首页 > 最新文献

Acta Informatica Pragensia最新文献

英文 中文
The Digital Media in Lithuania: Combating Disinformation and Fake News 立陶宛的数字媒体:打击虚假信息和假新闻
Q2 Social Sciences Pub Date : 2020-08-14 DOI: 10.18267/j.aip.134
Aelita Skaržauskienė, M. Maciuliene, Ornela Ramasauskaite
The prevalence of so-called “fake news” is a relatively recent social phenomenon that is linked to disinformation, misinformation and other forms of networked manipulation facilitated by the rise of the Internet and online social media. The spread of misinformation is among the most pressing challenges of our time. Sources from which disinformation originates are constantly changing and present an enormous challenge for real-time detection algorithms and more targeted science based socio-technical interventions. The primary aim of this paper is to illuminate the practices and interpretations, focusing on three perspectives: general attitudes to fake news, perceived interaction with disinformation and opinion on counteraction with respect to fake news. The innovative character of the research is achieved by the focus on community solutions to combat disinformation and the collaboration between media users, media organizations, scientists, communication managers, journalists and other important actors in the media ecosystem. Based on insights from interviews with communication field experts, the paper sheds light on the efforts of Lithuanian society to confront the problem of fake news in digital media environment. Lithuania is also an interesting case study for fake news due to its status as a former Soviet state now in the EU. Our research indicates that not all media users are prepared and/or have the necessary competencies to combat fake news, so that citizen engagement might actually negatively influence the quality of the counteraction process. Indeed, proactive citizens’ organizations and NGOs could be an important catalyst fostering collaboration between stakeholders. The responsibility of governments could be to create the structures, methodologies and supporting educational activities to involve the stakeholders in collaborating activities combating disinformation.
所谓“假新闻”的流行是一种相对较新的社会现象,与虚假信息、错误信息和其他形式的网络操纵有关,这些网络操纵是由互联网和在线社交媒体的兴起促成的。错误信息的传播是我们这个时代最紧迫的挑战之一。虚假信息来源不断变化,对实时检测算法和更有针对性的基于科学的社会技术干预提出了巨大挑战。本文的主要目的是阐明实践和解释,重点从三个角度:对假新闻的普遍态度、与虚假信息的感知互动以及对反制假新闻的看法。这项研究的创新性是通过关注打击虚假信息的社区解决方案以及媒体用户、媒体组织、科学家、传播管理人员、记者和媒体生态系统中其他重要参与者之间的合作实现的。基于对传播领域专家的采访,本文揭示了立陶宛社会在数字媒体环境中应对假新闻问题的努力。立陶宛也是一个有趣的假新闻案例研究,因为它是前苏联国家,现在在欧盟。我们的研究表明,并非所有媒体用户都准备好和/或具备打击假新闻的必要能力,因此公民参与实际上可能会对反制过程的质量产生负面影响。事实上,积极主动的公民组织和非政府组织可以成为促进利益攸关方之间合作的重要催化剂。政府的责任可以是建立结构、方法和支持教育活动,让利益相关者参与打击虚假信息的合作活动。
{"title":"The Digital Media in Lithuania: Combating Disinformation and Fake News","authors":"Aelita Skaržauskienė, M. Maciuliene, Ornela Ramasauskaite","doi":"10.18267/j.aip.134","DOIUrl":"https://doi.org/10.18267/j.aip.134","url":null,"abstract":"The prevalence of so-called “fake news” is a relatively recent social phenomenon that is linked to disinformation, misinformation and other forms of networked manipulation facilitated by the rise of the Internet and online social media. The spread of misinformation is among the most pressing challenges of our time. Sources from which disinformation originates are constantly changing and present an enormous challenge for real-time detection algorithms and more targeted science based socio-technical interventions. The primary aim of this paper is to illuminate the practices and interpretations, focusing on three perspectives: general attitudes to fake news, perceived interaction with disinformation and opinion on counteraction with respect to fake news. The innovative character of the research is achieved by the focus on community solutions to combat disinformation and the collaboration between media users, media organizations, scientists, communication managers, journalists and other important actors in the media ecosystem. Based on insights from interviews with communication field experts, the paper sheds light on the efforts of Lithuanian society to confront the problem of fake news in digital media environment. Lithuania is also an interesting case study for fake news due to its status as a former Soviet state now in the EU. Our research indicates that not all media users are prepared and/or have the necessary competencies to combat fake news, so that citizen engagement might actually negatively influence the quality of the counteraction process. Indeed, proactive citizens’ organizations and NGOs could be an important catalyst fostering collaboration between stakeholders. The responsibility of governments could be to create the structures, methodologies and supporting educational activities to involve the stakeholders in collaborating activities combating disinformation.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43846426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Knowledge Management-Enabling Technologies: A Supplementary Classification 知识管理使能技术:一个补充分类
Q2 Social Sciences Pub Date : 2020-07-29 DOI: 10.18267/j.aip.130
Monika Dávideková, M. Greguš, M. Zanker, V. Bureš
Scientific and technological developments in informatics enable intensive transformation of data into valuable information. Enriched with context, information may be turned into knowledge, allowing organizations to optimize their processes and profile themselves as learning knowledge organizations. Several classifications of knowledge and knowledge management are available in scientific literature and research publications. In this paper the implementation and application of information and communication technology in knowledge management is being assessed from the perspective of synchrony and mutual interaction among collaborating parties.  Following the PRISMA scheme, a systematic review procedure using Scopus and Web of Science databases was conducted. Obtained manuscripts underwent manual content analysis. The outcome of this analysis represents the classification of widespread ICTs into diverse categories based on extensive literature research. It specifies an original type of classification by connecting intertwined synchronicity and interaction as the main classification criteria, and it provides examples of commonly used ICTs in business practice. The introduced classification aims to deepen the comprehension of ICTs, which may lead to improved efficiency and/or eligibility of technological implementations and applications of knowledge management based on the undeniably enormous benefits of the use of ICTs in processing of business operations.
信息学的科学和技术发展使数据能够密集地转化为有价值的信息。通过丰富上下文,信息可以转化为知识,允许组织优化其过程并将自己描述为学习型知识组织。在科学文献和研究出版物中可以找到知识和知识管理的几种分类。本文从合作方的同步性和相互交互性的角度对信息通信技术在知识管理中的实施和应用进行了评价。按照PRISMA方案,使用Scopus和Web of Science数据库进行系统评审程序。获得的手稿进行了手工内容分析。这一分析的结果表明,基于广泛的文献研究,将广泛使用的信息通信技术分为不同的类别。它通过将相互交织的同步性和交互性连接起来作为主要分类标准,指定了一种原始类型的分类,并提供了在商业实践中常用的信息通信技术的示例。引入的分类旨在加深对信息通信技术的理解,这可能会提高技术实施和知识管理应用的效率和/或资格,因为在处理业务操作中使用信息通信技术带来了不可否认的巨大好处。
{"title":"Knowledge Management-Enabling Technologies: A Supplementary Classification","authors":"Monika Dávideková, M. Greguš, M. Zanker, V. Bureš","doi":"10.18267/j.aip.130","DOIUrl":"https://doi.org/10.18267/j.aip.130","url":null,"abstract":"Scientific and technological developments in informatics enable intensive transformation of data into valuable information. Enriched with context, information may be turned into knowledge, allowing organizations to optimize their processes and profile themselves as learning knowledge organizations. Several classifications of knowledge and knowledge management are available in scientific literature and research publications. In this paper the implementation and application of information and communication technology in knowledge management is being assessed from the perspective of synchrony and mutual interaction among collaborating parties.  Following the PRISMA scheme, a systematic review procedure using Scopus and Web of Science databases was conducted. Obtained manuscripts underwent manual content analysis. The outcome of this analysis represents the classification of widespread ICTs into diverse categories based on extensive literature research. It specifies an original type of classification by connecting intertwined synchronicity and interaction as the main classification criteria, and it provides examples of commonly used ICTs in business practice. The introduced classification aims to deepen the comprehension of ICTs, which may lead to improved efficiency and/or eligibility of technological implementations and applications of knowledge management based on the undeniably enormous benefits of the use of ICTs in processing of business operations.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41617038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Mining from the Banking Sector´s Data 银行业数据的数据挖掘
Q2 Social Sciences Pub Date : 2019-07-10 DOI: 10.18267/j.aip.123
Anna Biceková, Ludmila Pusztová
This paper deals with the prediction of company bankruptcies and defines how this undesirable state can be prevented. Currently, these methods include modern approaches from the area of data mining that can help companies in many ways. In a practical application of data mining methods for predicting the future state of a company, financial indicators of Polish companies were used. In the analyses, we used algorithms suitable for bankruptcy prediction – decision trees that provide a simple interpretation of results. In some experiments, we also used attribute selection methods, LASSO, or the PCA method. The workflow is governed by the CRISP-DM methodology, which describes the important steps needed for different analytical tasks. Part of the article is an analysis of the current state, which presents solutions to this problem suggested by other authors. After evaluating all models, we concluded that the C5.0 algorithm is capable of predicting a company’s bankruptcy or non-bankruptcy with 97.07 % accuracy, without the use of attribute selection methods.
本文讨论了公司破产的预测,并定义了如何防止这种不良状态。目前,这些方法包括来自数据挖掘领域的现代方法,这些方法可以在许多方面帮助公司。在数据挖掘方法预测公司未来状态的实际应用中,使用了波兰公司的财务指标。在分析中,我们使用了适合破产预测的算法——决策树,它提供了对结果的简单解释。在一些实验中,我们还使用了属性选择方法、LASSO或PCA方法。工作流程由CRISP-DM方法管理,该方法描述了不同分析任务所需的重要步骤。文章的一部分是对现状的分析,并提出了其他作者提出的解决问题的方法。在对所有模型进行评估后,我们得出结论,C5.0算法能够在不使用属性选择方法的情况下预测公司破产或非破产,准确率为97.07%。
{"title":"Data Mining from the Banking Sector´s Data","authors":"Anna Biceková, Ludmila Pusztová","doi":"10.18267/j.aip.123","DOIUrl":"https://doi.org/10.18267/j.aip.123","url":null,"abstract":"This paper deals with the prediction of company bankruptcies and defines how this undesirable state can be prevented. Currently, these methods include modern approaches from the area of data mining that can help companies in many ways. In a practical application of data mining methods for predicting the future state of a company, financial indicators of Polish companies were used. In the analyses, we used algorithms suitable for bankruptcy prediction – decision trees that provide a simple interpretation of results. In some experiments, we also used attribute selection methods, LASSO, or the PCA method. The workflow is governed by the CRISP-DM methodology, which describes the important steps needed for different analytical tasks. Part of the article is an analysis of the current state, which presents solutions to this problem suggested by other authors. After evaluating all models, we concluded that the C5.0 algorithm is capable of predicting a company’s bankruptcy or non-bankruptcy with 97.07 % accuracy, without the use of attribute selection methods.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67745064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Kryptoměny 加密货币
Q2 Social Sciences Pub Date : 2018-12-31 DOI: 10.18267/j.aip.121
Petr Tesar
{"title":"Kryptoměny","authors":"Petr Tesar","doi":"10.18267/j.aip.121","DOIUrl":"https://doi.org/10.18267/j.aip.121","url":null,"abstract":"","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67744870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Latent Dirichlet Allocation Methods Usable in Voice of Customer Analysis 用于客户声音分析的潜在狄利克雷分配方法综述
Q2 Social Sciences Pub Date : 2018-12-31 DOI: 10.18267/j.aip.120
Lucie Sperková
The aim of the article is to detect and review existing topic modelling methods of Latent Dirichlet Allocation and their modifications usable in Voice of Customer analysis. Voice of Customer is expressed mainly through textual comments which often focus on the evaluation of products or services the customer consumes. The most studied data source are customer reviews which contain next to the textual comments also ratings in form of scales. The aim of the topic models is to mine the topics and their aspects the customers are evaluating in their reviews and assign to them a particular sentiment or emotion. The author completed a systematic literature review of peer-reviewed published journal articles indexed in leading databases of Scopus and Web of Science and concerning the current use of Latent Dirichlet Allocation model variants in Voice of Customer textual analysis for performing the tasks of aspect detection, emotion detection, personality detection and sentiment assignation. In total, 38 modifications of the LDA model were identified with the reference to their first application in the research of text analytics. The review is intended for researchers in customer analytics the field of sentiment or emotion detection, and moreover as results from the review, for studies in personality recognition based on the textual data. The review offers a basic overview and comparison of LDA modifications which can be considered as a knowledge baseline for selection in a specific application. The scope of the literature examination is limited to the period of years 2003–2018 with the application relevant to the analysis of Voice of Customer subjective textual data only which is closely connected to the area of marketing or customer relationship management.
本文的目的是检测和回顾现有的潜在狄利克雷分配的主题建模方法及其修改可用于客户之声分析。顾客的声音主要是通过文本评论来表达的,这些评论往往集中在对顾客消费的产品或服务的评价上。研究最多的数据来源是客户评论,它包含在文本评论旁边也以尺度的形式评级。主题模型的目的是挖掘客户在评论中评估的主题及其方面,并为它们分配特定的情绪或情感。作者完成了一项系统的文献综述,检索了Scopus和Web of Science等领先数据库中同行评审的已发表期刊文章,并研究了目前在Customer Voice文本分析中使用Latent Dirichlet Allocation模型变体执行方面检测、情感检测、个性检测和情感分配任务的情况。总共有38个LDA模型的修改,参考了它们在文本分析研究中的首次应用。这篇综述的目的是为客户分析领域的研究人员提供情感或情感检测,并且作为综述的结果,用于基于文本数据的人格识别研究。该综述提供了LDA修改的基本概述和比较,可被视为在特定应用中选择的知识基线。文献检查的范围仅限于2003-2018年期间,仅与客户主观文本数据分析相关的应用程序与营销或客户关系管理领域密切相关。
{"title":"Review of Latent Dirichlet Allocation Methods Usable in Voice of Customer Analysis","authors":"Lucie Sperková","doi":"10.18267/j.aip.120","DOIUrl":"https://doi.org/10.18267/j.aip.120","url":null,"abstract":"The aim of the article is to detect and review existing topic modelling methods of Latent Dirichlet Allocation and their modifications usable in Voice of Customer analysis. Voice of Customer is expressed mainly through textual comments which often focus on the evaluation of products or services the customer consumes. The most studied data source are customer reviews which contain next to the textual comments also ratings in form of scales. The aim of the topic models is to mine the topics and their aspects the customers are evaluating in their reviews and assign to them a particular sentiment or emotion. The author completed a systematic literature review of peer-reviewed published journal articles indexed in leading databases of Scopus and Web of Science and concerning the current use of Latent Dirichlet Allocation model variants in Voice of Customer textual analysis for performing the tasks of aspect detection, emotion detection, personality detection and sentiment assignation. In total, 38 modifications of the LDA model were identified with the reference to their first application in the research of text analytics. The review is intended for researchers in customer analytics the field of sentiment or emotion detection, and moreover as results from the review, for studies in personality recognition based on the textual data. The review offers a basic overview and comparison of LDA modifications which can be considered as a knowledge baseline for selection in a specific application. The scope of the literature examination is limited to the period of years 2003–2018 with the application relevant to the analysis of Voice of Customer subjective textual data only which is closely connected to the area of marketing or customer relationship management.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41722959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips 用户对反钓鱼安全提示的认知研究及社会人口学认知的影响
Q2 Social Sciences Pub Date : 2018-12-31 DOI: 10.18267/j.aip.119
A. A. Orunsolu, O. Afolabi, A. Sodiya, A. Akinwale
Security tips are now used as a method of priming online users from falling prey for fraudulent scams. These security tips usually come as email, SMS or online posts where they can be easily accessed by the users. In this work, phishing attacks are simulated with varying cues that are available in such fraudulent email messages, SMS and web pages were used to investigate the effectiveness of the security tips used by Nigerian banks to prime their customers of online threats. A total of 427 respondents, purposively selected from three tertiary institutions in Ogun State, participated in the study. Each respondent was asked to identify five messages with varying phishing cues to evaluate their understanding of the security tips messages. The results which were computed at 95% Confidence Interval, indicated that 58.91% failed on the first attribute, 58.59% failed on the second attribute while 58.73% failed on the third attribute. 74.24% of the participant could not correctly identify a fake email message (fourth attribute) while 76.71% could not correctly identify a phished bank verification number update message (fifth attribute). Using the Mann Whitney Test, the result further showed that overall, those who failed the test are significantly more than those who passed. Moreover, a regression model is proposed to evaluate the influence of the socio demographic factors used in the study. This result indicated that gender, academic qualification and user's computer knowledge significantly influences their ability to recognize phished messages.
安全提示现在被用作一种方法,使在线用户避免成为欺诈骗局的牺牲品。这些安全提示通常以电子邮件、短信或在线帖子的形式发布,用户可以很容易地访问这些提示。在这项工作中,网络钓鱼攻击模拟了各种线索,这些线索可以在诸如欺诈性电子邮件、短信和网页中获得,用于调查尼日利亚银行使用的安全提示的有效性,以使客户对在线威胁做好准备。共有427名受访者参与了这项研究,他们是从奥贡州的三所高等教育机构中有意挑选出来的。每个受访者被要求识别五个不同的网络钓鱼线索的消息,以评估他们对安全提示消息的理解。以95%置信区间计算的结果表明,58.91%的人在第一个属性上失败,58.59%的人在第二个属性上失败,58.73%的人在第三个属性上失败。74.24%的参与者不能正确识别虚假电子邮件(第四个属性),76.71%的参与者不能正确识别钓鱼银行验证号更新信息(第五个属性)。使用曼·惠特尼测试,结果进一步表明,总体而言,不及格的人明显多于通过的人。此外,还提出了一个回归模型来评估研究中使用的社会人口因素的影响。结果显示,性别、学历和使用者的电脑知识显著影响其识别钓鱼讯息的能力。
{"title":"A Users' Awareness Study and Influence of Socio-Demography Perception of Anti-Phishing Security Tips","authors":"A. A. Orunsolu, O. Afolabi, A. Sodiya, A. Akinwale","doi":"10.18267/j.aip.119","DOIUrl":"https://doi.org/10.18267/j.aip.119","url":null,"abstract":"Security tips are now used as a method of priming online users from falling prey for fraudulent scams. These security tips usually come as email, SMS or online posts where they can be easily accessed by the users. In this work, phishing attacks are simulated with varying cues that are available in such fraudulent email messages, SMS and web pages were used to investigate the effectiveness of the security tips used by Nigerian banks to prime their customers of online threats. A total of 427 respondents, purposively selected from three tertiary institutions in Ogun State, participated in the study. Each respondent was asked to identify five messages with varying phishing cues to evaluate their understanding of the security tips messages. The results which were computed at 95% Confidence Interval, indicated that 58.91% failed on the first attribute, 58.59% failed on the second attribute while 58.73% failed on the third attribute. 74.24% of the participant could not correctly identify a fake email message (fourth attribute) while 76.71% could not correctly identify a phished bank verification number update message (fifth attribute). Using the Mann Whitney Test, the result further showed that overall, those who failed the test are significantly more than those who passed. Moreover, a regression model is proposed to evaluate the influence of the socio demographic factors used in the study. This result indicated that gender, academic qualification and user's computer knowledge significantly influences their ability to recognize phished messages.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45333056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analyzing Social Media Data for Recruiting Purposes 出于招聘目的分析社交媒体数据
Q2 Social Sciences Pub Date : 2018-06-30 DOI: 10.18267/j.aip.111
L. Bohmova, David Chudán
Social media networks are tools that recruiters can utilize during a recruitment process. Most importantly, social media networks can be used in conjunction with applications capable of downloading information about their potential candidates. The aim of this article is to present a creation process of a model that could be helpful in recruiting area. A crucial part of this model is application software that downloads user’s data, particularly from Facebook profiles. This model should propose appropriate analytical methods for data processing. The output of this article is employee recruitment model that can be used as a guide to utilize the potential of social media networks by HR professionals. Test run of this model on our population sample showed prediction accuracy of 68 % to 84 %.
社交媒体网络是招聘人员在招聘过程中可以使用的工具。最重要的是,社交媒体网络可以与能够下载关于其潜在候选人的信息的应用程序结合使用。本文的目的是介绍一个模型的创建过程,该模型可能有助于招聘领域。该模型的一个关键部分是下载用户数据的应用软件,尤其是从Facebook个人资料中下载的数据。该模型应为数据处理提出适当的分析方法。本文的成果是员工招聘模型,人力资源专业人员可以将其作为利用社交媒体网络潜力的指南。该模型在我们的人口样本上的测试运行显示预测准确率为68%至84%。
{"title":"Analyzing Social Media Data for Recruiting Purposes","authors":"L. Bohmova, David Chudán","doi":"10.18267/j.aip.111","DOIUrl":"https://doi.org/10.18267/j.aip.111","url":null,"abstract":"Social media networks are tools that recruiters can utilize during a recruitment process. Most importantly, social media networks can be used in conjunction with applications capable of downloading information about their potential candidates. The aim of this article is to present a creation process of a model that could be helpful in recruiting area. A crucial part of this model is application software that downloads user’s data, particularly from Facebook profiles. This model should propose appropriate analytical methods for data processing. The output of this article is employee recruitment model that can be used as a guide to utilize the potential of social media networks by HR professionals. Test run of this model on our population sample showed prediction accuracy of 68 % to 84 %.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44145665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Classification and Evaluation of Cloud-Based Testing Tools: The Case Study of Web Applications' Security Testing 基于云的测试工具分类与评估——以Web应用程序安全测试为例
Q2 Social Sciences Pub Date : 2018-06-30 DOI: 10.18267/j.aip.113
Martin Lnenicka, J. Čapek
The purpose of the article is to give a survey of research fields related to test and manage applications from the cloud, i.e. cloud-based testing, so that it can facilitate security requirements associated with the testing. This article has two main aims. The first one is the survey of published results attained by the synergy of these research fields – cloud-based testing, testing strategies and types of tests, and related architectures, which is followed by the classification of testing tools based on their testing strategies. The second part is focused on security testing of Fire and Rescue Service portals in the Czech Republic and identification of vulnerabilities in these portals. The results suggested that it is more appropriate to manage only one unified portal than a lot of portals on the regional level, also due to the economies of scale. Finally, the most suitable tool for cloud-based security testing was recommended based on these results and a typical cloud-based testing methodology was described.
本文的目的是对与从云(即基于云的测试)测试和管理应用程序相关的研究领域进行调查,以便促进与测试相关的安全需求。本文有两个主要目的。第一部分是对这些研究领域——基于云的测试、测试策略和测试类型以及相关架构——协同取得的已发表成果的调查,然后是根据测试策略对测试工具进行分类。第二部分侧重于捷克共和国消防和救援服务门户的安全测试以及这些门户中的漏洞识别。结果表明,由于规模经济的原因,仅管理一个统一的门户比在区域级别上管理许多门户更合适。最后,根据这些结果推荐了最适合基于云的安全测试的工具,并描述了一种典型的基于云的测试方法。
{"title":"Classification and Evaluation of Cloud-Based Testing Tools: The Case Study of Web Applications' Security Testing","authors":"Martin Lnenicka, J. Čapek","doi":"10.18267/j.aip.113","DOIUrl":"https://doi.org/10.18267/j.aip.113","url":null,"abstract":"The purpose of the article is to give a survey of research fields related to test and manage applications from the cloud, i.e. cloud-based testing, so that it can facilitate security requirements associated with the testing. This article has two main aims. The first one is the survey of published results attained by the synergy of these research fields – cloud-based testing, testing strategies and types of tests, and related architectures, which is followed by the classification of testing tools based on their testing strategies. The second part is focused on security testing of Fire and Rescue Service portals in the Czech Republic and identification of vulnerabilities in these portals. The results suggested that it is more appropriate to manage only one unified portal than a lot of portals on the regional level, also due to the economies of scale. Finally, the most suitable tool for cloud-based security testing was recommended based on these results and a typical cloud-based testing methodology was described.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47151677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Přehled přístupů k vyhodnocování inteligence umělých systémů
Q2 Social Sciences Pub Date : 2018-06-30 DOI: 10.18267/j.aip.115
Ondrej Vadinský
Obecna uměla inteligence usiluje o vytvořeni umělých systemů schopných řesit mnoho různých, a to i během vývoje nepředvidaných, uloh, což takove systemy cini svou inteligenci srovnatelne s lidmi. To vsak vyžaduje existenci vhodných metod vyhodnocujicich, zda a nakolik jsou uměle systemy inteligentni. Tento přehledový clanek hleda pravě takove evaluacni metody. Provadi proto rozsahlou resersi literatury pokrývajici jak filosoficke a kognitivni předpoklady inteligence, tak i formalni definice a prakticke testy vychazejici z algoritmicke teorie informace. Na zakladě porovnani představených metod clanek odhaluje dvě rozdilne skupiny přistupů založene na principialně odlisných předpokladech. Zatimco starsi přistupy, jako např. Turingův test, jsou založeny na předpokladu, že uspěch v komplexni cinnosti je postacujici pro přiznani inteligence, nove přistupy, jako např. test algoritmickeho IQ, kromě toho vyžaduji i důkladne ověřeni uspěsnosti v jednoduchých cinnostech. V důsledku tohoto zjistěni clanek dochazi k zavěru, že test algoritmickeho IQ založený na definici univerzalni inteligence je v soucasne době nejlepsim kandidatem na vhodný prakticky proveditelný test obecne inteligence umělých systemů. Ackoliv i tento test ma několik znamých limitů.
总的来说,人工智能努力创造能够处理许多不同的人工系统,即使是在不可预见的沉积物的开发过程中,也能使这些系统的智能与人类相当。然而,这需要有适当的方法来评估人工系统是否智能以及在多大程度上智能。这个审查小组正在寻找这样的评估方法。因此,他们对文献进行了广泛的研究,涵盖了智力的哲学和认知假设,以及基于信息算法理论的形式定义和实践测试。基于对所提出方法的比较,clank揭示了基于根本不同假设的两组不同方法。而较老的方法,例如图灵的测试基于这样一种假设,即复杂活动的成功对公认的智力、新方法(如。算法智商测试,此外,我需要在简单的活动中彻底验证成功。作为这一发现的结果,clanek得出结论,基于普遍智能定义的算法智商测试是目前对人工系统的普遍智能进行适当的实际可行测试的最佳候选者。尽管此测试有几个已知的限制。
{"title":"Přehled přístupů k vyhodnocování inteligence umělých systémů","authors":"Ondrej Vadinský","doi":"10.18267/j.aip.115","DOIUrl":"https://doi.org/10.18267/j.aip.115","url":null,"abstract":"Obecna uměla inteligence usiluje o vytvořeni umělých systemů schopných řesit mnoho různých, a to i během vývoje nepředvidaných, uloh, což takove systemy cini svou inteligenci srovnatelne s lidmi. To vsak vyžaduje existenci vhodných metod vyhodnocujicich, zda a nakolik jsou uměle systemy inteligentni. Tento přehledový clanek hleda pravě takove evaluacni metody. Provadi proto rozsahlou resersi literatury pokrývajici jak filosoficke a kognitivni předpoklady inteligence, tak i formalni definice a prakticke testy vychazejici z algoritmicke teorie informace. Na zakladě porovnani představených metod clanek odhaluje dvě rozdilne skupiny přistupů založene na principialně odlisných předpokladech. Zatimco starsi přistupy, jako např. Turingův test, jsou založeny na předpokladu, že uspěch v komplexni cinnosti je postacujici pro přiznani inteligence, nove přistupy, jako např. test algoritmickeho IQ, kromě toho vyžaduji i důkladne ověřeni uspěsnosti v jednoduchých cinnostech. V důsledku tohoto zjistěni clanek dochazi k zavěru, že test algoritmickeho IQ založený na definici univerzalni inteligence je v soucasne době nejlepsim kandidatem na vhodný prakticky proveditelný test obecne inteligence umělých systemů. Ackoliv i tento test ma několik znamých limitů.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43679999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data Mining from Open Fiscal Data 开放财政数据的数据挖掘
Q2 Social Sciences Pub Date : 2018-06-30 DOI: 10.18267/j.aip.114
David Chudán, V. Svátek, Jaroslav Kuchař, Stanislav Vojíř
Metody dolovani z dat jsou aplikovany ve stale větsi miře, a to i v domenach, ktere tradicně nemaji tak silnou podporu analytických nastrojů a kde převlada rucni prace analytika. Použiti těchto metod v oblasti fiskalnich dat umožni jejich hlubsi analýzu a může přinest nova zjistěni. Nasazeni pokrocilých metod dolovani z dat je jednou z casti projektu OpenBudgets.eu, který se zaměřuje na transparentnost a odpovědnost v oblasti nakladani s veřejnými prostředky. Tento přehledový clanek shrnuje některe zkusenosti autorů z tohoto projektu ziskane při vývoji, implementaci a aplikaci vybraných metod dolovani z fiskalnich dat. Jedna se zejmena o metody detekce anomalii a dolovani asociacnich pravidel. Tyto metody jsou integrovany do centralni platformy projektu, ktera je k dispozici pokrocilým i běžným uživatelům v připadě zajmu o analýzu fiskalnich dat. Pilotni analýzy ukazaly, že problemem dataminingove analýzy v teto domeně je velký objem nachazených pravidel a různorodý původ jejich vzniku.
{"title":"Data Mining from Open Fiscal Data","authors":"David Chudán, V. Svátek, Jaroslav Kuchař, Stanislav Vojíř","doi":"10.18267/j.aip.114","DOIUrl":"https://doi.org/10.18267/j.aip.114","url":null,"abstract":"Metody dolovani z dat jsou aplikovany ve stale větsi miře, a to i v domenach, ktere tradicně nemaji tak silnou podporu analytických nastrojů a kde převlada rucni prace analytika. Použiti těchto metod v oblasti fiskalnich dat umožni jejich hlubsi analýzu a může přinest nova zjistěni. Nasazeni pokrocilých metod dolovani z dat je jednou z casti projektu OpenBudgets.eu, který se zaměřuje na transparentnost a odpovědnost v oblasti nakladani s veřejnými prostředky. Tento přehledový clanek shrnuje některe zkusenosti autorů z tohoto projektu ziskane při vývoji, implementaci a aplikaci vybraných metod dolovani z fiskalnich dat. Jedna se zejmena o metody detekce anomalii a dolovani asociacnich pravidel. Tyto metody jsou integrovany do centralni platformy projektu, ktera je k dispozici pokrocilým i běžným uživatelům v připadě zajmu o analýzu fiskalnich dat. Pilotni analýzy ukazaly, že problemem dataminingove analýzy v teto domeně je velký objem nachazených pravidel a různorodý původ jejich vzniku.","PeriodicalId":36592,"journal":{"name":"Acta Informatica Pragensia","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67744358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica Pragensia
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1