语言内释义。其次,产品名称具有跨语言释义:相同的产品在不同的国家和/或语言中经常被称为或拼写不同。通过将产品名称变体映射到国际规范形式,SCM允许回答诸如在哪种语言/在哪种社交网络/在哪个国家/…SCM产品名称释义引擎是以这样一种方式设计的:自动分配标准变量,半自动分配规则变量,手动添加特殊变量。通过这个和类似的功能,我们试图实现简单、模块化和灵活性的理念:任何可以自动完成的事情都是自动完成的。但人工干预总是可能的和容易的,而且它不以任何方式与单片机的自动功能相冲突。
{"title":"SCM — A simple, modular and flexible customer interaction management system","authors":"Jorg Schuster, Yeong Su Lee, Despina Kobothanassi, Matthias Bargel, Michaela Geierhos","doi":"10.1109/I-SOCIETY18435.2011.5978528","DOIUrl":"https://doi.org/10.1109/I-SOCIETY18435.2011.5978528","url":null,"abstract":"SCM is a simple, modular and flexible system for web monitoring and customer interaction management. In our view, its main advantages are the following: It is completely web based. It combines all technologies, data, software agents and human agents involved in the monitoring and customer interaction process. It can be used for messages written in any natural language. Although the prototype of SCM is designed for classifying and processing messages about mobile-phone related problems in social networks, SCM can easily be adapted to other text types such as discussion board posts, blogs or emails. Unlike comparable systems, SCM uses linguistic technologies to classify messages and recognize paraphrases of product names. For two reasons, product name paraphrasing plays a major role in SCM: First, product names typically have many, sometimes hundreds or thousands of intralingual paraphrases. Secondly, product names have interlingual paraphrases: The same products are often called or spelt differently in different countries and/or languages. By mapping product name variants to an international canonical form, SCM allows for answering questions like Which statements are made about this mobile phone in which languages/in which social networks/in which countries/…? The SCM product name paraphrasing engine is designed in such a way that standard variants are assigned automatically, regular variants are assigned semiautomatically and idiosyncratic variants can be added manually. With this and similar features we try to realize our philosophy of simplicity, modularity and flexibility: Whatever can be done automatically is done automatically. But manual intervention is always possible and easy and it does not conflict in any way with the automatic functions of SCM.","PeriodicalId":158246,"journal":{"name":"International Conference on Information Society (i-Society 2011)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131121536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Conference on Information Society (i-Society 2011)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1